JFrog XrayJFrog
|
||||||
Related Products
|
||||||
About
Identify application connections, predict code change impacts, and understand complex Java and .NET codebases from API to method to database. Create a complete graph of your app structure in real time with combined binary and runtime scans. Understand the full impact of a code change before it’s deployed and accurately estimate project scope. Identify undetected software usages and references across projects and applications directly from your IDE. Many tools, such as IDEs, only expose project-specific code dependencies. CodeLogic exposes hidden code dependencies within and between applications and databases. Our approach is different; we combine binary scans with runtime profiling to create an accurate, real-time, searchable system of record for code and database dependencies. This intelligence helps application teams see the impact of code and schema changes before they are deployed to production.
|
About
DevSecOps Next Generation – Securing Your Binaries. Identify security vulnerabilities and license violations early in the development process and block builds with security issues from deployment. Automated and continuous governance and auditing of software artifacts and dependencies throughout the software development lifecycle from code to production. Additional functionalities include:
- Deep recursive scanning of components drilling down to analyze all artifacts and dependencies and creating a graph of relationships between software components.
- On-Prem, Cloud, Hybrid, or Multi-Cloud Solution
- Impact analysis of how an issue in one component affects all dependent components with a display chain of impacts in a component dependency graph.
- JFrog’s vulnerabilities database, continuously updated with new component vulnerability data, includes VulnDB, the industry’s most comprehensive security vulnerability database.
|
|||||
Platforms Supported
Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook
|
Platforms Supported
Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook
|
|||||
Audience
Developers
|
Audience
Developers, DevOps Engineers, DevSecOps, SRE.
|
|||||
Support
Phone Support
24/7 Live Support
Online
|
Support
Phone Support
24/7 Live Support
Online
|
|||||
API
Offers API
|
API
Offers API
|
|||||
Screenshots and Videos |
Screenshots and Videos |
|||||
Pricing
$100.00/month
Free Version
Free Trial
|
Pricing
No information available.
Free Version
Free Trial
|
|||||
Reviews/
|
Reviews/
|
|||||
Training
Documentation
Webinars
Live Online
In Person
|
Training
Documentation
Webinars
Live Online
In Person
|
|||||
Company InformationCodeLogic
Founded: 2015
United States
codelogic.com
|
Company InformationJFrog
Founded: 2008
United States
jfrog.com/xray/
|
|||||
Alternatives |
Alternatives |
|||||
|
|
|
|||||
|
|
||||||
|
|
||||||
|
|
|
|||||
Categories |
Categories |
|||||
Application Development Features
Access Controls/Permissions
Code Assistance
Code Refactoring
Collaboration Tools
Compatibility Testing
Data Modeling
Debugging
Deployment Management
Graphical User Interface
Mobile Development
No-Code
Reporting/Analytics
Software Development
Source Control
Testing Management
Version Control
Web App Development
Enterprise Architecture Features
Application Portfolio Management
Architecture Governance
Capability Mapping
Diagramming
Idea Management
Modeling & Simulation
Project Management
Risk Assessment
Transformation Roadmapping
Version Control
|
Continuous Integration Features
Build Log
Change Management
Configuration Management
Continuous Delivery
Continuous Deployment
Debugging
Permission Management
Quality Assurance Management
Testing Management
DevOps Features
Approval Workflow
Dashboard
KPIs
Policy Management
Portfolio Management
Prioritization
Release Management
Timeline Management
Troubleshooting Reports
IT Security Features
Anti Spam
Anti Virus
Email Attachment Protection
Event Tracking
Internet Usage Monitoring
Intrusion Detection System
IP Protection
Spyware Removal
Two-Factor Authentication
Vulnerability Scanning
Web Threat Management
Web Traffic Reporting
Vulnerability Management Features
Asset Discovery
Asset Tagging
Network Scanning
Patch Management
Policy Management
Prioritization
Risk Management
Vulnerability Assessment
Web Scanning
|
|||||
Integrations
.NET
ArmorCode
Boozang
Chainguard
Cider
JFrog Connect
Java
Kondukto
Mend.io
OpsLevel
|
Integrations
.NET
ArmorCode
Boozang
Chainguard
Cider
JFrog Connect
Java
Kondukto
Mend.io
OpsLevel
|
|||||
|
|
|