| Kiuwan Code SecurityKiuwan | Timesys VigilesTimesys Corporation | |||||
| Related Products
 | ||||||
| About
            Kiuwan is an end-to-end application security platform that integrates seamlessly into your development process. 
Our toolset includes Static Application Security Testing (SAST), Software Composition Analysis (SCA), Software Governance and Code Quality, empowering your team to quickly identify and remediate vulnerabilities.
Integrating into your CI/CD pipeline, Kiuwan enables early detection and remediation of security issues. Kiuwan supports strict compliance with industry standards including OWASP, CWE, MISRA, NIST, PCI DSS, and CERT, among others.
✅ Large language support: 30+ programming languages.
✅ Detailed action plans: Prioritize remediation with tailored action plans.
✅ Code Security: Seamless Static Application Security Testing (SAST) integration.
✅ Insights: On-demand or continuous scanning Software Composition Analysis (SCA) to help reduce third-party threats.
✅ One-click Software Bill of Materials (SBOM) generation
Code Smarter.  Secure Faster. Ship Sooner.
             | About
            The timesys vigiles vulnerability management suite is a best-in-class Software Composition Analysis (sca) and vulnerability management solution optimized for embedded systems built on top of the linux operating system. Vigiles will reveal your exposure for every product and software release, and provide clear engineering guidance on how to remediate vulnerabilities. Now your customers can receive software updates sooner and stay secure throughout the lifecycle. Automatically monitors thousands of reported vulnerabilities and provides unique targeted vulnerability detection for your specific product components, including alerts of new vulnerabilities, summaries of severities and status, and on-demand reports for your projects. Gives you all of the Free version’s vulnerability monitoring features along with powerful vulnerability analysis, triage, and collaboration tools, to enable your team to rapidly prioritize, assess and mitigate security issues.
             | |||||
| Platforms Supported
            
                Windows
            
            
         
            
                Mac
            
            
         
            
                Linux
            
            
         
            
                Cloud
            
            
         
            
                On-Premises
            
            
         
            
                iPhone
            
            
         
            
                iPad
            
            
         
            
                Android
            
            
         
            
                Chromebook
            
            
         | Platforms Supported
            
                Windows
            
            
         
            
                Mac
            
            
         
            
                Linux
            
            
         
            
                Cloud
            
            
         
            
                On-Premises
            
            
         
            
                iPhone
            
            
         
            
                iPad
            
            
         
            
                Android
            
            
         
            
                Chromebook
            
            
         | |||||
| Audience
        Financial institutions, Insurance Companies, Healthcare, Cyber Security, Investment Platforms, Transaction Services, ECommerce
         | Audience
        Businesses searching for a vulnerability management solution
         | |||||
| Support
            
                Phone Support
            
            
         
            
                24/7 Live Support
            
            
         
            
                Online
            
            
         | Support
            
                Phone Support
            
            
         
            
                24/7 Live Support
            
            
         
            
                Online
            
            
         | |||||
| API
            
                Offers API
            
            
         | API
            
                Offers API
            
            
         | |||||
| Screenshots and Videos | Screenshots and Videos | |||||
| Pricing
        No information available.
        
        
     
            
                Free Version
            
            
         
            
                Free Trial
            
            
         | Pricing
        No information available.
        
        
     
            
                Free Version
            
            
         
            
                Free Trial
            
            
         | |||||
| 
Reviews/ | 
Reviews/ | |||||
| Training
            
                Documentation
            
            
         
            
                Webinars
            
            
         
            
                Live Online
            
            
         
            
                In Person
            
            
         | Training
            
                Documentation
            
            
         
            
                Webinars
            
            
         
            
                Live Online
            
            
         
            
                In Person
            
            
         | |||||
| Company InformationKiuwan Founded: 2012 Spain www.kiuwan.com | Company InformationTimesys Corporation Founded: 1996 United States timesys.com/security/vigiles-vulnerability-management-patch-monitoring/ | |||||
| Alternatives | Alternatives | |||||
|  |  | |||||
|  | ||||||
| Categories | Categories | |||||
| IT Security Features
            
                Anti Spam
            
            
         
            
                Anti Virus
            
            
         
            
                Email Attachment Protection
            
            
         
            
                Event Tracking
            
            
         
            
                Internet Usage Monitoring
            
            
         
            
                Intrusion Detection System
            
            
         
            
                IP Protection
            
            
         
            
                Spyware Removal
            
            
         
            
                Two-Factor Authentication
            
            
         
            
                Vulnerability Scanning
            
            
         
            
                Web Threat Management
            
            
         
            
                Web Traffic Reporting
            
            
         Static Code Analysis Features
            
                Analytics / Reporting
            
            
         
            
                Code Standardization / Validation
            
            
         
            
                Multiple Programming Language Support
            
            
         
            
                Provides Recommendations
            
            
         
            
                Standard Security/Industry Libraries
            
            
         
            
                Vulnerability Management
            
            
         Vulnerability Scanners Features
            
                Asset Discovery
            
            
         
            
                Black Box Scanning
            
            
         
            
                Compliance Monitoring
            
            
         
            
                Continuous Monitoring
            
            
         
            
                Defect Tracking
            
            
         
            
                Interactive Scanning
            
            
         
            
                Logging and Reporting
            
            
         
            
                Network Mapping
            
            
         
            
                Perimeter Scanning
            
            
         
            
                Risk Analysis
            
            
         
            
                Threat Intelligence
            
            
         
            
                Web Inspection
            
            
         | ||||||
| Integrations
            
                
    Jira
            
            
         
            
                
    Bitbucket
            
            
         
            
                
    C#
            
            
         
            
                
    CLion
            
            
         
            
                
    Eclipse IDE
            
            
         
            
                
    GitLab
            
            
         
            
                
    Java
            
            
         
            
                
    Jira Work Management
            
            
         
            
                
    Microsoft Azure
            
            
         
            
                
    OWASP Threat Dragon
            
            
         | Integrations
            
                
    Jira
            
            
         
            
                
    Bitbucket
            
            
         
            
                
    C#
            
            
         
            
                
    CLion
            
            
         
            
                
    Eclipse IDE
            
            
         
            
                
    GitLab
            
            
         
            
                
    Java
            
            
         
            
                
    Jira Work Management
            
            
         
            
                
    Microsoft Azure
            
            
         
            
                
    OWASP Threat Dragon
            
            
         | |||||
|  |  | 
 
         
         
         
         
        