Best IT Security Software for Jira - Page 9

Compare the Top IT Security Software that integrates with Jira as of October 2025 - Page 9

This a list of IT Security software that integrates with Jira. Use the filters on the left to add additional filters for products that have integrations with Jira. View the products that work with Jira in the table below.

  • 1
    Syhunt Hybrid
    Syhunt dynamically injects data in web applications and analyzes the application response to determine if the application code is vulnerable, automating the web application security testing and proactively guarding your organization's Web infrastructure against several kinds of web application security threats. Syhunt Hybrid follows simple GUI standards, prioritizing ease of use and automation and thus requiring minimal to no user intervention before or during scans despite a large number of customization options. Compare past scan sessions to determine new, unchanged or removed vulnerabilities. Generate a comparison report that displays the evolution of vulnerabilities over time by automatically comparing previous scan session data related to a specific target.
  • 2
    Sweet

    Sweet

    Sweet

    We use pivotal runtime insights to cut through cloud security's noise and focus on the risks that matter. In the real world, attackers are opportunistically paving their way through your cloud infrastructure while runtime risks are on the rise. Get your “boots on the cloud” with Sweet’s patent-pending, eBPF-based sensor to establish your organizational baseline for what’s normal. Receive critical runtime insights that augment operations across the entire cloud security stack. Sweet’s dynamic profiling finds runtime anomalies, allowing you to address live cloud risks. eBPF-based sensor serves deep, real-time insights, without performance or cost drawbacks. Find zero-day cloud attacks in real-time, get actionable attack stories, and minimal noise. Sweet’s approach elevates the ability of security teams to shut down cloud attacks when they occur, where they occur, with maximum precision and minimal business disruption.
  • 3
    BlueFlag Security

    BlueFlag Security

    BlueFlag Security

    BlueFlag Security provides multi-layer defense, protecting developer identities and their tools throughout the software development lifecycle (SDLC). Don't let uncontrolled developer and machine identities become the Achilles' heel of your software supply chain. Weaknesses in these identities create a backdoor for attackers. BlueFlag seamlessly integrates identity security across the SDLC safeguarding your code, tools, and infrastructure. BlueFlag automates the rightsizing of permissions for developer and machine identities, enforcing the principle of least privilege throughout the dev environment. BlueFlag enforces strong identity hygiene by deactivating off-boarded users, managing personal access tokens, and restricting direct access to developer tools and repositories. BlueFlag's ensures early detection and prevention of insider threats and unauthorized privileged escalation by continuously monitoring behavior patterns across the CI/CD.
  • 4
    SandboxAQ

    SandboxAQ

    SandboxAQ

    The emergence of large, fault-tolerant quantum computers poses a significant threat to current public-key cryptography, leaving sensitive data and systems vulnerable to attacks. SandboxAQ was selected by the NIST's National Cybersecurity Center of Excellence for its Migration to Post-Quantum Cryptography project, which partners with industry to help the government develop best practices to transition from current public-key cryptography to post-quantum cryptography algorithms. Easily adhere to new cryptographic requirements and switch between them without requiring additional development or maintenance. Application Analyzer detects and records all calls to cryptographic libraries made by an application at run time, identifying vulnerabilities and policy breaches.
  • 5
    StrikeReady

    StrikeReady

    StrikeReady

    StrikeReady delivers the industry's first unified, vendor-agnostic, AI-powered security command center, purpose-built to optimize, centralize, and accelerate a company’s threat response. StrikeReady’s platform levels the entire security team by centralizing, analyzing, and operationalizing security data across a company’s entire security tech stack. StrikeReady empowers smarter, faster decision-making with actionable insights by providing security teams with real-time, holistic, end-to-end visibility across an ever-changing security ecosystem. This transforms SOC teams into proactive defense teams by allowing them to stay ahead of constantly evolving threats. StrikeReady delivers a revolutionary, AI-powered security command center that is changing the way SOC teams work and defend. The platform is the first to be truly vendor-neutral and seamless, providing a unified, end-to-end view of your entire security operation.
  • 6
    Vorlon

    Vorlon

    Vorlon

    Continuous near real-time detection and identification of your data in motion between third-party apps with remediation capabilities. By not continuously monitoring third-party APIs, you inadvertently grant attackers an average of seven months to act before you detect and remediate an issue. Vorlon continuously monitors your third-party applications and detects abnormal behavior in near real-time, processing your data every hour. Understand your risks in the third-party apps your Enterprise uses with clear insights and recommendations. Report progress to your stakeholders and board with confidence. Gain visibility into your third-party apps. Detect, investigate, and respond to abnormal third-party app activity, data breaches, and security incidents in near real-time. Determine whether the third-party apps your Enterprise uses are compliant with regulations. Provide proof of compliance to stakeholders with confidence.
  • 7
    Bizzy

    Bizzy

    Cyberwise

    Detecting potential vulnerabilities, aggregating, enriching, and prioritizing them, and taking rapid action is critical in today's world to enhance our resilience against cyber threats. This capability should also be continuous. Bizzy platform reinforces cyber security resilience through prioritization, automation, Big Data analytics, machine learning, and vulnerability management capabilities, enabling continuous, rapid, and precise actions. Today, in order to increase our resilience against cyber attacks, we are able to be informed quickly about the vulnerabilities, bringing them together, It is important that we have the ability to relate and take quick action. carries. This ability should also carry continuity. Bizzy platform with prioritization, automation, and Big Data analysis is continuous, fast, and accurate actionable vulnerability management features It contributes to increasing the security resilience.
  • 8
    Seconize DeRisk Center
    Businesses are prone to increased attacks as the security teams are buried under tons of assessment reports and lack tools to manage the vulnerabilities that are key to their business. For companies ranging from SMBs, and start-ups to enterprises, Seconize makes discovering, identifying, prioritizing, and mitigating cyber risks and vulnerabilities easier. Identify potential losses as a result of cyber threats. Helps to evaluate the defenses constantly and mitigate the evolving threats. Factors multiple business facets to make it relevant to the organization. Compliance reports against standards like ISO 27001, NIST-CSF, PCI-DSS, RBI/SEBI/IRDAI guidelines. Loved by businesses, and individuals across the globe. Creating products that combine simplicity, flexibility, and security. Organizations of all types and sizes, from small businesses to very large enterprises are relying on Seconize to manage their risks and improve security posture.
  • 9
    Aftra

    Aftra

    Aftra

    Gain valuable insights, protect sensitive data, and strengthen your defenses with our automated scanning, monitoring, and continuous vulnerability detection. Aftra provides the insight; you steer the course. Safeguard your reputation, trust, and assets. Aftra illuminates what needs protection. Aftra is your ally in the fight against cyber threats. Proactive, insightful, and empowering. Aftra empowers you with insights and tools to secure your digital assets, so you can make informed decisions and bolster your defenses with confidence. Aftra offers a comprehensive view of both internal and external digital assets, providing invaluable insights for making informed security decisions. Aftra identifies both known and unknown domains and accounts associated with your organization. Aftra actively suggests domains and accounts that may belong to your organization. Aftra reveals the services and accounts used by your company and identifies employee digital footprints on third-party platforms.
  • 10
    SecureFlag

    SecureFlag

    SecureFlag

    SecureFlag’s hands-on training in real development environments offers a tailored approach to enterprise training needs. 45+ technologies supported and over 150 vulnerability types covered. Each comprises a fully configured development environment. With more than 70% of vulnerabilities introduced during development, writing secure software is more critical than ever. SecureFlag has revolutionized the approach to secure coding training. With SecureFlag’s hands-on labs, participants learn in virtualized environments using the tools they know and love. SecureFlag’s Labs teaches participants how to identify and remediate the most prevalent security issues by doing instead of simply just seeing. Labs run in real, virtualized development environments, and participants learn using the same tools they use at work. Engage with your organization’s developer community and promote learning through enjoyable competition.
  • 11
    Aembit

    Aembit

    Aembit

    Replace manual and insecure access to non-human identities with our automated and secretless Workload IAM platform. Manage your workload-to-workload access like you do your users: with automated, policy-based and identity-driven controls, so you can proactively eliminate the risk of non-human identities. Aembit boosts security by cryptographically verifying workload identities, in real time, ensuring that only trusted workloads have access to your sensitive data. Aembit injects short-lived credentials into requests just-in-time so you never have to store or protect secrets. Dynamically enforce access rights based on real-time evaluations of workload security posture, geography and other key behavioral characteristics. Aembit secures access amongst workloads in the cloud on-prem and in SaaS.
  • 12
    Apono

    Apono

    Apono

    Use the Apono cloud-native access governance platform to work faster and more securely with self-service, secure, scalable access built for modern enterprises running in the cloud. Discover who has access to what with context. Identify access risk leveraging enriched identity and cloud resource context from the environment. Enforce access guardrails at scale. Apono automatically suggests dynamic policies that fit your business needs, streamlining the cloud access lifecycle and gaining control of cloud-privileged access. Improve your environment access controls with Apono’s AI, which detects high-risk unused, over provisioned and shadow access. Remove standing access and prevent lateral movement in your cloud environment. Organizations can enforce strict authentication, authorization, and audit controls for these high-level accounts, reducing the risk of insider threats, data breaches, and unauthorized access.
  • 13
    RAD Security

    RAD Security

    RAD Security

    RAD Security automates threat investigations, cuts through security noise, and helps teams secure smarter and defend faster. Powered by AI-driven digital workers, RAD Security is on a mission to make security make sense. RAD's holistic security platform goes beyond static alerts to correlate signals, prioritize threats, and deliver accurate, actionable insights. From continuous cloud monitoring to automated compliance readiness, RAD enables lean security teams to operate at enterprise scale. With RAD, security teams spend less time chasing false positives and more time solving real security issues. See RAD in action at radsecurity.ai.
  • 14
    Veriti

    Veriti

    Veriti

    Veriti AI-driven platform proactively monitors and safely remediates exposures across the entire security stack, without disrupting the business, from the OS-Level and up. With complete visibility, you can swiftly neutralize threats before they happen. Veriti consolidates all configurations to establish your security baseline, then correlates telemetries, CAASM, BAS and vulnerability management tools, security logs, and intelligence feeds to pinpoint the misconfigurations that are leading to exposures. Automated non-intrusive assessment of all security configurations. Get direct visibility into your risk posture and all remediation paths available including compensating controls, IoCs, and patches. Now your team can make confident security decisions. Remediation is best applied before exposures are exploited. Leveraging proprietary machine learning, Veriti predicts the ripple effects of any given remediation action, assessing potential impacts.
  • 15
    MINDely
    MIND is the first-ever data security platform that puts data loss prevention (DLP) and insider risk management (IRM) programs on autopilot, so you can automatically identify, detect, and prevent data leaks at machine speed. Continuously find your sensitive data in files spread across your IT environments whether at rest, in motion, or in use. MIND continuously exposes blindspots of sensitive data across your IT environments including SaaS, AI apps, endpoints, on-premise file shares, and emails. MIND monitors and analyzes billions of data security events in real time, enriches each incident with context, and remediates autonomously. MIND automatically blocks sensitive data in real-time from escaping your control, or collaborates with users to remediate risks and educate on your policies. MIND continuously exposes blindspots of sensitive data at rest, in motion, and in use by integrating with data sources across your IT workloads, e.g. SaaS, AI apps, on-premises, endpoints, and emails.
  • 16
    Noma

    Noma

    Noma

    From development to production and from classic data engineering to AI. Secure the development environments, pipelines, tools, and open source components that make up your data and AI supply chain. Continuously discover, prevent, and fix AI security and compliance risks before they make their way to production. Monitor your AI applications in runtime, detect and block adversarial AI attacks, and enforce app-specific guardrails. Noma seamlessly embeds across your data and AI supply chain and AI applications, mapping all your data pipelines, notebooks, MLOps tools, open-source AI components, first- and third-party models, and datasets, automatically generating a comprehensive AI/ML-BOM. Noma continuously identifies and provides actionable remediations for security risks such as misconfigurations, AI vulnerabilities, and against-policy training data usage throughout your data and AI supply chain, enabling you to proactively improve your AI security posture.
  • 17
    Secfix

    Secfix

    Secfix

    Secfix has been leading the security compliance market, helping hundreds of small and medium-sized businesses and startups achieve ISO 27001, TISAX, GDPR, and SOC 2 compliance with a 100% audit success rate. Our mission is to simplify security compliance for SMBs and startups across Europe. Secfix was born from a clear realization - Small and medium-sized businesses were struggling with outdated, costly, and inefficient methods of achieving security compliance. By combining automation with hands-on expertise, Secfix empowers SMBs and startups to achieve ISO 27001, TISAX, NIS 2, SOC 2, and GDPR compliance faster and easier. Secfix is powered by a growing, diverse team of experts committed to helping SMBs achieve compliance.
  • 18
    Symops

    Symops

    Symops

    Sym is a developer-friendly platform that enables organizations to implement just-in-time access controls, enhancing security without hindering operational efficiency. By automating the provisioning and revocation of temporary access to production environments, Sym reduces the risks associated with over-provisioned credentials. Its low-code software development kit allows teams to build custom authorization workflows, integrating seamlessly with tools like Slack for streamlined approval processes. Sym's centralized governance ensures that all access requests and approvals are logged, facilitating compliance with standards such as SOC 2. The platform's integrations with services like AWS Identity Center and Datadog further enhance its capability to manage access across various infrastructures. By leveraging Sym, organizations can empower their teams to move quickly while maintaining robust security measures.
  • 19
    Unifonic

    Unifonic

    Unifonic

    Unifonic is an AI-driven platform that enables personalized omnichannel customer engagement. It offers a range of communication channels, including SMS, WhatsApp, Messenger, push notifications, and voice, allowing businesses to connect with customers through their preferred mediums. The platform supports over 100 native integrations with tools like Salesforce, HubSpot, and Shopify, facilitating seamless workflow automation. Unifonic's Flow Studio provides pre-built templates for common use cases such as abandoned cart reminders, OTPs, and chatbot automation, simplifying the implementation of automated workflows. The platform is designed to enhance marketing efforts, streamline IT and operations with low-code development tools, and improve customer support by offering 24/7 AI-powered assistance. Unifonic has a global reach, with 95% coverage, over 25 billion messages sent, and more than 5,000 customers.
  • 20
    Archipelo

    Archipelo

    Archipelo

    Archipelo is a developer security posture management platform that helps organizations safeguard their software development lifecycle (SDLC) by providing real-time insights into developer activities, AI code tool usage, and tool governance. It features Developer Detection Response (DevDR) for proactively identifying and mitigating security risks, Automated Tool Governance to prevent shadow IT, and an AI Code Usage & Risk Monitor to ensure secure coding practices. With seamless integration into CI/CD workflows, Archipelo captures developer actions and provides actionable insights to enhance security, mitigate risks, and ensure compliance throughout the software development process.
  • 21
    Akitra Andromeda
    ​Akitra Andromeda is a next-generation, AI-enabled compliance automation platform designed to streamline and simplify regulatory adherence for businesses of all sizes. It supports a wide range of compliance frameworks, including SOC 2, ISO 27001, HIPAA, PCI DSS, SOC 1, GDPR, NIST 800-53, and custom frameworks, enabling organizations to achieve continuous compliance efficiently. The platform offers over 240 integrations with major cloud platforms and SaaS services, facilitating seamless incorporation into existing workflows. Akitra's automation capabilities reduce the time and cost associated with manual compliance management by automating monitoring and evidence-gathering processes. The platform provides a comprehensive template library for policies and controls, assisting organizations in establishing a complete compliance program. Continuous monitoring ensures that assets remain secure and compliant around the clock.
  • 22
    Exaforce

    Exaforce

    Exaforce

    ​Exaforce is a SOC platform that enhances the productivity and efficacy of security operations center teams by 10x through the integration of AI bots and advanced data exploration. It utilizes a semantic data model to ingest and deeply analyze large-scale logs, configurations, code, and threat feeds, facilitating better reasoning by humans and large language models. By combining this semantic model with behavioral and knowledge models, Exaforce autonomously triages alerts with the skill and consistency of an expert analyst, reducing the time from alert to decision to minutes. Exabots automate tedious workflows such as confirming actions with users and managers, investigating historical tickets, and correlating against change management systems like Jira and ServiceNow, thereby freeing up analyst time and reducing fatigue. Exaforce offers advanced detection and response solutions for critical cloud services.
  • 23
    Sola Security

    Sola Security

    Sola Security

    Sola Security is an AI-first security studio that empowers users to build tailored cybersecurity applications in minutes through a no-code, AI-driven interface. You simply pose a security question, like identifying misconfigured S3 buckets or compromised user accounts, and Sola AI instantly generates a working app complete with data queries, dashboards, alerts, and visual summaries, all adaptable to your existing infrastructure. It offers ready-made templates for common use cases across AWS, GitHub, Google Workspace, Okta, MongoDB, Wiz, and more, which users can customize further or use as-is. Sola bridges across diverse tech stacks with deep integrations, from cloud platforms and identity providers to CRM and monitoring tools, so you can synthesize cross-domain insights quickly. Built by infosec experts, Sola is secure by design, featuring SOC 2 and ISO 27001 certification, active security oversight, and strict data privacy principles.
  • 24
    HackerOne

    HackerOne

    HackerOne

    HackerOne empowers the world to build a safer internet. As the world’s most trusted hacker-powered security platform, HackerOne gives organizations access to the largest community of hackers on the planet. Armed with the most robust database of vulnerability trends and industry benchmarks, the hacker community mitigates cyber risk by searching, finding, and safely reporting real-world security weaknesses for organizations across all industries and attack surfaces. Customers include The U.S. Department of Defense, Dropbox, General Motors, GitHub, Goldman Sachs, Google, Hyatt, Intel, Lufthansa, Microsoft, MINDEF Singapore, Nintendo, PayPal, Qualcomm, Slack, Starbucks, Twitter, and Verizon Media. HackerOne was ranked fifth on the Fast Company World’s Most Innovative Companies list for 2020. Headquartered in San Francisco, HackerOne has a presence in London, New York, the Netherlands, France, Singapore, and over 70 other locations across the globe.
  • 25
    Intruder

    Intruder

    Intruder

    Intruder is an international cyber security company that helps organisations reduce their cyber exposure by providing an effortless vulnerability scanning solution. Intruder’s cloud-based vulnerability scanner discovers security weaknesses across your digital estate. Offering industry-leading security checks, continuous monitoring and an easy-to-use platform, Intruder keeps businesses of all sizes safe from hackers. Receive actionable results prioritised by context. Intruder interprets raw data received from leading scanning engines, so you can focus on the issues which truly matter, such as exposed databases.‍ Intruder's high-quality reports help you sail through customer security questionnaires, and make compliance audits like SOC2, ISO27001, and Cyber Essentials a breeze.
  • 26
    Cyberint Argos Platform
    Cyberint is a global threat intelligence provider focusing on helping its clients to proactively protect their businesses against cyber threats coming from beyond the traditional security perimeters. Manage exposure, prioritize threats, and reduce cyber risk with Argos, Cyberint’s Impactful Intelligence platform. Protect your organization from an array of external cyber risks with a single comprehensive solution. Continuously uncover known and unknown vulnerabilities and weaknesses. From exposed web Interfaces and cloud Storage exposure to email security issues and open ports, Argos’ autonomous discovery maps out your external exposures and prioritize for impactful remediation. Cyberint serves leading brands worldwide including Fortune 500 companies across industries such as finance, retail, ecommerce, gaming, media, and more.
  • 27
    Devknox

    Devknox

    XYSEC Labs

    Get your code checked for security flaws as you write it, in realtime. Devknox understands the context of your code and suggests one-click fixes. Devknox takes care of security requirements and keeps them up to date with global security standards. How your app fares across 30 test cases with the Devknox Plugin on the IDE. Ensuring the app you are building, meets industry compliance standards like OWASP Top 10, HIPAA and PCI-DSS. Details of commonly exploited vulnerabilities, quick fixes and alternate suggestions on how to fix them. Devknox is a developer friendly Android Studio plugin that helps Android developers detect and resolve security issues in their apps, while writing code. Imagine Devknox to similar to what autocorrect is for English. As you write code, Devknox highlights possible security risks and also gives you a suggested solution which you can select and replace across your code.
  • 28
    Cutover

    Cutover

    Cutover

    The Cutover platform enables enterprises to simplify complexity, streamline work, and increase visibility. Cutover’s AI-powered automated runbooks connect teams, technology, and systems, increasing efficiency and reducing risk in IT disaster and cyber recovery, cloud migration, release management, and technology implementation. As a centralized system of execution, Cutover differentiates itself with scalable and proven dynamic, automated runbook technology that transforms enterprise IT operations with a new way of working. Cutover enables the creation of a template library of comprehensive, executable, and auditable runbooks covering the entire IT infrastructure. Cutover is trusted by world-leading institutions, including the three largest US banks and three of the world’s five largest investment banks.
  • 29
    Cobalt

    Cobalt

    Cobalt

    Cobalt is a Pentest as a Service (PTaaS) platform that simplifies security and compliance needs of DevOps-driven teams with workflow integrations and high-quality talent on-demand. Thousands of customers simplify security and compliance with Cobalt. Every year, customers are doubling the amount of pentests they conduct with Cobalt. Onboard pentesters quickly using Slack. Test periodically to drive continuous improvement and ensure full asset coverage and meet PCI, HIPAA, SOC-2, ISO 27001, GDPR, and more. Get your pentest up and running within 24 hours. Directly integrate pentest findings into your SDLC, and collaborate with our pentesters (in-app or on Slack) to speed up triage, remediation, and retesting efforts. Tap into a diverse global community of rigorously vetted pentesters. Match up with a team that has the expertise and skills to match your tech stack. Talent matching from our highly skilled pentester pool guarantees quality findings.
  • 30
    Thoropass

    Thoropass

    Thoropass

    An audit without aggravation? Compliance without crisis? Yep, that’s what we’re talking about. SOC 2, ISO 27001, HITRUST, PCI DSS, and all of your favorite information security frameworks now worry-free. Whether you need last-minute compliance to close a deal, or multiple frameworks to expand into new markets, we can solve all of your challenges on a single platform. If you’re new to compliance or rebooting old processes, we can get you started quickly. Free your team from time-consuming evidence collection so that they can focus on strategy and innovation. Complete your audit end-to-end on Thororpass, without gaps or surprises. Our in-house auditors can provide you with the just-in-time support you need and use our platform to expand that into future-proof strategies for years to come.