+
+

Related Products

  • Aikido Security
    106 Ratings
    Visit Website
  • Wiz
    1,059 Ratings
    Visit Website
  • Astra Pentest
    211 Ratings
    Visit Website
  • Reflectiz
    14 Ratings
    Visit Website
  • Carbide
    88 Ratings
    Visit Website
  • Chainguard
    42 Ratings
    Visit Website
  • ESET PROTECT Advanced
    2,109 Ratings
    Visit Website
  • Cloudflare
    1,826 Ratings
    Visit Website
  • ManageEngine Endpoint Central
    2,343 Ratings
    Visit Website
  • Google Cloud Platform
    60,418 Ratings
    Visit Website

About

Finite State manages risk across the software supply chain with comprehensive SCA and SBOMs for the connected world. By providing end-to-end SBOM solutions, Finite State enables Product Security teams to meet regulatory, customer, and security demands. Finite State's best-in-class binary SCA creates visibility into any-party software that enables Product Security teams to understand their risk in context and shift right on vulnerability detection. With visibility, scalability, and speed, Finite State correlates data from all of your security tools into a single pane of glass for maximum visibility.

About

Join us in our mission to democratize offensive security with tailored best-in-class solutions that address the unique needs of professionals and organizations. Evolve from the terminal to a specialized IDE for offensive security. Use Trickest’s library of tool nodes, import your own scripts, or drop in your favorite open-source tools all in one place. Choose from template workflows for common tasks and a growing list of 300+ open source tools the security community loves. Run your workflows in the cloud with easy autoscaling and cost controls. Skip manual infrastructure setup and stop paying for idle VPSs. No more digging through filesystems for your old runs, use Trickest’s spaces, projects, and workflow versioning to stay on top of even the most complex projects. Trickest is for anyone who interacts with offensive security: enterprise security teams, red teams, purple teams, specialized pen testers, bug bounty hunters, security researchers, educators, etc.

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Audience

Product Security, Embedded Systems, Device Security, Firmware Security, Software Development Security Teams

Audience

Large enterprises needing a solution to build and execute offensive security automation workflows

Support

Phone Support
24/7 Live Support
Online

Support

Phone Support
24/7 Live Support
Online

API

Offers API

API

Offers API

Screenshots and Videos

Screenshots and Videos

Pricing

No information available.
Free Version
Free Trial

Pricing

No information available.
Free Version
Free Trial

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Training

Documentation
Webinars
Live Online
In Person

Training

Documentation
Webinars
Live Online
In Person

Company Information

Finite State
Founded: 2017
United States
finitestate.io/products/finite-state-platform/

Company Information

Trickest
United States
trickest.com

Alternatives

Alternatives

Tenable One

Tenable One

Tenable
Darwin Attack

Darwin Attack

Evolve Security
Acunetix

Acunetix

Invicti Security
Quantum Armor

Quantum Armor

Silent Breach
Invicti

Invicti

Invicti Security

Categories

Categories

Vulnerability Scanners Features

Asset Discovery
Black Box Scanning
Compliance Monitoring
Continuous Monitoring
Defect Tracking
Interactive Scanning
Logging and Reporting
Network Mapping
Perimeter Scanning
Risk Analysis
Threat Intelligence
Web Inspection

Application Security Features

Analytics / Reporting
Open Source Component Monitoring
Source Code Analysis
Third-Party Tools Integration
Training Resources
Vulnerability Detection
Vulnerability Remediation

Static Application Security Testing (SAST) Features

Application Security
Dashboard
Debugging
Deployment Management
IDE
Multi-Language Scanning
Real-Time Analytics
Source Code Scanning
Vulnerability Scanning

Vulnerability Management Features

Asset Discovery
Asset Tagging
Network Scanning
Patch Management
Policy Management
Prioritization
Risk Management
Vulnerability Assessment
Web Scanning

Integrations

Bash
Cisco Identity Services Engine (ISE)
CycloneDX
Python

Integrations

Bash
Cisco Identity Services Engine (ISE)
CycloneDX
Python
Claim Finite State and update features and information
Claim Finite State and update features and information
Claim Trickest and update features and information
Claim Trickest and update features and information