Alternatives to CodeSign Secure

Compare CodeSign Secure alternatives for your business or organization using the curated list below. SourceForge ranks the best alternatives to CodeSign Secure in 2026. Compare features, ratings, user reviews, pricing, and more from CodeSign Secure competitors and alternatives in order to make an informed decision for your business.

  • 1
    CodeSignal

    CodeSignal

    CodeSignal

    CodeSignal is how the world discovers and develops the skills that will shape the future. Our skills platform empowers teams to go beyond skills gaps, with hiring and AI-powered learning solutions, and helps individuals cultivate the skills they need to level up. Wherever you are on your journey, CodeSignal’s technical hiring and learning & development solutions meet you there and get you where you need to go. Having powered millions of skills evaluations, CodeSignal is trusted by leading companies like Netflix, Capital One, Meta, and Dropbox, and is used by learners across the globe.
  • 2
    Kiuwan Code Security
    Kiuwan is an end-to-end application security platform that integrates seamlessly into your development process. Our toolset includes Static Application Security Testing (SAST), Software Composition Analysis (SCA), Software Governance and Code Quality, empowering your team to quickly identify and remediate vulnerabilities. Integrating into your CI/CD pipeline, Kiuwan enables early detection and remediation of security issues. Kiuwan supports strict compliance with industry standards including OWASP, CWE, MISRA, NIST, PCI DSS, and CERT, among others. ✅ Large language support: 30+ programming languages. ✅ Detailed action plans: Prioritize remediation with tailored action plans. ✅ Code Security: Seamless Static Application Security Testing (SAST) integration. ✅ Insights: On-demand or continuous scanning Software Composition Analysis (SCA) to help reduce third-party threats. ✅ One-click Software Bill of Materials (SBOM) generation Code Smarter. Secure Faster. Ship Sooner.
  • 3
    CodeSign
    Code signing is a proven security practice to protect and extend the trust-based usage of software systems and applications. Organizations that publish as well as consume software, need a secure code signing mechanism to ensure software authenticity. The objective is to ascertain that valid software is not taken over as a medium by ransomware. CodeSign by Aujas provides a scalable, secure, easy to integrate DevOps-ready platform that ensures the integrity of software applications, enables allow-listing to protect internal infrastructure, protects the signing keys, provides automated audit trails, and combat ransomware. CodeSign is available both as a SaaS application and as an on-premise appliance and easily scales to hundreds of millions of file signings per year. It allows unmatched versatility to sign all file types across all platforms. Organizations use variety of software applications which are essential for running day to day business.
  • 4
    SignPath

    SignPath

    SignPath

    In times of growing cyber security breaches, platform vendors and customers require all deployed applications to be digitally signed. Code signing is the only way to guarantee that software has not been modified by a third party. The corporate solutions of SignPath enable DevOps teams to seamlessly integrate code-signing into their development lifecycle and empowers InfoSec teams to define secure policies and gain transparency over private key usage. Frequent software releases and updates, the popularity of microservices as well as stricter enforcement of internal security measures have increased the complexity for code signing. SignPath is made for developers from one of the leading European software development companies for government institutions. We automate security best practices to keep your development process agile.
  • 5
    SignMyCode

    SignMyCode

    SignMyCode

    SignMyCode is a one-stop shop for trusted and authentic code signing solutions, offering code signing certificates from reputed certificate authorities like Sectigo, Certera, DigiCert etc. suitable for individual developers and software organisations to safeguard their software, EXE, scripts, and apps by digitally signing them.
  • 6
    Keyfactor Signum
    With Keyfactor Signum, sensitive keys are protected, policy is automated, and signing is integrated with your tools and build processes. Generate and store sensitive private signing keys in a centralized, FIPS 140-2 certified hardware security module (HSM) in the cloud. Define granular access and usage policies for private signing keys, and authenticate users and build servers for signing with a full audit trail. Integrate with platform-native signing tools to protect access to private signing keys, without changing workflows. Integrate with signing tools via lightweight Windows and Linux agents that are quick to install on build servers or developer workstations. Generate key attestation to comply with CA/B forum requirements to verify that keys are stored and generated in an HSM.
  • 7
    SignServer Enterprise
    One flexible platform that supports all your electronic signature use cases. Integrates with your business applications via standard interfaces. Deploy SignServer as it suits your needs - either as a turn-key software or hardware appliance or in the cloud. The SignServer platform covers all your signing use cases in one solution, including standard document signing, eIDAS advanced signing and seal, code signing for multiple formats, timestamping services and ICAO ePassport signing. Avoid managing a myriad of signing solutions and centralize all your signature processes in this multitenant solution and improve on security policy compliance. Server-side signature solutions give maximum control and security and allow you to leverage your hardware security module (HSM) investment in the best way. Signature keys are generated and used for signing in your HSM. SignServer supports most HSMs on the market - and both short-lived keys, and keys or certificates with a longer lifecycle.
  • 8
    SSL2BUY

    SSL2BUY

    SSL2BUY

    SSL2BUY is an authorized reseller of the world's leading certificate authorities (CAs) like DigiCert, Comodo, Sectigo, GlobalSign, GeoTrust, Thawte, and RapidSSL. As a global SSL certificate and code signing certificate provider, it focuses on providing the utmost encrypted SSL security with excellent discount offers and customer support for any size of organization or individual. Get hassle-free security solutions with our low-cost SSL certificates and code signing certificates. SSL certificates protect online transactions with strong 256-bit SSL encryption, and code signing certificates help protect your software.  We offer low-cost SSL certificates, but we never compromise with your web security. All of our certificates come with modern algorithms recommended by the CA/Browser forum.
  • 9
    GaraSign

    GaraSign

    Garantir

    There are many excellent enterprise security tools to choose from. Some are managed on-premise, others are consumed as a service, and others still use a hybrid model. The challenge enterprises face is not a lack of tools or solutions, but rather a lack of seamless interconnectivity between these privileged access management tools and a single place to manage and audit them. GaraSign is a platform that allows enterprises to securely and efficiently integrate their security systems in a way that does not disrupt existing business processes. By factoring out what’s common, GaraSign is able to centralize and simplify the management of your enterprise’s most sensitive areas, including privileged access management (PAM), privileged identity management, secure software development, code signing, data security, PKI & HSM solutions, DevSecOps, and more. Enterprise security leaders must attend to data security, privileged access management (PAM), privileged identity management, etc.
  • 10
    jarsigner
    The jarsigner tool has two purposes, to verify the signatures and integrity of signed JAR files and to sign Java Archive (JAR) files. A digital signature is a string of bits that is computed from some data (the data being signed) and the private key of an entity (a person, company, and so on). Similar to a handwritten signature, a digital signature has many useful characteristics, its authenticity can be verified by a computation that uses the public key corresponding to the private key used to generate the signature, it is a function of the data signed and thus cannot be claimed to be the signature for other data as well, the signed data cannot be changed. If the data is changed, then the signature cannot be verified as authentic and It cannot be forged, assuming the private key is kept secret.
  • 11
    GeoTrust

    GeoTrust

    GeoTrust

    GeoTrust, a leading certificate authority, provides retail and reseller services for SSL encryption, and website authentication, digital signatures, code signing, secure email, and enterprise SSL products. In today’s digital economy, every company needs web security they can trust. With more than 100,000 customers in over 150 countries, there’s good reason businesses around the world choose GeoTrust for SSL/TLS security solutions. Since 2001, GeoTrust has delivered business-class certificates to organizations of all sizes—from enterprise to single-site small business—at the best possible value. The wide range of authentication levels offered by GeoTrust allow companies to cost-effectively meet their specific security needs across virtually every major browser and mobile device, while also aligning themselves with a respected digital security brand.
    Starting Price: $149 per year
  • 12
    ClickSSL

    ClickSSL

    ClickSSL

    ClickSSL is an platinum partner of the leading Certificate Authorities like VeriSign(now Symantec), GeoTrust, RapidSSL, Thawte and Comodo. ClickSSL offers EV SSL, Code Signing Certificate, UCC Certificate, Wildcard SSL & more SSL Certificates at market low price. ClickSSL offers SSL certificates can provide you with non-forgettable proof of your website's identity, and customer confidence in the integrity and security of your online business. Buy RapidSSL, VeriSign(now Symantec), GeoTrust, Thawte and Comodo SSL Certificates at affordable price. ClickSSL offers SSL certificates with strong 256 bit encryption at affordable price to secure your web sites, eCommerce, exchange, intranets and extranets. Our inexpensive digital certificate is supported by over 99% of current browsers. Buy SSL certificate at lowest price to establish secure environment on your site(s). Move your step ahead with HTTPS and never let down customer’s confidence.
  • 13
    Entrust TLS/SSL Certificates
    Entrust TLS/SSL Certificates provide validated identity and encryption to secure your websites, users, and data. When your website is secured by an Entrust TLS/SSL Certificate, your visitors can be confident knowing that your organization's identity as been verified and that encryption will keep their data and transactions secure. With an Entrust TLS/SSL Certificate, your visitors never see browser alerts notifying them that your website is “not secure” or that their “connection is not private.” Invest in your reputation and great user experience with an Entrust TLS/SSL Certificate. Entrust is a founding member of the CA Security Council and the CA/Browser Forum, and actively contributes to develop industry standards for TLS/SSL, S/MIME, document signing, mobile device, and code signing certificates, as well as certificate management. Trust your security to a Certification Authority that defines digital security.
  • 14
    SignTool

    SignTool

    Microsoft

    The software industry must provide users with the means to trust code including code published on the Internet. Many webpages contain only static information that can be downloaded with little risk. Some pages, however, contain controls and applications to be downloaded and run on a user's computer. These executable files can be risky to download and run. Packaged software uses branding and trusted sales outlets to assure users of its integrity, but these guarantees are not available when code is transmitted on the Internet. Additionally, the Internet itself cannot provide any guarantee about the identity of the software creator. Nor can it guarantee that any software downloaded was not altered after its creation. Browsers can exhibit a warning message that explains the possible dangers of downloading data of any kind, but browsers cannot verify that code is what it claims to be. A more active approach must be taken to make the Internet a reliable medium for distributing software.
  • 15
    CheapSSLWeb

    CheapSSLWeb

    CheapSSLWeb

    CheapSSLWeb is an authorized partner of Sectigo (formerly known as Comodo) and offers the cheapest SSL certificates from globally reputed Certificate Authorities like COMODO, SECTIGO, and CERTERA. We provide all types of SSL & Code Signing certificates like DV certificates, OV, and EV certificates.
  • 16
    apksigner
    The apksigner tool, available in revision 24.0.3 and higher of the Android SDK Build Tools, lets you sign APKs and confirm that an APK's signature will be verified successfully on all versions of the Android platform supported by that APK. This page presents a short guide for using the tool and serves as a reference for the different command-line options that the tool supports. For a more complete description of how the apksigner tool is used for signing your APKs. The lowest Android framework API level that apksigner uses to confirm that the APK's signature will be verified. Higher values allow the tool to use stronger security parameters when signing the app but limit the APK's availability to devices running more recent versions of Android. By default, apksigner uses the value of the minSdkVersion attribute from the app's manifest file.
  • 17
    iOS App Signer

    iOS App Signer

    iOS App Signer

    iOS App Signer can (re)sign apps and bundle them into ipa files that are ready to be installed on an iOS device.
  • 18
    Codenotary

    Codenotary

    Codenotary

    We bring trust and integrity into the software life cycle by providing end-to-end cryptographically verifiable tracking and provenance for all artifacts, actions, and dependencies, at scale. Based on open source immudb, our highspeed, immutable store. Ultra-fast and simple integration with all your existing languages and CI/CD. Codenotary Cloud enables any company, developer, automation engineer, DevOps engineer to secure all stages of a CI/CD pipeline. With Codenotary Cloud® you can easily build immutable, tamper-proof solutions and comply with auditor requirements and regulations and laws. Codenotary Trustcenter enables any company, developer, automation engineer, DevOps engineer to secure all stages of a CI/CD pipeline. Attestation (Notarization & Authentication) of every step in your pipeline including vulnerability scanner results and evidence in a tamper-proof and immutable service enables you to reach Level 3 & 4 of the SLSA (Supply-chain Levels for Software Artifacts).
  • 19
    IBM Crypto Analytics Tool (CAT)
    Crypto Analytics Tool (CAT) collects security-relevant information and helps build your cryptographic inventory. Through the graphical client, it is easy to analyze security information. Enterprise-wide overview of all z/OS cryptographic consuming LPARs from a single CAT monitor client. Offers a comprehensive data view of the cryptographic security of the system. Allows monitoring to ensure that keys and cryptographic functions are set up and protected, complying with best practices. Eases policy and compliance enforcement. Helps administrators understand weaknesses and gaps to prioritize improvements. Comprehensive overview of the cryptographic security of HSM, ICSF, and RACF of the system. Key data for better policy and compliance enforcement. Identify insecure keys and algorithms. Comparison of the current crypto state with the previous snapshot for error and problem determination or change control validation.
  • 20
    Mirantis Secure Registry
    Mirantis Secure Registry (formerly Docker Trusted Registry) provides an enterprise grade container registry solution that can be easily integrated to provide the core of an effective secure software supply chain. Enterprise-grade security Centralize control for container images: Store, share, and manage images from a secure docker registry under your control, enabling developers to use and run only approved images. Protect and verify: Scan images against a continuously updated vulnerability database, and validate with cryptographic signing. Secure and accelerate CI/CD workflows: Automatically promote images from test to prod for a secure, efficient software pipeline—all while maintaining policy-based controls.
  • 21
    SonarQube Server

    SonarQube Server

    SonarSource

    SonarQube Server is a self-managed solution for continuous code quality inspection that helps development teams identify and fix bugs, vulnerabilities, and code smells in real-time. It provides automated static code analysis for a variety of programming languages, ensuring the highest quality and security standards are maintained throughout the development lifecycle. SonarQube Server integrates seamlessly with existing CI/CD pipelines, offering flexibility for on-premise or cloud-based deployment. With advanced reporting features, it helps teams manage technical debt, track improvements, and enforce coding standards. SonarQube Server is ideal for organizations seeking full control over their code quality and security without compromising on performance.
  • 22
    Go SaaS Startup Kit

    Go SaaS Startup Kit

    Go SaaS Startup Kit

    The SaaS Startup Kit is an open-source project offering a collection of Go (Golang) libraries and boilerplate code to facilitate the development of scalable software-as-a-service applications. It provides a responsive web application with user authentication, including sign-up and login functionalities, and supports create, read, update, and delete (CRUD) operations. The kit includes a RESTful API with JSON Web Token (JWT) authentication and auto-generated documentation using Swagger. For user interface design, it integrates Bootstrap, enabling the creation of responsive, mobile-first projects. Deployment is streamlined through serverless infrastructure on Amazon Web Services (AWS), with continuous integration and deployment pipelines configured via GitLab CI/CD. By offering these pre-built components and integrations, the SaaS Startup Kit aims to reduce repetitive tasks, allowing developers to focus on unique business logic and accelerate the launch of new software services.
  • 23
    Archipelo

    Archipelo

    Archipelo

    Archipelo is a developer security posture management platform that helps organizations safeguard their software development lifecycle (SDLC) by providing real-time insights into developer activities, AI code tool usage, and tool governance. It features Developer Detection Response (DevDR) for proactively identifying and mitigating security risks, Automated Tool Governance to prevent shadow IT, and an AI Code Usage & Risk Monitor to ensure secure coding practices. With seamless integration into CI/CD workflows, Archipelo captures developer actions and provides actionable insights to enhance security, mitigate risks, and ensure compliance throughout the software development process.
  • 24
    MangoWriter

    MangoWriter

    MangoWriter

    MangoWriter is a secure text editor for Windows designed to run completely offline with no cloud, AI, network connections, or telemetry, offering a familiar, simple editing experience while keeping content private by default. It uses state-of-the-art AES-256-GCM encryption with strong key derivation (Argon2id) and optional keyfile two-factor support, ensuring no plaintext is ever written to disk and eliminating caches or temp files. MangoWriter protects your work with a secure clipboard that binds copied content to the current session, an instant lock screen to mask content when stepping away, and one-click bulk redaction tools to permanently black out selected text across documents. Sensitive buffers are zeroed after use and your password never gets stored on disk, with key material kept only in secure memory while a document is unlocked. It is delivered as clean, code-signed builds available as an MSI installer or portable ZIP and includes secure export options.
  • 25
    Apollo GraphOS

    Apollo GraphOS

    Apollo GraphQL

    Apollo GraphOS is an API orchestration platform designed to help teams build, scale, and manage a unified supergraph across any number of services and applications. It brings together a secure, high-performance runtime layer with a centralized cloud management plane for seamless collaboration. Developers can unify REST APIs using Apollo Connectors, making it easy to migrate or integrate systems into GraphQL Federation. The GraphOS Router provides real-time capabilities, advanced caching, policy enforcement, and observability for large, distributed architectures. GraphOS Studio further enhances workflows with schema collaboration, CI/CD integration, and tooling that accelerates development. With flexible hosting options, GraphOS simplifies the delivery of modern, scalable GraphQL experiences.
    Starting Price: $49 per month
  • 26
    Pulumi

    Pulumi

    Pulumi

    Modern Infrastructure as Code. Create, deploy, and manage infrastructure on any cloud using familiar programming languages and tools. Many clouds, one workflow. Use the same language, tools, and workflow, on any cloud. Collaborate. Harmonize your engineering practices between developers and operators. Easy continuous delivery. Deploy from the CLI, or integrate with your favorite CI/CD system, and review all changes before they are made. Tame complexity. Gain visibility across all of your environments. Audit and secure. Know who changed what, when, and why. Enforce deployment policies with your identity provider of choice. Secrets management. Keep secrets safe with easy, built-in encrypted configuration. Familiar programming languages. Define infrastructure in JavaScript, TypeScript, Python, Go, or any .NET language, including C#, F#, and VB. Your favorite tools. Use familiar IDEs, test frameworks, and tools. Share and reuse. Codify best practices and policies.
  • 27
    Airtool

    Airtool

    Airtool

    Airtool is a next-generation low-code platform purpose-built to support the demands of large-scale, mission-critical enterprise systems. Developed by Deister Software, Airtool was born from the need to create a powerful ERP solution capable of handling massive datasets without sacrificing performance. Unlike traditional low-code tools focused on simple apps, Airtool offers unmatched scalability, making it ideal for building robust, data-intensive applications. Engineered with a unified development framework, Airtool enforces best practices and standardizes workflows, reducing complexity and making onboarding seamless. Its ERP-focused design ensures precision and control in managing complex business operations, while integrated data management allows real-time interaction with millions of records. Airtool empowers teams to reduce reliance on specialized developers with reusable components and intuitive tools, accelerating development while maintaining maintainability and consistency.
    Starting Price: $50/month
  • 28
    AWS Key Management Service
    AWS Key Management Service (KMS) is a managed service that facilitates the creation and control of cryptographic keys used to protect your data. It provides centralized management of keys and policies across integrated services and applications, allowing you to define permissions and monitor key usage. AWS KMS integrates with other AWS services, enabling seamless encryption of data stored within these services and control over access to the keys that decrypt it. Developers can utilize the AWS Encryption SDK to incorporate encryption and digital signature functionalities directly into their application code. AWS KMS supports the generation and verification of hash-based message authentication codes to ensure message integrity and authenticity. The service employs hardware security modules validated under the U.S. National Institute of Standards and Technology (NIST) Federal Information Processing Standards (FIPS) 140-2 Cryptographic Module Validation Program.
  • 29
    Azure Kubernetes Service (AKS)
    The fully managed Azure Kubernetes Service (AKS) makes deploying and managing containerized applications easy. It offers serverless Kubernetes, an integrated continuous integration and continuous delivery (CI/CD) experience, and enterprise-grade security and governance. Unite your development and operations teams on a single platform to rapidly build, deliver, and scale applications with confidence. Elastic provisioning of additional capacity without the need to manage the infrastructure. Add event-driven autoscaling and triggers through KEDA. Faster end-to-end development experience with Azure Dev Spaces including integration with Visual Studio Code Kubernetes tools, Azure DevOps, and Azure Monitor. Advanced identity and access management using Azure Active Directory, and dynamic rules enforcement across multiple clusters with Azure Policy. Available in more regions than any other cloud providers.
  • 30
    StepSecurity

    StepSecurity

    StepSecurity

    If you are using GitHub Actions for CI/CD and are worried about the security of CI/CD pipelines, StepSecurity platform is for you. Implement network egress control and CI/CD infrastructure security for GitHub Actions runners. Discover CI/CD risks and GitHub Actions security misconfiguration. Standardize GitHub Actions CI/CD pipeline as code files by automated pull requests. Provides runtime security to help you prevent SolarWinds and Codecov CI/CD security attacks by blocking egress traffic with an allowlist. Instant contextualized insight into network and file events for all workflow runs. Control network egress traffic with granular job-level and default cluster-wide policies. Many GitHub Actions are not maintained and are risky. Enterprises fork such Actions, but ongoing maintenance is expensive. By offloading the tasks of reviewing, forking, and maintaining Actions to StepSecurity, enterprises can realize substantial risk reduction and time savings.
    Starting Price: $1,600 per month
  • 31
    AQtive Guard

    AQtive Guard

    SandboxAQ

    AQtive Guard is a cybersecurity platform that helps organizations secure and manage cryptographic assets and non-human identities (NHIs) such as AI agents, keys, certificates, algorithms, and machine identities across their entire IT environment. It delivers continuous discovery and real-time visibility into NHIs and cryptography, integrating with existing security tools, cloud providers, and repositories to provide a unified view of security posture. Using advanced AI and large quantitative models, the platform analyzes vulnerabilities, prioritizes risks, and offers actionable insights with automated remediation workflows to fix issues and enforce policies such as credential rotation or certificate renewal. AQtive Guard supports compliance with evolving standards, including new NIST cryptographic protocols, and enables lifecycle management of cryptographic assets to reduce risk from current and future threats.
  • 32
    Azure Logic Apps
    Built on a containerized runtime that increases scale and portability while automating business-critical workflows anywhere. Modernize your BizTalk Server applications by moving them to Logic Apps using the BizTalk migration tool. Connect logic apps to your virtual networks to seamlessly and securely integrate cloud-based and on-premises solutions. Containerize your workflows to deploy and run your applications anywhere—in the cloud, on premises, or the infrastructure of your choice. Apply CI/CD best practices to your workflows and take advantage of built-in tools for seamless and secure deployments. Deploy and run logic applications in Azure, any container, and on premises. Enable private endpoints, simplified virtual network access, and deployment slots. Develop, debug, and test on Windows, MacOS, and Linux using Visual Studio Code. Deploy multiple workflows to a single logic app, simplifying automated deployments and CI/CD pipelines.
  • 33
    LoginID

    LoginID

    LoginID

    With just a few lines of code, LoginID enables websites and apps to integrate FIDO/FIDO2 certified multi-factor authentication via our easy to use SDKs and APIs. Our platform leverages the biometrics on the end user's device to create a private key, public key pair that allows for seamless strong customer authentication. No app installation is required and the private key is stored securely on the end user's device, never leaving. Additionally, LoginID offers Transaction Confirmation, where a transaction can be cryptographically signed providing proof of the user’s confirmation of that specific transaction, which is perfect for merchants who want payment authentication services. LoginID is aligned with PSD2, GDPR, CCPA, and HIPAA. We have SDKs for iOS, Android, React-Native, Web, Python, Java, and Node as well as a WordPress Plugin.
  • 34
    Klocwork

    Klocwork

    Perforce

    Klocwork static code analysis and SAST tool for C, C++, C#, Java, and JavaScript identifies software security, quality, and reliability issues helping to enforce compliance with standards. Built for enterprise DevOps and DevSecOps, Klocwork scales to projects of any size, integrates with large complex environments, a wide range of developer tools, and provides control, collaboration, and reporting for the entire enterprise. This has made Klocwork the preferred static analyzer that keeps development velocity high while enforcing continuous compliance for security and quality. Use Klocwork static application security testing (SAST) for DevOps (DevSecOps). Our security standards identify security vulnerabilities, helping to find and fix security issues early and proving compliance to internationally recognized security standards. Klocwork integrates with CI/CD tools, containers, cloud services, and machine provisioning making automated security testing easy.
  • 35
    Screenly

    Screenly

    Screenly

    Frequent, hands-free software updates keep your digital signs stable and secure. Locally saved content guarantees that your content shows – even in the event of an internet outage. Create playlists quickly, and schedule your next month of content in a single sitting. If you're comfortable with Linux, don't need support, and are OK to manage one screen at a time, then choose Screenly Open Source Edition (OSE). If you want commercial-grade features, support, and the ability to easily manage any number of digital signs remotely, then choose a Screenly subscription. You will need one Screenly Player for each screen. Screenly started as a small open-source project in 2011. Today, we power over 10,000 digital signs around the world. Add images, videos, live web pages, and more to your Screenly digital signs. Log in to our online platform, and plug in the Screenly Player to your screen via HDMI.
    Starting Price: $9.95 per month
  • 36
    Datree

    Datree

    Datree.io

    Block misconfigurations, not deployments. Automated policy enforcement for Infrastructure as Code. Enforce policies to prevent misconfigurations in Infrastructure as Code such as Kubernetes, Terraform, CloudFormation, and more. Achieve application stability with automatic tests of every code change for policy violations or misconfigurations that may cause service outages or degraded performance. Adopt cloud-native infrastructure with minimal risk by applying built-in policies, or create custom policies to meet specific requirements. Focus on building better applications, not on infrastructure, by enforcing built-in policies for Kubernetes, Terraform, CloudFormation, and other infrastructure orchestrators. Eliminate manual code reviews for infrastructure-as-code changes, with checks that run automatically on every pull request. Keep the current DevOps workflow, with policy enforcement that integrates seamlessly with existing source control systems and CI/CD pipelines.
    Starting Price: $10 per user per month
  • 37
    Azure App Service
    Quickly build, deploy, and scale web apps and APIs on your terms. Work with .NET, .NET Core, Node.js, Java, Python or PHP, in containers or running on Windows or Linux. Meet rigorous, enterprise-grade performance, security and compliance requirements used a trusted, fully managed platform that handles over 40 billion requests per day. Fully managed platform with built-in infrastructure maintenance, security patching, and scaling. Built-in CI/CD integration and zero-downtime deployments. Rigorous security and compliance, including SOC and PCI, for seamless deployments across public cloud, Azure Government, and on-premises environments. Bring your code or container using the framework language of your choice. Increase developer productivity with tight integration of Visual Studio Code and Visual Studio. Streamline CI/CD with Git, GitHub, GitHub Actions, Atlassian Bitbucket, Azure DevOps, Docker Hub, and Azure Container Registry.
    Starting Price: $0.013 per hour
  • 38
    Co-Designer
    Co-Designer by Fuga is a dynamic creative automation platform that intelligently adapts designs across any format while preserving visual hierarchy and composition. Built for agencies, in-house creative teams, and designers who need to scale production without sacrificing quality, Co-Designer uses AI to understand design elements—not just dimensions—ensuring every resized asset maintains balance, proper spacing, and brand integrity. Key capabilities include native resizing that recomposes layouts intelligently across formats, automated brand rule enforcement for colors, fonts, spacing and logo placement, and instant generation of multiple variations from a single design. The platform integrates directly with Adobe InDesign through a native plugin, plus offers API and SDK options for custom workflows.
  • 39
    NextAuth.js

    NextAuth.js

    NextAuth.js

    NextAuth.js is an open source authentication solution tailored for Next.js applications, offering seamless integration with popular services like Google, Facebook, Auth0, and Apple. It supports various authentication methods, including OAuth 1.0 & 2.0, email/passwordless sign-ins, and custom username/password systems. Designed for flexibility, NextAuth.js operates efficiently in serverless environments and supports multiple databases such as MySQL, PostgreSQL, MSSQL, and MongoDB, allowing developers to choose between database sessions or JSON Web Tokens (JWT). Security features include signed, prefixed, server-only cookies, HTTP POST with CSRF token validation, and encrypted JWTs using JWS/JWE/JWK standards. The platform facilitates easy setup, enabling developers to add authentication in minutes with minimal configuration. Comprehensive documentation and a supportive community further enhance its accessibility for developers seeking a robust authentication system.
  • 40
    PAN-OS

    PAN-OS

    Palo Alto Networks

    PAN-OS is Palo Alto Networks’ ML-powered next-generation firewall operating system that delivers core network security capabilities in a single, high-performance platform. It features App-ID, a patented traffic classification engine that automatically discovers and controls new and evasive applications, and Content-ID, which scans all network traffic in a single pass for comprehensive threat protection without sacrificing throughput. The Cloud Identity Engine aggregates and synchronizes user identities across multiple identity providers, enabling consistent, point-and-click zero-trust authentication and authorization. Device-ID maintains policy enforcement for devices regardless of IP changes or location, providing full context for security, decryption, QoS, and authentication policies. The OS employs post-quantum cryptographic algorithms and Quantum-resistant VPNs to safeguard against future decryption threats.
  • 41
    Mirantis Container Runtime
    Mirantis Container Runtime (MCR), formerly Docker Engine Enterprise, is a secure, enterprise-grade container runtime that enables teams to build and run containers natively on Linux and Windows while using familiar Docker CLI, Dockerfiles, and APIs to power business-critical applications with industry-leading container engine technology and certified support for Kubernetes and Swarm. MCR is fully compatible with Docker-based workflows and toolchains, providing a seamless path from development to production and tested, validated releases across a broad set of operating systems with robust CVE patching and bug fixes to ensure workload stability. It delivers world-class security with FIPS 140-2 validated cryptographic modules, mandatory access controls such as AppArmor and SELinux, image signature verification, and support for sandboxed runtimes like Kata and gVisor to enforce trusted, compliant containers.
  • 42
    Augmented MES

    Augmented MES

    Apprentice.io

    ‍Put power in the hands of your team. With intuitive, no-code procedure and recipe authoring designed for process scientists and process engineers, your teams can configure Tempo without code.‍ ‍Tempo allows users from your organization – or even across CDMO and their customers – to author recipes together in real time with live group-editing collaboration tools.‍ ‍Users can quickly create intelligent workflows with advanced capabilities like parallel execution, branching, and enforcement logic, as well as integrate referenceable parameters, formulas, equipment, materials, and operator actions, without a single line of code.‍ ‍Any user can also add augmented guidance – photos, videos, and AR overlays– to any step of a procedure. ‍Our native mobile app and hands-free, voice-enabled headset move with you. Tempo is optimized for use in all environments – the suite, cleanrooms, and while wearing PPE.‍
  • 43
    Scribe Security Trust Hub
    Scribe is a SaaS solution that provides continuous assurance for the security and trustworthiness of software artifacts, acting as a trust hub between software producers and consumers. Scribe centralized SBOM management system allows to effortlessly manage and share products SBOMs along with all their associated security aspects in a controlled and automated manner. SCRIBE KEY FEATURES: *Gain visibility and control the risk of all your products’ security aspects. *Trust but verify: streamline security guardrails to verify secure SDLC policy, based on trusted evidence. *Simplify secure SDLC processes, balancing responsibilities between dev and security teams. *Detect code tampering and software factory exploitations. *Enforce and demonstrate compliance with regulations and best practices. *Share SBOMs and security insights in a controlled manner with stakeholders.
  • 44
    liblab

    liblab

    liblab

    Reduce your customers' API integration time by offering SDKs in languages they are familiar with. Our SDK Code Generator creates language-specific SDKs in under a minute and integrates into your CI/CD pipeline for no-touch maintenance with every API update. Generate SDKs in multiple languages with built-in best practices in less than a minute. Integrate them into your CI/CD pipeline to keep SDKs and documentation synchronized with every API update, with no additional engineering effort required. Autogenerate SDKs in Python, Java, Typescript, C#, Go, and PHP with language best practices built in. Easily integrate SDK deployments into your CI/CD pipeline without extra work. liblab automates the process for PyPI, Maven, NuGet, Go, Packagist, and npm.
    Starting Price: $120/month
  • 45
    Jtest

    Jtest

    Parasoft

    Meet Agile development cycles while maintaining high-quality code. Use Jtest’s comprehensive set of Java testing tools to ensure defect-free coding through every stage of software development in the Java environment. Streamline Compliance With Security Standards. Ensure your Java code complies with industry security standards. Have compliance verification documentation automatically generated. Release Quality Software, Faster. Integrate Java testing tools to find defects faster and earlier. Save time and money by mitigating complicated and expensive problems down the line. Increase Your Return From Unit Testing. Achieve code coverage targets by creating a maintainable and optimized suite of JUnit tests. Get faster feedback from CI and within your IDE using smart test execution. Parasoft Jtest integrates tightly into your development ecosystem and CI/CD pipeline for real-time, intelligent feedback on your testing and compliance progress.
  • 46
    Devzery

    Devzery

    Devzery Technologies

    Devzery is an AI-powered platform that revolutionizes API regression testing with codeless automation and seamless CI/CD integration. It enables teams to create, execute, and manage tests effortlessly, reducing manual effort while maximizing coverage. With support for multiple programming languages, Devzery caters to diverse environments, offering intelligent change detection, automated test case updates, and detailed reporting. It ensures comprehensive API validation, including performance and security testing, helping teams deliver robust, high-quality software faster. Perfect for startups and enterprises, Devzery streamlines QA, minimizes risks, and accelerates development timelines.
  • 47
    Bijira
    WSO2 Bijira is an AI-native, cloud-native SaaS API management platform built to manage the full lifecycle of APIs, including design, security, governance, deployment, and monitoring, across internal, external, egress, and AI-driven APIs in hybrid and multi-cloud environments. It provides a unified control plane for consistent API policy, security, and analytics while supporting visual API proxy mapping, drag-and-drop policy management, and a customizable developer portal to accelerate API adoption and reuse. Bijira leverages AI tools to help generate OpenAPI specs, test APIs using natural language prompts, validate compliance with governance rules, and feed insights back into the API development process. It integrates robust security mechanisms, including OAuth2, OIDC, fine-grained access control, and firewall protections, and enforces governance-as-code with AI-assisted policy validation.
  • 48
    Apprentice Laboratory Execution System
    ‍Put power in the hands of your scientists. With intuitive, no-code method authoring designed for scientists, your quality team has full control to develop test methods on their own. ‍Tempo allows users from your organization to author test methods together in real-time with live group-editing collaboration tools. ‍Users can quickly create advanced workflows with sophisticated capabilities like parallel execution, branching, and enforcement logic as well as integrate referenceable parameters, formulas, equipment, materials, and scientist actions, without writing a single line of code. ‍Our native mobile app and hands-free, voice-enabled headset moves with you. Tempo is optimized for use in a lab, is cleanroom compliant and is compatible with PPE. ‍Scientists can follow audio or text instructions enhanced with photo, video, and AR overlay directions that are specific to the equipment and layout in their lab, making each method step crystal-clear.
  • 49
    Fugue

    Fugue

    Fugue

    The Fugue Platform empowers teams with the tools to build, deploy and maintain cloud security at every stage of the development lifecycle. We're so confident that you'll get immediate value with Fugue that we guarantee it. Fugue leverages the open source Open Policy Agent (OPA) standard for IaC and cloud infrastructure policy as code. Build IaC checks into git workflows and CI/CD pipelines with Regula—an open-source tool powered by OPA. Develop custom rules—including multi-resource checks—using Rego, the simple and powerful open source language of OPA. Govern your IaC security for cloud resources, Kubernetes, and containers in one place and ensure consistent policy enforcement across the development lifecycle. View the results of security and compliance checks on IaC across your organization. Access and export tenant-wide, IaC-specific security and compliance reports.
  • 50
    SystemC

    SystemC

    SystemC

    Your online reference for everything related to SystemC, the language for system-level design, high-level synthesis, modeling and verification. SystemC™ addresses the need for a system design and verification language that spans hardware and software. It is a language built in standard C++ by extending the language with the use of class libraries. The language is particularly suited to model system's partitioning, to evaluate and verify the assignment of blocks to either hardware or software implementations, and to architect and measure the interactions between and among functional blocks. Leading companies in the intellectual property (IP), electronic design automation (EDA), semiconductor, electronic systems, and embedded software industries currently use SystemC for architectural exploration, to deliver high-performance hardware blocks at various levels of abstraction and to develop virtual platforms for hardware/software co-design.