+
+

Related Products

  • Heimdal Endpoint Detection and Response (EDR)
    54 Ratings
    Visit Website
  • Aikido Security
    71 Ratings
    Visit Website
  • ESET PROTECT Advanced
    2,051 Ratings
    Visit Website
  • Criminal IP
    12 Ratings
    Visit Website
  • Safetica
    358 Ratings
    Visit Website
  • SpamTitan
    813 Ratings
    Visit Website
  • NeoLoad
    369 Ratings
    Visit Website
  • ManageEngine EventLog Analyzer
    159 Ratings
    Visit Website
  • IPVanish
    111 Ratings
    Visit Website
  • Fraud.net
    56 Ratings
    Visit Website

About

Our proprietary protection capabilities shield apps from reverse engineering, tampering, API exploits, and other attacks that can put your business, your customers, and your bottom line at risk. Obfuscates source code, inserts honeypots, and implements other deceptive code patterns to deter and confuse threat actors. Triggers defensive measures automatically if suspicious activity is detected, including app shutdown, user sandbox, or code self-repair. Injects essential app code protections and threat detection sensors into CI/CD cycle after code development, without disrupting the DevOps process. Encrypts static or dynamic keys and data embedded or contained within app code. Protects sensitive data at rest within an app or in transit between the app and server. Supports all major cryptographic algorithms and modes with FIPS 140-2 certification.

About

Phylum defends applications at the perimeter of the open-source ecosystem and the tools used to build software. Its automated analysis engine scans third-party code as soon as it’s published into the open-source ecosystem to vet software packages, identify risks, inform users and block attacks. Think of Phylum like a firewall for open-source code. Phylum’s database of open-source software supply chain risks is the most comprehensive and scalable offering available, and can be deployed throughout the development lifecycle depending on an organization’s infrastructure and appsec program maturity: in front of artifact repository managers, directly with package managers or in CI/CD pipelines. The Phylum policy library allows users to toggle on the blocking of critical vulnerabilities, attacks like typosquats, obfuscated code and dependency confusion, copyleft licenses, and more. Users can also leverage OPA to create custom policies.

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Audience

DevOps teams

Audience

Companies who are looking to secure the use open-source software, and address software supply chain risks associated with malicious software packages and zero-day vulnerabilities

Support

Phone Support
24/7 Live Support
Online

Support

Phone Support
24/7 Live Support
Online

API

Offers API

API

Offers API

Screenshots and Videos

Screenshots and Videos

Pricing

No information available.
Free Version
Free Trial

Pricing

No information available.
Free Version
Free Trial

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Training

Documentation
Webinars
Live Online
In Person

Training

Documentation
Webinars
Live Online
In Person

Company Information

Digital.ai
United States
digital.ai/application-protection

Company Information

Phylum
Founded: 2020
United States
phylum.io

Alternatives

ThreatCast

ThreatCast

Guardsquare

Alternatives

Xygeni

Xygeni

Xygeni Security
EndCrypt

EndCrypt

Procenne
Revenera SCA

Revenera SCA

Revenera
QShield

QShield

Quarkslab
Zimperium MAPS

Zimperium MAPS

Zimperium

Categories

Categories

Application Security Features

Analytics / Reporting
Open Source Component Monitoring
Source Code Analysis
Third-Party Tools Integration
Training Resources
Vulnerability Detection
Vulnerability Remediation

DevOps Features

Approval Workflow
Dashboard
KPIs
Policy Management
Portfolio Management
Prioritization
Release Management
Timeline Management
Troubleshooting Reports

Integrations

Apache Maven
Azure DevOps Server
BMC AMI Ops Automation for Capping
BMC Helix Cloud Cost
BMC Middleware Management
Bitbucket
Cargo
GitHub
Go
JFrog Artifactory
JavaScript
NuGet
Planview Viz
Python
Ruby
Rust
SD Elements
Sonatype Nexus Repository
Sonatype Nexus Repository Community Edition
TypeScript

Integrations

Apache Maven
Azure DevOps Server
BMC AMI Ops Automation for Capping
BMC Helix Cloud Cost
BMC Middleware Management
Bitbucket
Cargo
GitHub
Go
JFrog Artifactory
JavaScript
NuGet
Planview Viz
Python
Ruby
Rust
SD Elements
Sonatype Nexus Repository
Sonatype Nexus Repository Community Edition
TypeScript
Claim Digital.ai Application Protection and update features and information
Claim Digital.ai Application Protection and update features and information
Claim Phylum and update features and information
Claim Phylum and update features and information