Best IT Security Software for PHP - Page 2

Compare the Top IT Security Software that integrates with PHP as of October 2025 - Page 2

This a list of IT Security software that integrates with PHP. Use the filters on the left to add additional filters for products that have integrations with PHP. View the products that work with PHP in the table below.

  • 1
    JFrog

    JFrog

    JFrog

    Fully automated DevOps platform for distributing trusted software releases from code to production. Onboard DevOps projects with users, resources and permissions for faster deployment frequency. Fearlessly update with proactive identification of open source vulnerabilities and license compliance violations. Achieve zero downtime across your DevOps pipeline with High Availability and active/active clustering for your enterprise. Control your DevOps environment with out-of-the-box native and ecosystem integrations. Enterprise ready with choice of on-prem, cloud, multi-cloud or hybrid deployments that scale as you grow. Ensure speed, reliability and security of IoT software updates and device management at scale. Create new DevOps projects in minutes and easily onboard team members, resources and storage quotas to get coding faster.
    Starting Price: $98 per month
  • 2
    PHP Secure

    PHP Secure

    PHP Secure

    PHP Secure is a FREE code scanner that analyzes your PHP code for critical security vulnerabilities. Free online scanner: - Quickly and qualitatively finds web app vulnerabilities - Gives explicit reports and recommendations to fix vulnerabilities - Easy to use and requires no specialized knowledge - Reduces risk, saves budget, and boosts productivity PHP Secure Scanner is suitable for analyzing sites on Php, framework Laravel, and CMS Wordpress, Drupal and Joomla. PHP Secure detects the most common and dangerous types: -SQL injection vulnerabilities -Command Injection -Cross-Site Scripting (XSS) Vulnerabilities -PHP Serialize Injections -Remote Code Executions -Double Escaping -Directory Traversal -Regular Expression Denial of Service (ReDos)
  • 3
    Kontra

    Kontra

    Security Compass

    Kontra was built by industry veterans who invented and pioneered the first interactive application security training platform. We don't offer secure coding quizzes, that are effectively re-skinned multiple-choice questions. If that's your idea of educating developers about software security, we are not the company for you. Developers are who we serve. Adding artificial metrics, meaningless rewards, and silly badges is not what we do. We respect their time far too much to patronize them with these gimmicks. The days of heavily scripted OWASP Top 10 training videos with robotic voice-overs are over. Interactive storytelling with realness and purpose in short bursts is what puts developers in the middle of the action and drives a truly engaging learning experience. Developers are more engaged in training if the content has a basis in reality rather than contrived examples. We set out to design the most beautiful application security training experience ever built.
    Starting Price: $400 per year
  • 4
    Casbin

    Casbin

    Casbin

    Casbin is an open-source authorization library that supports various access control models, including Access Control Lists (ACL), Role-Based Access Control (RBAC), and Attribute-Based Access Control (ABAC). It is implemented in multiple programming languages such as Golang, Java, C/C++, Node.js, JavaScript, PHP, Laravel, Python, .NET (C#), Delphi, Rust, Ruby, Swift (Objective-C), Lua (OpenResty), Dart (Flutter), and Elixir, providing a consistent API across different platforms. Casbin abstracts access control models into configuration files based on the PERM metamodel, allowing developers to switch or upgrade authorization mechanisms by simply modifying configurations. It offers flexible policy storage options, supporting various databases like MySQL, PostgreSQL, Oracle, MongoDB, Redis, and AWS S3. The library also features a role manager to handle RBAC role hierarchies and supports filtered policy management for efficient enforcement.
    Starting Price: Free
  • 5
    KeyCAPTCHA

    KeyCAPTCHA

    KeyCAPTCHA

    More than 50.000 sites worldwide use our protection. Improve your captcha in 5 minutes. We have captcha plugins for 19 popular content management systems such as Concrete5, phpBB, Simple Machines Forum, MediaWiki, PunBB, MyBB, Movable Type, DataLife Engine, Phorum, Woltlab BB, OpenCart, Pligg, and XOOPS.
  • 6
    TrustLink

    TrustLink

    AarateK

    TrustLink™ is a high-performance biometric identity authentication platform that supports large-scale facial and fingerprint recognition. It is a powerful platform that includes multi-biometric identification technologies and can be used to capture, register, identify, and authenticate fingerprints and faces. It also provides the APIs on the server and client for fast development and deployment into a wide range of applications. TrustLink™ is equipped with Aratek Bione® dynamic optimization algorithm and TrustFace™ face recognition algorithm, it's specialized in the field of large-scale fingerprint and face recognition applications. TrustLink™ is an ideal biometric identity authentication platform for software developers.
  • 7
    Syhunt Hybrid
    Syhunt dynamically injects data in web applications and analyzes the application response to determine if the application code is vulnerable, automating the web application security testing and proactively guarding your organization's Web infrastructure against several kinds of web application security threats. Syhunt Hybrid follows simple GUI standards, prioritizing ease of use and automation and thus requiring minimal to no user intervention before or during scans despite a large number of customization options. Compare past scan sessions to determine new, unchanged or removed vulnerabilities. Generate a comparison report that displays the evolution of vulnerabilities over time by automatically comparing previous scan session data related to a specific target.
  • 8
    SecureFlag

    SecureFlag

    SecureFlag

    SecureFlag’s hands-on training in real development environments offers a tailored approach to enterprise training needs. 45+ technologies supported and over 150 vulnerability types covered. Each comprises a fully configured development environment. With more than 70% of vulnerabilities introduced during development, writing secure software is more critical than ever. SecureFlag has revolutionized the approach to secure coding training. With SecureFlag’s hands-on labs, participants learn in virtualized environments using the tools they know and love. SecureFlag’s Labs teaches participants how to identify and remediate the most prevalent security issues by doing instead of simply just seeing. Labs run in real, virtualized development environments, and participants learn using the same tools they use at work. Engage with your organization’s developer community and promote learning through enjoyable competition.
  • 9
    Security Compass SSP

    Security Compass SSP

    Security Compass

    Improve your security posture with targeted training and earn ISC2 certification for your software security practitioners. Train your entire development team, including software developers, security champions, software architects, QA engineers, and project managers on fundamental elements of software security and language-specific secure coding practices. Once you’ve successfully completed all modules and passed the course exam, you’ll receive an industry-recognized certificate from Security Compass and ISC2. You can then share your certification through a social media badge. Deepen your understanding of common security risks by diving into real-world exploit scenarios. Target and close your team’s knowledge gaps with the right training delivered exactly where and when you need it. Reduce or eliminate inconsistencies and help your team perform its best. Measure success from module to module, and paint a clear, real-time picture of the skills and expertise of your team.
  • 10
    Rainforest

    Rainforest

    Rainforest

    Achieve higher cyber security protection with the Rainforest platform. Trust Rainforest to safeguard your innovations and provide you with the confidence to navigate the digital world securely, with quick implementation, and faster results. Traditional solutions are too complex to implement for companies that don't waste time and money. Frictionless integration, so you can use your time more fixing than implementing our solutions. Our trained models use AI to suggest fixes, empowering your team to resolve issues easily. 7 different application analyses with comprehensive application security, local code analysis, and AI-driven fix suggestions, ensure seamless integration, rapid vulnerability detection, and effective remediation for robust application protection. Continuous cloud security posture management, identifying misconfigurations and vulnerabilities in real-time enhancing cloud security effortlessly.
  • 11
    Checkmarx

    Checkmarx

    Checkmarx

    The Checkmarx Software Security Platform provides a centralized foundation for operating your suite of software security solutions for Static Application Security Testing (SAST), Interactive Application Security Testing (IAST), Software Composition Analysis (SCA), and application security training and skills development. Built to address every organization’s needs, the Checkmarx Software Security Platform provides the full scope of options: including private cloud and on-premises solutions. Allowing a range of implementation options ensures customers can start securing their code immediately, rather than going through long processes of adapting their infrastructure to a single implementation method. The Checkmarx Software Security Platform transforms the standard for secure application development, providing one powerful resource with industry-leading capabilities.
  • 12
    CyberSiARA

    CyberSiARA

    CyberSiARA

    When it comes to fraud, prevention is more cost-effective than cure. By deploying intuitive traffic testing, the CyberSiARA system provides a proactive approach to cyber-security that stops fraud in its tracks. The traffic classification capability differentiates between genuine users and potential attackers in real-time using interactive enforcement challenges – quickly halting both automated and human-driven attacks before a breach can be made. CyberSiARA uses powerful traffic analysis processes to determine user intent. By identifying fraud signifiers in traffic behavior, the system deploys interactive challenges to test activity classified as suspicious. This allows genuine users to enjoy a seamless access experience, while attacks from a broad range of origins are defeated. Traffic designed to overcome authentication challenges is stopped with innovative challenge strategies.
  • 13
    Codebashing

    Codebashing

    Checkmarx

    Codebashing is Checkmarx’s in-context eLearning platform that sharpens the skills developers need to fix vulnerabilities and write secure code. Expanding on the learn-by-doing concept, Codebashing teaches developers the principles of secure coding and helps them sharpen application security skills in the most efficient way. Give your developers the skills they need to increase security and reduce risk right from the start. Transform developer security training into an ongoing experience that integrates seamlessly into daily workflows, making learning continuous, personalized, and directly aligned with developers’ evolving needs. Personalized secure code training journeys are carefully crafted to equip developers with role-specific knowledge, making security training both relevant and effective. This custom learning path includes 85 lessons, covering all SDLC aspects, designed to help security-minded developers become security champions for your enterprise.