Alternatives to Ketryx

Compare Ketryx alternatives for your business or organization using the curated list below. SourceForge ranks the best alternatives to Ketryx in 2024. Compare features, ratings, user reviews, pricing, and more from Ketryx competitors and alternatives in order to make an informed decision for your business.

  • 1
    Matrix Requirements

    Matrix Requirements

    Matrix Requirements

    For companies looking to accelerate development of their innovative medical device technologies, our Application Lifecycle Management and Quality Management Systems (eQMS) are easy-to-use, flexible, all-in-one software solutions designed to facilitate collaboration of employees on design control, and quality management to streamline medical device design. Innovate faster with a flexible item-based approach to documentation designed to control even the most complex SxMD (Software as/in a Medical Device) product design. Enhance quality management and ensure compliance with full traceability from design input to output with a purpose-built software platform that enables a collaborative quality culture across all teams. Ensure frictionless alignment between platforms with native integrations for Jira, GitLab, GitHub, Azure DevOps and more.
    Partner badge
    Compare vs. Ketryx View Software
    Visit Website
  • 2
    qTest

    qTest

    Tricentis

    For faster, safer software releases, you need centralized management and visibility into software testing activities from idea to production. Tricentis qTest helps unify, manage, and rapidly scale testing across the enterprise, so teams can collaborate to ship faster with less risk. Robust testing encompasses a range of testing tools, teams, and test types. Tricentis qTest unites them all, so teams can release more confidently, reduce risk, and identify opportunities to move faster – together. Automate more testing, increase release velocity, and bring teams closer throughout the software development lifecycle. Keep QA and development in sync with native DevOps tool integrations, including Jira, Jenkins, and GitHub. Trace tests and defects back to requirements and development with a complete audit trail and align teams with full-cycle, cross-project reporting. ​
    Compare vs. Ketryx View Software
    Visit Website
  • 3
    Kiuwan Code Security
    Security Solutions For Your DevOps Process. Automatically scan your code to identify and remediate vulnerabilities. Compliant with the most stringent security standards, such as OWASP and CWE, Kiuwan Code Security covers all important languages and integrates with leading DevOps tools. Effective static application security testing and source code analysis, with affordable solutions for teams of all sizes. Kiuwan includes a variety of essential functionality in a single platform that can be integrated directly into your internal development infrastructure. Fast Vulnerability Detection: Easy and instant setup. Start scanning and get results in just minutes. DevOps Approach To Code Security: Integrate Kiuwan with your Ci/CD/DevOps pipeline to automate your security process. Flexible Licensing Options: Plenty of options, one time scans or continuous scanning. Kiuwan also offers a Saas or On-Premise model.
  • 4
    Finite State

    Finite State

    Finite State

    Finite State manages risk across the software supply chain with comprehensive SCA and SBOMs for the connected world. By providing end-to-end SBOM solutions, Finite State enables Product Security teams to meet regulatory, customer, and security demands. Finite State's best-in-class binary SCA creates visibility into any-party software that enables Product Security teams to understand their risk in context and shift right on vulnerability detection. With visibility, scalability, and speed, Finite State correlates data from all of your security tools into a single pane of glass for maximum visibility.
  • 5
    axe DevTools

    axe DevTools

    Deque Systems

    Automate digital accessibility with the most comprehensive testing tools for developers. Axe DevTools will save you and your development team money, time, and effort. Deliver with AI: Automated intelligence makes it easy. Our computer vision provides more accessibility coverage in more places faster than any other tool. Integrate Immediately: From the first scan, axe DevTools is immediately part of your dev process – with a single call from your build. Block bad code with Github Actions: Accessibility does align with rapid release cycles. Know exactly where to start. Check your impact. See what’s left to test. Measure your success over time. DIY isn't Sustainable: Digital asset patterns and trends change constantly. Our AI data pipeline keeps you ahead of the curve with real time data from thousands of actual users.
    Starting Price: $45/month/user
  • 6
    Revenera SCA

    Revenera SCA

    Revenera

    Take control of your open source software management. Empower your organization to manage open source software (OSS) and third-party components. FlexNet Code Insight helps development, legal and security teams to reduce open source security risk and manage license compliance with an end-to-end system. FlexNet Code Insight is a single integrated solution for open source license compliance and security. Find vulnerabilities and remediate associated risk while you build your products and during their entire lifecycle. Manage open source license compliance, add automation to your processes, and implement a formal OSS strategy that balances business benefits and risk management. Integrate with build tools, CI/CD and SCM tools, artifact repositories, external repositories or build your own integrations using the FlexNet Code Insight REST API framework to make code scanning easy and effective.
  • 7
    Mend.io

    Mend.io

    Mend.io

    Trusted by the world's leading companies, including IBM, Google, and Capital One, Mend.io's enterprise suite of application security tools is designed to help you build and manage a mature, proactive AppSec program. Mend.io understands the different AppSec requirements of developers and security teams. Unlike other AppSec solutions that force everyone to use a single tool, Mend.io helps them work in harmony by giving each team different, but complementary, tools - enabling them to stop chasing vulnerabilities and start proactively managing application risk.
    Starting Price: $12,000 per year
  • 8
    SCANOSS

    SCANOSS

    SCANOSS

    SCANOSS believes now is the time to reinvent Software Composition Analysis with a goal of ‘start left’ and a focus first on the foundation of reliable SCA, the SBOM. An SBOM that does not require a small army of auditors to make it usable. So, SCANOSS provides an SBOM that that is ‘always on’. SCANOSS released the first entirely Open Source SCA software platform for Open Source Inventorying, specifically designed for modern development (DevOps) environments. SCANOSS also released the first Open OSS Knowledge Base, free to the community. Our architecture is API-centric, built for developers. The “shift left” paradigm brings license compliance validation to the earliest possible stage in a development process. We can go as left as intercepting a CTRL-V in your IDE before undeclared Open Source is pasted. The first Open Source Inventorying engine built specifically for modern development and DevOps teams of all sizes.
    Starting Price: $0
  • 9
    ReversingLabs Titanium Platform
    A complete advanced malware analysis platform that speeds destructive file detection through automated static analysis. Delivered in any cloud, any environment, for every part of the enterprise. Over 360 file formats processed and 3600 file types identified from diverse platforms, applications & malware families. Real-time, deep inspection of files, scalable to 150 million files per day without dynamic execution. Tightly coupled connectors integrate industry leading email, EDR, SIEM, SOAR, and analytics platforms. Unique Automated Static Analysis fully dissects internal contents of files in 5 ms without execution, obviating the need for dynamic analysis in most cases. Empower dev and AppSec teams with the industry-leading SBOM that delivers a full and accurate software picture through dependency, malicious behavior and tampering visibility, that accelerates confident release and compliance, while giving the SOC deep software threat intelligence to isolate and respond.
  • 10
    Panoptica

    Panoptica

    Cisco

    Panoptica makes it easy to secure your containers, APIs, and serverless functions, and manage software bills of materials. It analyzes internal and external APIs and assigns risk scores. Your policies govern which API calls the gateway permits or disables. New cloud-native architectures allow teams to develop and deploy software more quickly, keeping up with the pace of today’s market. But this speed can come with a cost—security. Panoptica closes the gaps by integrating automated, policy-based security and visibility into every stage of the software-development lifecycle. Decentralized cloud-native architectures have significantly increased the number of attack surfaces. At the same time, changes in the computing landscape have raised the risk of catastrophic security breaches. Here are some of the reasons why comprehensive security is more important than ever before. You need a platform that protects the entire application lifecycle—from development to runtime.
    Starting Price: $0
  • 11
    Chainguard

    Chainguard

    Chainguard

    Out-of-date software is a major factor in security breaches. Our images are continuously updated with new versions and fixes. Our images come with SLAs that guarantee that we will provide patches or mitigations for vulnerabilities within an agreed time frame. Our images aim for zero-known vulnerabilities. No more spending hours analyzing reports from scanning tools. Our team has a deep understanding of the entire problem space, creating some of the most successful foundational open source projects in this domain. We know that automation, without sacrificing developer productivity, is key. Enforce generates a real-time asset inventory database to power developer tooling, incident recovery, and audit automation. Enforce can be used to generate SBOMs, monitor running containers for CVEs, and protect infrastructure against insider attacks.
  • 12
    Phylum

    Phylum

    Phylum

    Phylum is a security-as-code platform that gives security and risk teams more visibility into the code development lifecycle, and the ability to enforce security policy without disrupting innovation. Phylum analyzes open-source software packages as they are published and contextualizes the risks, protecting developers and applications at the perimeter of the open-source ecosystem and the tools used to build source code. The platform can be deployed on endpoints or plug directly into CI/CD pipelines so organizations experience seamless, always-on defense at the earliest stages of a build.
  • 13
    Kusari

    Kusari

    Kusari

    Kusari’s platform offers "always-on transparency” for the visibility and insights you need. Secure your software development lifecycle end-to-end, powered by open source GUAC and open standards. Understand the composition of any software artifact with GUAC, a queryable open-source knowledge graph. Evaluate artifacts before you ingest them, and create policies to automatically prevent risky or vulnerable dependencies from entering your supply chain. Make your development process secure by default without interrupting developer workflows. Kusari meets you where you are by integrating with your existing IDE and CI/CD tools. Put software supply chain security best practices on autopilot, ensuring the integrity of each build and generating the metadata to prove it.
  • 14
    Xygeni

    Xygeni

    Xygeni Security

    Secure your Software Development and Delivery! Xygeni specializes in Application Security Posture Management (ASPM), using deep contextual insights to effectively prioritize and manage security risks while minimizing noise and overwhelming alerts. Our innovative technologies automatically detect malicious code in real-time upon new and updated components publication, immediately notifying customers and quarantining affected components to prevent potential breaches. With extensive coverage spanning the entire Software Supply Chain—including Open Source components, CI/CD processes and infrastructure, Anomaly detection, Secret leakage, Infrastructure as Code (IaC), and Container security—Xygeni ensures robust protection for your software applications. Trust Xygeni Security to protect your operations and empower your team to build and deliver with integrity and security.
  • 15
    Scribe Security Trust Hub
    Scribe is a SaaS solution that provides continuous assurance for the security and trustworthiness of software artifacts, acting as a trust hub between software producers and consumers. Scribe centralized SBOM management system allows to effortlessly manage and share products SBOMs along with all their associated security aspects in a controlled and automated manner. SCRIBE KEY FEATURES: *Gain visibility and control the risk of all your products’ security aspects. *Trust but verify: streamline security guardrails to verify secure SDLC policy, based on trusted evidence. *Simplify secure SDLC processes, balancing responsibilities between dev and security teams. *Detect code tampering and software factory exploitations. *Enforce and demonstrate compliance with regulations and best practices. *Share SBOMs and security insights in a controlled manner with stakeholders.
    Starting Price: Free
  • 16
    Endor Labs

    Endor Labs

    Endor Labs

    Simplified dependency lifecycle management lies at the heart of both supply chain security and developer productivity. Endor Labs helps security and dev teams accelerate development by safely maximizing software reuse. Reduce the overall amount of dependencies with a better selection process, and eliminate of unused dependencies. Identify the vulnerabilities that matter, and use dozens of leading indicators of risk to defend against software supply chain attacks. Get out of dependency hell faster by identifying and remediating bugs and security issues in your dependency chain. Increased productivity for dev and security teams. By maximizing software reuse, minimizing false positives, and making it easier for security and development teams to select, secure, and maintain dependencies, Endor Labs helps organizations focus on shipping value-adding code. Get complete visibility into your dependency network across repos. Who is using what, and who depends on who.
  • 17
    JFrog Xray
    DevSecOps Next Generation – Securing Your Binaries. Identify security vulnerabilities and license violations early in the development process and block builds with security issues from deployment. Automated and continuous governance and auditing of software artifacts and dependencies throughout the software development lifecycle from code to production. Additional functionalities include: - Deep recursive scanning of components drilling down to analyze all artifacts and dependencies and creating a graph of relationships between software components. - On-Prem, Cloud, Hybrid, or Multi-Cloud Solution - Impact analysis of how an issue in one component affects all dependent components with a display chain of impacts in a component dependency graph. - JFrog’s vulnerabilities database, continuously updated with new component vulnerability data, includes VulnDB, the industry’s most comprehensive security vulnerability database.
  • 18
    Deepfactor

    Deepfactor

    Deepfactor

    Help developers automatically discover, prioritize, and remediate application risks early in development and testing. Deepfactor detects runtime security risks in filesystem, network, process, and memory behavior including exposing sensitive information, insecure programming practices, and prohibited network communications. Deepfactor generates software bills of materials in CycloneDX format to comply with executive orders and enterprise supply chain security requirements. Deepfactor maps vulnerabilities to compliance standards (SOC 2 Type 2, PCI DSS, NIST 800-53) to reduce compliance risks. Deepfactor generates prioritized insights that enable developers to pinpoint insecure code, streamline remediation, analyze drift between releases, and understand potential impact to compliance objectives.
  • 19
    Rezilion

    Rezilion

    Rezilion

    Automatically detect, prioritize and remediate software vulnerabilities with Rezilion’s Dynamic SBOM. Focus on what matters, eliminate risk quickly, and free up time to build. In a world where time is of the essence, why sacrifice security for speed when you can have both? Rezilion is a software attack surface management platform that automatically secures the software you deliver to customers, giving teams time back to build. Rezilion is different from other security tools that create more remediation work. Rezilion reduces your vulnerability backlogs. It works across your stack, helping you to know what software is in your environment, what is vulnerable, and what is actually exploitable, so you can focus on what matters and remediate automatically. Create an instant inventory of all of the software components in your environment. Know which of your software vulnerabilities are exploitable, and which are not, through runtime analysis.
  • 20
    OX Security

    OX Security

    OX Security

    Automatically block risks introduced into the pipeline and ensure the integrity of each workload, all from a single location. Full visibility and end to end traceability over your software pipeline security from cloud to code. Manage your findings, orchestrate DevSecOps activities, prevent risks and maintain software pipeline integrity from a single location. Remediate risks based on prioritization and business context. Automatically block vulnerabilities introduced into your pipeline. Immediately identify the “right person” to take action on any security exposure. Avoid known security risks like Log4j and Codecov. Prevent new attack types based on proprietary research and threat intel. Detect anomalies like GitBleed. Ensure the security and integrity of all cloud artifacts. Undertake security gap analysis and identify any blind spots. Auto-discovery and mapping of all applications.
    Starting Price: $25 per month
  • 21
    Stacklok

    Stacklok

    Stacklok

    Software is eating the world. Hostile, sophisticated actors will ultimately eat the software industry if left unchecked. We build open source software that developers love, which in turn makes the world a safer place for all. From developers workflow to a running workload, end-to-end provenance and insight Software supply chain vulnerabilities are not a new phenomenon. Whether it is open source or proprietary software, some of the most significant exploitations in the history of software can be traced back to the software supply chain.
  • 22
    Deepbits

    Deepbits

    Deepbits Technology

    Deepbits Platform, built on years of top-notch academic research, generates software bill of materials (SBOMs) directly from application binaries to firmware images and continuously protects digital assets by integrating itself into the software supply chain lifecycle. - without accessing any source code
    Starting Price: $0
  • 23
    Lineaje SBOM360
    Eagle-eyes over your software factory​. Know what’s in your software with the world’s most advanced SBOM manager​. SBOM360 is the industry’s first SBOM manager supporting full life-cycle management of thousands of SBOMs for all software you source, build, sell, or buy.​ Ensure all your software meets your security policies and compliance mandates automatically. Search your software inventory in seconds.​ Know your riskiest applications at a glance. Our amazing security profiler automatically shows you your riskiest applications and components, automatically quantified and prioritized for you. Easily justify software maintenance investments and their direct impact on software quality and your business​​.​ Insert function-driven policy gates for each stage of software development. Cascade them down automatically to all your organizations and projects, driving scans and remediations at scale.
    Starting Price: Free
  • 24
    SOOS

    SOOS

    SOOS

    Industry-low pricing for SCA, DAST and SBOM management. SOOS SCA gives you everything you need in an SCA solution for one low price. SOOS DAST integrates into your build pipeline and consolidates DAST test results with SCA vulnerability scans in a single powerful web dashboard. Assembling a comprehensive SBOM from third party software or open source components is easy with SOOS SBOM Manager. Ingest, manage, and continually monitor third party SBOMs. Add SBOMs generated by your in house software developers using SOOS SCA. Use our API to access any of our 54M+ open source SBOMs. SOOS makes it easy to comply with government SBOM regulations and mandates.
    Starting Price: $0 per month
  • 25
    Arnica

    Arnica

    Arnica

    Put your software supply chain security on autopilot. Actively mitigate anomalies & risks in your development ecosystem, protect developers, and trust their code commits. Automate developer access management. Behavior-based developer access management with self-service provisioning in Slack or Teams. Continuously monitor and mitigate anomalous developer behavior. Identify hardcoded secrets. Validate and mitigate before they land in production. Go beyond SBOM and get visibility into all open-source licenses, infrastructure, vulnerabilities, and OpenSSF scorecards across your organization in minutes. Arnica is a behavior-based software supply chain security platform for DevOps. Arnica proactively protects your software supply chain by automating the day-to-day security operations and empowering developers to own security without incurring risks or compromising velocity. Arnica enables you to automate constant progress toward the least-privilege for developer permissions.
    Starting Price: Free
  • 26
    FOSSA

    FOSSA

    FOSSA

    Scalable, end-to-end management for third-party code, license compliance, and Open Source has become the critical supplier for modern software companies, changing everything about how people think about their code. FOSSA builds the infrastructure for modern teams to be successful with open source. FOSSA's flagship product helps teams track the open source used in their code and automate license scanning and compliance. Since then, over 7,000 open source projects (Kubernetes, Webpack, Terraform, ESLint) and companies ( Uber, Ford, Zendesk, Motorola) rely on FOSSA's tools to ship software. If you are in the software industry today, you're now using code that runs FOSSA. FOSSA is a venture-funded company backed by Cosanoa Ventures, Bain Capital Ventures, etc. with affiliate angels including Marc Benioff (Salesforce), Steve Chen (YouTube), Amr Awadallah (Cloudera), Jaan Tallin (Skype), and Justin Mateen (Tinder).
    Starting Price: $230 per month
  • 27
    aDolus FACT Platform

    aDolus FACT Platform

    aDolus Technology

    The aDolus FACT platform provides dynamic visibility into the software supply chain for critical systems. It generates continuous risk intelligence for CISOs and product security executives, providing real-time visibility, peace of mind, proactive cost-effective compliance, and invaluable insights. FACT hunts and correlates information from many sources about IT, ICS, IIoT, and IoT software supply chains. It then provides unprecedented visibility —right down into the very bits of the software— to prevent the installation of unsafe software in critical systems. We use artificial intelligence (AI) techniques to correlate data across components, products and products lines, and produce a trust score for software as well as enriched Software Bill of Materials (SBOMs).
  • 28
    Enso

    Enso

    Enso Security

    Enso is transforming application security by empowering organizations to build, manage and scale their AppSec programs. Its Application Security Posture Management (ASPM) platform easily deploys into an organization’s environment to create an actionable, unified inventory of all application assets, their owners, security posture and associated risk. With Enso Security, AppSec teams gain the capacity to manage the tools, people and processes involved in application security, enabling them to build a simplified, agile and scalable application security program without interfering with development. Enso has been recognized with numerous awards including the 2022 Excellence Awards, Globee Awards, and Forbes Top 20 Cybersecurity Startups to Watch.
  • 29
    StartProto

    StartProto

    StartProto

    StartProto seamlessly integrates with your existing workflows. From quote to cash, modernize all your manufacturing processes and optimize your operations with our lightweight but powerful software. Accurately calculating the cost of producing parts or services is crucial for job shops in order to stay competitive and profitable. With traditional quoting methods, it can be difficult to take into account all the necessary factors, such as run time, setup time, and material cost, leading to inaccuracies and potential financial losses. Our software allows job shops to take into account all these factors in the quoting process. By incorporating run time, setup time, and material cost into the calculation, manufacturers can produce more accurate quotes and avoid underbidding or overcharging for their products and services. This helps to stay competitive in the market, by providing transparent and fair prices to customers.
    Starting Price: $99 per month
  • 30
    Snyk

    Snyk

    Snyk

    Snyk is the leader in developer security. We empower the world’s developers to build secure applications and equip security teams to meet the demands of the digital world. Our developer-first approach ensures organizations can secure all of the critical components of their applications from code to cloud, leading to increased developer productivity, revenue growth, customer satisfaction, cost savings and an overall improved security posture. Snyk’s Developer Security Platform automatically integrates with a developer’s workflow and is purpose-built for security teams to collaborate with their development teams. Snyk is used by 1,200 customers worldwide today, including industry leaders such as Asurion, Google, Intuit, MongoDB, New Relic, Revolut and Salesforce. Snyk is recognized on the Forbes Cloud 100 2021, the 2021 CNBC Disruptor 50 and was named a Visionary in the 2021 Gartner Magic Quadrant for AST.
    Starting Price: $0
  • 31
    Fianu

    Fianu

    Fianu

    Fianu monitors activity throughout your DevOps toolchain and generates an immutable, context-aware ledger of attestations that tells the story of your software leading up to production. Capture key security data points using pre-built integrations with your favorite security tools. Monitor and enforce best practices such as code review, branching strategy, and versioning scheme. Ensure software meets necessary functional, performance, and accessibility standards. Create or configure custom controls to meet the unique needs of your company. Out-of-the-box tooling to help you secure your software supply chain from development, to build, to deployment. Configurable control requirements and thresholds provide executives, managers, and stakeholders with the knobs and dials necessary to fine-tune compliance to your company's needs.
  • 32
    sbomify

    sbomify

    sbomify

    sbomify revolutionizes the management of Software Bill of Materials (SBOM) by providing a centralized platform that connects software vendors and buyers. This advanced solution enhances transparency and security across the software supply chain. sbomify simplifies stakeholder engagement by allowing easy invitations and ensuring everyone always has access to the latest SBOM updates. By centralizing SBOMs in one accessible hub, it streamlines the distribution and management process, promoting better collaboration between vendors and buyers. This not only simplifies compliance with regulatory standards but also enhances the security and efficiency of the software ecosystem. With sbomify, managing SBOMs is effortless, ensuring all stakeholders remain informed and up-to-date.
    Starting Price: £49/month
  • 33
    Anchore

    Anchore

    Anchore

    DevSecOps at full speed with deep inspection of container images and policy-based compliance. In an environment where application development must be fast and flexible, containers are the future. Adoption is accelerating, but with it comes risk. Anchore makes it possible to manage, secure, and troubleshoot containers continuously, without sacrificing speed. It delivers a process that allows container development and deployment to be secure from the start, by ensuring that the contents of your containers match the standards that you define. The tools are transparent to developers, visible to production, accessible to security, and all designed for the fluid nature of containers. Anchore sets a trusted standard for containers. It empowers you to certify your containers, making them predictable and protectable. So you can deploy containers with confidence. Protect against risks using a complete container image security solution.
  • 34
    CAST SBOM Manager
    CAST SBOM Manager enables users to automatically create, customize, and maintain Software Bill of Materials (SBOMs) with the ultimate level of control and flexibility. It detects open source dependencies and related risks (vulnerabilities and security advisories, licenses, obsolescence) directly from scanning source code, and allows you to create and maintain SBOM metadata over time (proprietary components, custom licenses, vulnerabilities) and much more.
    Starting Price: Free
  • 35
    MergeBase

    MergeBase

    MergeBase

    With the lowest false positive software composition analysis (SCA) scanner, comprehensive software bill of materials (SBOM) engine, and patented Java Dynamic Application Hardening capability, MergeBase provides the only software supply chain security solution offering real-time DevSecOps visibility of third-party risk from development into operation covering all major languages from C/C++, .NET, JavaScript/NPM to Java.
    Starting Price: $380 per month
  • 36
    CycloneDX

    CycloneDX

    CycloneDX

    OWASP CycloneDX is a lightweight Software Bill of Materials (SBOM) standard designed for use in application security contexts and supply chain component analysis. Strategic direction and maintenance of the specification is managed by the CycloneDX Core working group, with origins in the OWASP community. A complete and accurate inventory of all first-party and third-party components is essential for risk identification. BOMs should ideally contain all direct and transitive components and the dependency relationships between them. Adopting CycloneDX allows organizations to quickly meet these minimum requirements and mature into using more sophisticated use cases over time. CycloneDX is capable of achieving all SBOM requirements defined in the OWASP Software Component Verification Standard (SCVS).
  • 37
    GxQuality

    GxQuality

    GalaxE.Solutions

    Automated Software Quality Control Application GxQuality™ provides end-to-end quality assurance leveraging automation to generate test scenarios and data which validates project test results leveraging CI/CD, CV. This solution builds traceability to test conditions and test data with the availability of onshore/offshore team managed services. We specialize in comprehensive, enterprise wide testing solutions including DevOps, CI/CD, CV and release management solutions.
  • 38
    Binarly

    Binarly

    Binarly

    Detect and remediate known and unknown vulnerabilities at every step of the device and software supply chain. That's why, instead of merely mapping binaries to a list of known vulnerabilities, we go beneath the surface to understand how the code executes, enabling us to detect defects, not just the binaries. This approach allows Binarly to identify entire classes of defects, beyond just known issues, and to do so more rapidly with near-zero false positives. Identifying known and previously unknown vulnerabilities and malicious behavior – not just hashes or signature matching. Extending insight beyond the CVE, showing which vulnerabilities exist at the binary level. Reducing alert fatigue through the use of machine learning to achieve near-zero false positives.
  • 39
    Nexus Intelligence
    The whole truth about open source risk. Alternative tools are prone to false positives and negatives because they scan apps “as declared” and trust developers to disclose the truth about dependencies embedded in software. Nexus scans apps “as deployed” utilizing Advanced Binary Fingerprinting (ABF). The result is a precise read on embedded dependencies and a Software Bill of Materials (SBOM) that reflects the truth about third-party risk. ABF identification utilizes cryptographic hash for binaries, structural similarity, derived coordinate, and file name. It can even identify renamed or modified components whether they were declared or not, misnamed, or added to the code base manually. The recent Octopus Scanner is a great example of why scanning the manifest is not "good enough" to identify malicious components being injected into our software supply chains.
  • 40
    Digital.ai Release
    Digital.ai Release (formerly XebiaLabs XL Release) is a release management tool specifically for CD. It enables teams across an organization to model & monitor releases, automate tasks within IT infrastructure, and cut release times by analyzing and improving release processes. Automate, orchestrate and get visibility into your release pipelines – at enterprise scale. Manage the most advanced release pipelines with ease. Plan, automate, and analyze the entire software release pipeline. Control and optimize software delivery. Always know the status of automated and manual steps across the release pipeline. Identify bottlenecks, reduce errors, and lower the risk of release failures. Monitor your entire release pipeline to get a clear view and up-to-date status information across tools and systems, from code to production. Customize dashboards to highlight the most important information for each release.
  • 41
    TestGear

    TestGear

    TestGear

    Run any test, adapt to any testing framework, get crystal clear reporting, and boost team collaboration. Provides you with a single space for automated and manual testing with transparent reporting. Has frequent releases and fast customer support. Works seamlessly with bug trackers, task trackers, CI/CD systems, and webhook tools. Traceability and transparency throughout TestGear make communicating within your team easily as a walk in the park. No more slow-release time to market. Find how TestGear saves time and cuts costs. Scroll down for a tour of our major features and how they can help you get around 50% less hassle. Create steps, save them, and use them everywhere. Develop checklists and reduce time to writing tests. Set the desired duration, TestGear will distribute tests to team members evenly. Track the lifecycle, version, and actions of any test artifact. Link test cases, defects, and requirements.
    Starting Price: €37 per month
  • 42
    API Swan

    API Swan

    API Swan

    Elevate your development process with our robust API solution, and ensure stability, performance, and reliability in every release. Seamless Integration with CI/CD, forging a cohesive development pipeline. API Swan is driven by the mission to forge a software testing platform that stands as the pinnacle of affordability and reliability, designed expressly for engineering teams navigating the early-growth stage startup terrain. Ship products at 10x velocity, and catch more bugs, effortlessly. 24/7 application monitoring for uninterrupted performance. Auto-generates regression tests from network traffic. Cutting-edge automated test case design, seamlessly entwined within your workflow. Effortless automatic documentation of APIs and schemas, saving precious time.
    Starting Price: $89 per month
  • 43
    RIB Project

    RIB Project

    RIB Software

    Ensure controlled and efficient project communication and collaboration between all stakeholders from the office to the field. Improve project outcomes, reduce rework risks and get full documentation and traceability throughout the entire project lifecycle. RIB Project helps you manage and share all project information from precon to closeout. Connect disperse teams, get seamless collaboration across disciplines and stakeholders, and communicate effectively to increase day-to-day efficiency. Reduce rework, delays and miscommunication with standardized and automated workflows and approval procedures. Guarantees that teams only receive relevant material, improve coordination and enhance constructability on your projects. Keep track of all relevant project information in one place and get a complete overview. Get full documentation and traceability into all actions and files in your project. Resolve any potential disputes using the non-editable file log.
    Starting Price: Free
  • 44
    Rekon

    Rekon

    Rekon Technologies

    Rekon's flagship software solution prepares lien releases and assignments and automatically applies the unique requirements of more than 3,600 recording offices, significantly reducing recording errors and penalties. Rekon stores and updates all recording requirements and stays in constant communication with local recording offices so that any changes are quickly incorporated into the software. Rekon automates tasks, including data entry, calculating recording fees and generating checks for payment. Workflows are automatically assigned and time spent on every work queue is tracked, enabling servicers to measure and improve staff productivity. The vast number of recording requirements makes it nearly impossible to manually record lien releases and assignments without error, which can result in costly delays. Rekon’s elegant technology solution streamlines the entire process so servicers are always in control of their documents.
  • 45
    BerryCord

    BerryCord

    DigitalBerry

    In the “all-digital” era, information system data traceability is a major challenge. Based on a private Hyperledger blockchain, BerryCord automates the collection of digital evidence as required by law or auditors. Online contracts, compliance audits, risk management, digital consent collection, and internal surveys are some of the many situations where your company needs to be able to track the actions performed in your information system and business applications in order to provide comprehensible evidence. BerryCord uses a private blockchain that provides you with real-time data traceability features as well as securing access to this data. The data is analyzed and classified according to defined categories and the content of files. A PDF file including the data from the evidence file as well as the technical traces are generated automatically. Blockchain technology guarantees the integrity, traceability, and non-repudiation of data.
  • 46
    Behave Pro

    Behave Pro

    Behave Pro

    Native to Jira, the whole team can easily collaborate on great user stories using the simple editor that includes step completion, scenario or scenario outline detection, and automatic formatting of tables. With features such as ‘questions’ and ‘ready’, tracking of scenario changes, and support for 25+ languages, agile teams write better user stories and ensure shared understanding before development work starts. Teams need to store feature files in Git, and the secure two-way synchronization between Jira and your repository facilitates ongoing involvement and collaboration of all team members throughout the development lifecycle. Each completed user story is automatically grouped by feature as a living document, automated test results are fully traceable to user stories, and a powerful search allows teams to quickly locate important information. Automated acceptance tests for Cucumber are created from feature files, with full requirements traceability.
    Starting Price: $10 per month
  • 47
    Verisurf

    Verisurf

    Verisurf

    Manufacturers require more reporting, traceability, and continuity of data than ever before. Intelligent 3D CAD models are now the standard design authority in manufacturing and continue the digital thread throughout manufacturing. Verisurf metrology software lets you see the difference between the nominal CAD design and the finished machine part in real time. Perfect for a fast, in-process first article or automated production inspection that improves your manufacturing enterprise. Significantly reduce inspection plan setup from hours to minutes with almost no learning curve. Use any CMM in a revolutionary, click-and-build visual interface. Automate quality processes with repeatable measurement plans for any portable, manual, or programable CMM. Identify deviation and tolerance conditions between measured parts and nominal CAD in a premium user experience. Inspect drawings or CAD models with intelligent MBD and measure primitive features or complex profiles directly.
  • 48
    ReleaseIQ

    ReleaseIQ

    ReleaseIQ

    ReleaseIQ helps companies accelerate software product release cycles while improving quality and efficiency with an Enterprise DevOps Platform that leverages existing CI/CD tools, if present, and: - provides visibility into every step of every pipeline, from commit to production, delivered in role-focused dashboards to ensure that all stakeholders have the same information in near real time. - integrates orchestration with intelligent diagnosis and troubleshooting to dramatically increase productivity and reduce MTTR. - highlights actionable insights to empower teams to drive continuous improvement.
  • 49
    Compleo Hybrid
    Simplify and automate your document management process. Compleo Hybrid is a Windows and web-based digital document management solution. It consists of various secure modules and services ready to be tailored to perfectly address your needs. To transform workflow business documents released by ERP or applications, enterprises need an external digital document management solution that leverages modern communications technologies. Such architecture brings flexibility and requires less effort to implement and operate, while providing as much security as an ERP extension by using certified SAP, IBMi, or secured web API dialog connectors. Such architecture is mandatory when dealing with SaaS applications. Complete Hybrid addresses each individual step in transforming, converting, and delivering business documents. It creates an efficient workflow that is secured, timely, and traceable, from document release to delivery.
  • 50
    RapidDeploy

    RapidDeploy

    MidVision

    Automate middleware provisioning and carry out reliable, regular and repeatable automated software deployments, with self-documenting and easily shareable deployment plans. Link tasks together into complex orchestrations, and carry them out with the click of a button. Visualize them clearly and control them easily via the RapidDeploy orchestration pane. Organize your organization’s release cycle with privilege and approval gates for improved efficiency, and gain the ability to deploy regularly into production as soon as updates are made. RapidDeploy is a powerful application release and deployment automation tool. Built for DevOps teams and enterprise continuous delivery, RapidDeploy delivers consistent high-volume deployments so your teams can focus on developing. We’ve been helping our customers realize the significant productivity gains that can be achieved through automating releases since 2008, and our engineers and consultants have accrued a wealth of expertise in this space.
    Starting Price: $1500.00/year