DefectDojo

DefectDojo

10Security
+
+

Related Products

  • Wiz
    1,052 Ratings
    Visit Website
  • Astra Pentest
    169 Ratings
    Visit Website
  • Aikido Security
    72 Ratings
    Visit Website
  • Heimdal Endpoint Detection and Response (EDR)
    54 Ratings
    Visit Website
  • ESET PROTECT Advanced
    2,052 Ratings
    Visit Website
  • NinjaOne
    3,047 Ratings
    Visit Website
  • DriveStrike
    23 Ratings
    Visit Website
  • GitLab
    2,507 Ratings
    Visit Website
  • qTest
    Visit Website
  • Resolver
    257 Ratings
    Visit Website

About

Take DefectDojo for a spin and review the demo of DefectDojo and login with sample credentials. DefectDojo is available on Github and has a setup script for easy installation. A docker container with a pre-built version of DefectDojo is available. Know exactly when new vulnerabilities are introduced in a build or remediated. Tracking when a product is assessed is easily accomplished using DefectDojo's API to track security tests that are run on each build. DefectDojo has the ability to track the build-id, commit hash, branch or tag, orchestration server, source code repo, and build server for every on-demand security test. Various reports are available for tests, engagements, and products. Products can be grouped into critical products to track products that are critical to your organization. Similar findings can be easily merged into one finding to provide developers one finding instead of multiple findings.

About

Comprehensive Vulnerability Assessment Scan For Network Security. Vulnerability scans and network scans find top cybersecurity risks such as misconfigured firewalls, malware hazards, remote access vulnerabilities, and can be used for cyber security or compliance mandates like PCI Compliance (PCI DSS) and HIPAA. Add and remove your own targets through your Perimeter Scan Portal. You can mass upload scan targets and groups. You can group and label scan targets to make it easier to manage by location, network type, or unique circumstances at your organization. Run port scans on your most sensitive targets more frequently, test in scope PCI targets quarterly, or test designated IPs after changes to your network with simplicity. Vulnerability scanning reports list the target, vulnerability type, service (e.g., https, MySQL, etc.), and the severity of each vulnerability (low, medium, high).

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Audience

Developers and companies requiring an application vulnerability management solution

Audience

Ecommerce, payments, e-commerce, merchant, PCI compliance, HIPAA compliance, HIPAA, PCI

Support

Phone Support
24/7 Live Support
Online

Support

Phone Support
24/7 Live Support
Online

API

Offers API

API

Offers API

Screenshots and Videos

Screenshots and Videos

Pricing

No information available.
Free Version
Free Trial

Pricing

$99.00/one-time
Free Version
Free Trial

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Training

Documentation
Webinars
Live Online
In Person

Training

Documentation
Webinars
Live Online
In Person

Company Information

10Security
United States
www.defectdojo.org

Company Information

SecurityMetrics
Founded: 2000
United States
www.securitymetrics.com/vulnerability-scan

Alternatives

Alternatives

VulScan

VulScan

RapidFire Tools, a Kaseya Company
Hexway ASOC

Hexway ASOC

Hexway
OpenVAS

OpenVAS

Greenbone Networks
Acunetix

Acunetix

Invicti Security
Greenbone Enterprise

Greenbone Enterprise

Greenbone Networks

Categories

Categories

Vulnerability Management Features

Asset Discovery
Asset Tagging
Network Scanning
Patch Management
Policy Management
Prioritization
Risk Management
Vulnerability Assessment
Web Scanning

Integrations

Crashtest Security
CycloneDX
Deepinfo
Probely
SecurityMetrics
Semgrep
Trivy
Workfolio Website

Integrations

Crashtest Security
CycloneDX
Deepinfo
Probely
SecurityMetrics
Semgrep
Trivy
Workfolio Website
Claim DefectDojo and update features and information
Claim DefectDojo and update features and information
Claim SecurityMetrics Perimeter Scan and update features and information
Claim SecurityMetrics Perimeter Scan and update features and information