+
+

Related Products

  • Aikido Security
    106 Ratings
    Visit Website
  • Wiz
    1,059 Ratings
    Visit Website
  • Orca Security
    407 Ratings
    Visit Website
  • Jscrambler
    32 Ratings
    Visit Website
  • SOCRadar Extended Threat Intelligence
    67 Ratings
    Visit Website
  • Chainguard
    42 Ratings
    Visit Website
  • ManageEngine Endpoint Central
    2,343 Ratings
    Visit Website
  • Global App Testing
    59 Ratings
    Visit Website
  • PowerDMARC
    215 Ratings
    Visit Website
  • Safetica
    375 Ratings
    Visit Website

About

Legit Security protects software supply chains from attack by automatically discovering and securing the pipelines, infrastructure, code and people so that businesses can stay safe while releasing software fast. Automatically discover security issues, remediate threats and ensure the integrity and compliance of software releases. Comprehensive, visual SDLC inventory that's continually updated. Reveal unknown, misconfigured and vulnerable SDLC systems and infrastructure. Centralized visibility over location, coverage and configuration of your existing security tools and scanners. Catch insecure build actions before they can embed vulnerabilities downstream. Centralized, early prevention of sensitive data leaks, secrets and PII, before being pushed into the SDLC. Track security trends across teams and product lines to improve security posture and incentivize behavior. Get security posture at-a-glance with Legit Security Scores, Integrate your own alert and ticketing tools or use ours.

About

Easy, one-click security scans for cloud & SaaS apps. Secure your tools by catching issues like file leaks, misconfigurations, suspicious activity, and more. Connect your tools and get instant insight into how internal files and other sensitive information has been shared, accessed, and configured across your apps. Manage user permissions and enforce security best practices in just a few clicks with a convenient dashboard detailing user access. Prevent security incidents before they happen by easily detecting risky settings and misconfigurations that could lead to compromise. When you don't know who has access to what across your SaaS tools, you run the risk of inappropriate user access leading to something worse. Vectrix scans make it ridiculously easy to review user access and permissions, manage onboardings and offboardings, export user access reports, and much more.

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Audience

Enterprise SaaS security solution that protects an organization's software supply chain from attacks

Audience

Application Security solution for teams of all sizes

Support

Phone Support
24/7 Live Support
Online

Support

Phone Support
24/7 Live Support
Online

API

Offers API

API

Offers API

Screenshots and Videos

Screenshots and Videos

Pricing

No information available.
Free Version
Free Trial

Pricing

No information available.
Free Version
Free Trial

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Training

Documentation
Webinars
Live Online
In Person

Training

Documentation
Webinars
Live Online
In Person

Company Information

Legit Security
Founded: 2020
United States
www.legitsecurity.com

Company Information

Vectrix
Founded: 2020
United States
www.vectrix.io

Alternatives

Alternatives

Xygeni

Xygeni

Xygeni Security
Feroot

Feroot

Feroot Security
Quest ControlPoint

Quest ControlPoint

Quest Software

Categories

Categories

Application Security Features

Analytics / Reporting
Open Source Component Monitoring
Source Code Analysis
Third-Party Tools Integration
Training Resources
Vulnerability Detection
Vulnerability Remediation

Integrations

GitHub
Amazon Web Services (AWS)
Avalor
Bitbucket
Chainguard
Cloudflare
Dropbox
GitLab
Google Cloud Platform
Google Workspace
JFrog Artifactory
Jenkins
Microsoft 365
Okta
Qwiet AI
Salesforce
Snyk
Terraform
Veracode
Zoom

Integrations

GitHub
Amazon Web Services (AWS)
Avalor
Bitbucket
Chainguard
Cloudflare
Dropbox
GitLab
Google Cloud Platform
Google Workspace
JFrog Artifactory
Jenkins
Microsoft 365
Okta
Qwiet AI
Salesforce
Snyk
Terraform
Veracode
Zoom
Claim Legit Security and update features and information
Claim Legit Security and update features and information
Claim Vectrix and update features and information
Claim Vectrix and update features and information