17 Integrations with JFrog Xray
View a list of JFrog Xray integrations and software that integrates with JFrog Xray below. Compare the best JFrog Xray integrations as well as features, ratings, user reviews, and pricing of software that integrates with JFrog Xray . Here are the current JFrog Xray integrations in 2026:
-
1
Chainguard
Chainguard
Chainguard Containers are a guarded catalog of 1,700+ minimal, zero-CVE container images with a best-in-class CVE remediation SLA (7 days for critical severity, 14 days for high, medium and low) that helps customers build and deploy software better. Modern software development practices and deployment pipelines require secure, up-to-date containerized applications for cloud-native applications. Chainguard builds minimal images continuously from source in our hardened build infrastructure, with only the components required to build and run your applications. Aimed at engineering organizations and security teams alike, Chainguard Containers reduce costly engineering toil around vulnerability management, enhance the security posture of applications by eliminating attack surface, and unlock revenue by simplifying compliance with key frameworks and customer requirements. -
2
Boozang
Boozang
Build. Test. Automate. Empower your whole team to build and maintain automated tests, not just developers. Meet your testing demands fast. Get full test coverage in days, not months. Our natural-language tests are extremely stable to code changes. When tests break our AI will repair it in minutes. Go Agile/DevOps by setting up Continuous Testing. Push features in production the same day. Boozang supports the following test approaches: - Codeless Record/Replay interface - BDD / Cucumber - API testing - Model-based testing - HTML Canvas testing The following features makes your testing a breeze - In-browser console debugging - Screenshots to show where test fails - Integrate to any CI server - Test with unlimited parallel workers to speed up tests - Root-cause analysis reports - Trend reports to track failures and performance over time - Test management integration (Xray / Jira)Starting Price: $249 USD / month / user -
3
ReleaseIQ
ReleaseIQ
ReleaseIQ helps companies accelerate software product release cycles while improving quality and efficiency with an Enterprise DevOps Platform that leverages existing CI/CD tools, if present, and: - provides visibility into every step of every pipeline, from commit to production, delivered in role-focused dashboards to ensure that all stakeholders have the same information in near real time. - integrates orchestration with intelligent diagnosis and troubleshooting to dramatically increase productivity and reduce MTTR. - highlights actionable insights to empower teams to drive continuous improvement. -
4
Mend.io
Mend.io
Mend.io offers the first AI native application security platform, empowering organizations to build and run a proactive AppSec program tuned for AI powered development. The unified platform secures AI generated code and embedded AI components, drives risk reduction through AI powered remediation, automates compliance, and provides a holistic enterprise scale view of risks and clear actions for developers across your entire codebase.Starting Price: $1,000 per developer, per year -
5
Vulcan Cyber
Vulcan Cyber
At Vulcan Cyber we’re changing the way businesses reduce cyber risk through vulnerability remediation orchestration. We help IT security teams go beyond remedial vulnerability management to help them drive vulnerability remediation outcomes. The Vulcan platform consolidates vulnerability and asset data, with threat intelligence and customizable risk parameters to deliver risk-based vulnerability prioritization insights. But we don't stop there. Vulcan remediation intelligence takes the vulnerabilities that matter to your business and attaches the remedies and fixes needed to mitigate the threat. Then Vulcan orchestrates and measures the rest of the remediation process with integrations and inputs into application security, DevSecOps, patch management, configuration management, and cloud security tools, teams and functions. From scan to fix, Vulcan Cyber delivers the unique ability to orchestrate the entire vulnerability remediation process to GET FIX DONE at scale.Starting Price: $999 / month -
6
Prometheus
Prometheus
Power your metrics and alerting with a leading open-source monitoring solution. Prometheus fundamentally stores all data as time series: streams of timestamped values belonging to the same metric and the same set of labeled dimensions. Besides stored time series, Prometheus may generate temporary derived time series as the result of queries. Prometheus provides a functional query language called PromQL (Prometheus Query Language) that lets the user select and aggregate time series data in real time. The result of an expression can either be shown as a graph, viewed as tabular data in Prometheus's expression browser, or consumed by external systems via the HTTP API. Prometheus is configured via command-line flags and a configuration file. While the command-line flags configure immutable system parameters (such as storage locations, amount of data to keep on disk and in memory, etc.). Download: https://sourceforge.net/projects/prometheus.mirror/Starting Price: Free -
7
Phoenix Security
Phoenix Security
Phoenix Security enables security, developers, and businesses to all talk the same language. We help security professionals focus on the vulnerabilities that matter most across cloud, infrastructure, and application security. Laser focuses on the 10% of vulnerabilities that matter today, and reduces risk faster with prioritized contextualized vulnerabilities. Threat intelligence automatically in the risk improves efficiency enabling fast reaction. Threat intelligence automatically in the risk improves efficiency enabling fast reaction. Aggregate, correlate and contextualize multiple security tools and data sources, providing your business with unprecedented visibility. Break down the silos between application security, operational security, and the business.Starting Price: $3,782.98 per month -
8
OpsLevel
OpsLevel
OpsLevel is the fastest, most flexible Internal Developer Portal, giving your teams complete visibility and control over services, teams, and tech stacks—all in one place. Unlike rigid, DIY solutions, OpsLevel automates catalog creation and maintenance so your developers can spend less time managing metadata and more time shipping great software. With built-in AI-powered insights, automation, and customizable workflows, OpsLevel helps engineering leaders enforce standards, drive migrations, and improve reliability—without friction. From onboarding to incident response, from self-service to security, OpsLevel brings everything together so your teams can move faster with confidence. -
9
JFrog Connect
JFrog
JFrog Connect's unique design takes less than a minute to connect any type of Linux or IoT device. Need to add a thousand devices? Embed the Connect Agent to the image, and you’re ready to go. Comprehensive device management enables you to categorize fleet devices into logical groups and subgroups, making it easy to monitor, manage and update efficiently. Gain complete visibility of your fleet devices at scale. Monitor device resources (CPU, RAM, Disk), state and applications, with automated alerts to keep devices safe, stable and address issues before they become escalations. Securely troubleshoot and resolve device issues from anywhere in the world using SSH, VNC, port forwarding and remote Bash commands. JFrog Connect is a vital component of the JFrog Platform, providing prebuilt integrations with JFrog Artifactory and JFrog Xray, helping organizations deliver updates faster, continuously and securely at every stage of the software lifecycle, from development to deployment. -
10
Kondukto
Kondukto
The Kondukto platform’s flexible design allows you to create custom workflows for responding to risks quickly and efficiently. Take advantage of more than 25 built-in open-source tools ready to run SAST, DAST, SCA, and Container Image scans within minutes without a need for installation, maintenance, or updates. Protect your corporate memory from changes in employees, scanners, or DevOps tools. All security data, statistics, and activities in one place for you to own. Avoid vendor lock or loss of historical data when you need to change an AppSec tool. Verify fixes automatically to ensure better collaboration and less distraction. Boost efficiency by eliminating redundant conversations between AppSec and development teams.Starting Price: $12,000 per annually -
11
Testlemon
Testlemon
Get real, relevant followers, increase impressions, and build your network - all in one place.Starting Price: $10/month -
12
Seeker
Black Duck
Seeker® is an interactive application security testing (IAST) solution that provides unparalleled visibility into your web application's security posture. It identifies vulnerability trends against compliance standards such as OWASP Top 10, PCI DSS, GDPR, CAPEC, and CWE/SANS Top 25. Seeker enables security teams to track sensitive data, ensuring it is handled securely and not stored in log files or databases without proper encryption. Its seamless integration into DevOps CI/CD workflows allows for continuous application security testing and verification. Unlike other IAST solutions, Seeker not only identifies security vulnerabilities but also verifies their exploitability, providing developers with a prioritized list of confirmed issues to address. By employing patented methods, Seeker processes extensive HTTP(S) requests swiftly, reducing false positives to near zero and enhancing productivity while minimizing business risk. -
13
Rezilion
Rezilion
Automatically detect, prioritize and remediate software vulnerabilities with Rezilion’s Dynamic SBOM. Focus on what matters, eliminate risk quickly, and free up time to build. In a world where time is of the essence, why sacrifice security for speed when you can have both? Rezilion is a software attack surface management platform that automatically secures the software you deliver to customers, giving teams time back to build. Rezilion is different from other security tools that create more remediation work. Rezilion reduces your vulnerability backlogs. It works across your stack, helping you to know what software is in your environment, what is vulnerable, and what is actually exploitable, so you can focus on what matters and remediate automatically. Create an instant inventory of all of the software components in your environment. Know which of your software vulnerabilities are exploitable, and which are not, through runtime analysis. -
14
ArmorCode
ArmorCode
Centralize all AppSec findings (SAST, DAST, SCA, etc) and correlate with infrastructure and cloud security vulnerabilities to get a 360o view of you application security posture. Normalize, de-dup and correlate findings to improve risk mitigation efficiency and prioritize the findings that impact the business. A single source of truth for findings and remediations from across tools, teams and applications. AppSecOps is the process of identifying, prioritizing, remediating and preventing Security breaches, vulnerabilities and risks - fully integrated with existing DevSecOps workflows, teams and tools An AppSecOps platform enables security teams to scale their ability to successfully identify, remediate and prevent high-priority application level security, vulnerability, and compliance issues, as well as identify and eliminate coverage gaps. -
15
Tromzo
Tromzo
Tromzo builds deep environmental and organizational context from code to cloud so you can accelerate the remediation of critical risks across the software supply chain. Tromzo accelerates the remediation of risks at every layer from code to cloud. We do this by building a prioritized risk view of the entire software supply chain with context from code to cloud. This context helps our users understand which few assets are critical to the business, prevent risks from being introduced to those critical assets, and automate the remediation lifecycle of the few issues that truly matter. Contextual software asset inventory (code repos, software dependencies, SBOMs, containers, microservices, etc.), so you know what you have, who owns them, and which ones are important to the business. Understand the security posture for every team with SLA compliance, MTTR, and other custom KPIs, so you can drive risk remediation and accountability across the organization. -
16
OES is highly available and scalable for increasing deployment workloads, and extensible to integrate with multiple SDLC tool chains. OES offers easy-to-define custom stages to parallely deploy into any number of targets and save time. Action such as rollback or roll forward or stopping of all the parallel deployments is easy and can be done with a click. Automate repeated activities in your SDLC process by the ability to create as many child pipelines and invoke them in the parent pipeline. OES is modular and can act as a central CD tool for many enterprises because it uses an API-based architecture. Developers across the team can easily integrate external services with Spinnaker services for deployment orchestration.
-
17
Cider
Cider
Gain granular visibility with engineering technologies, systems, and processes, all the way from code to deployment. Easily connect Cider to your ecosystem and seamlessly integrate security without interrupting engineering. Optimize your CI/CD security, based on a set of prioritized risks and recommendations tailored to your environment. Cider seamlessly integrates with all systems across your CI/CD and provides you with a comprehensive and accurate analysis of all technologies, frameworks, and integrations which exist in the environment. Cider maps all intelligent connections within your environment to create end-to-end visibility over the full CI/CD journey, all the way from SCM user to an artifact deployed to production. Assess the posture of your engineering systems and processes. Analyze your environment against realistic attack scenarios and identify the controls required to reduce your CI/CD attack surface.
- Previous
- You're on page 1
- Next