Alternatives to Nexus Repository Pro

Compare Nexus Repository Pro alternatives for your business or organization using the curated list below. SourceForge ranks the best alternatives to Nexus Repository Pro in 2024. Compare features, ratings, user reviews, pricing, and more from Nexus Repository Pro competitors and alternatives in order to make an informed decision for your business.

  • 1
    GitGuardian

    GitGuardian

    GitGuardian

    GitGuardian is a code security platform that provides solutions for DevOps generation. A leader in the market of secrets detection and remediation, its solutions are already used by hundreds of thousands of developers. GitGuardian helps developers, cloud operation, security, and compliance professionals secure software development and define and enforce policies consistently and globally across all systems. GitGuardian solutions monitor public and private repositories in real-time, detect secrets, sensitive files, IaC misconfigurations, and alert to allow investigation and quick remediation. Additionally, GitGuardian's Honeytoken module exposes decoy resources like AWS credentials, increasing the odds of catching intrusion in the software delivery pipeline. GitGuardian is trusted by leading companies, including 66 degrees, Snowflake, Orange, Iress, Maven Wave, DataDog, and PayFit. Used by more than 300K developers, it ranks #1 in the security category on GitHub Marketplace.
  • 2
    Revenera SCA
    Take control of your open source software management. Empower your organization to manage open source software (OSS) and third-party components. FlexNet Code Insight helps development, legal and security teams to reduce open source security risk and manage license compliance with an end-to-end system. FlexNet Code Insight is a single integrated solution for open source license compliance and security. Find vulnerabilities and remediate associated risk while you build your products and during their entire lifecycle. Manage open source license compliance, add automation to your processes, and implement a formal OSS strategy that balances business benefits and risk management. Integrate with build tools, CI/CD and SCM tools, artifact repositories, external repositories or build your own integrations using the FlexNet Code Insight REST API framework to make code scanning easy and effective.
  • 3
    Container Registry
    A no frills Harbor based Container Registry Service for teams, individuals, and Software Vendor looking for ways to distribute software as container images.
    Starting Price: $49 per month
  • 4
    Docker

    Docker

    Docker

    Docker takes away repetitive, mundane configuration tasks and is used throughout the development lifecycle for fast, easy and portable application development, desktop and cloud. Docker’s comprehensive end-to-end platform includes UIs, CLIs, APIs and security that are engineered to work together across the entire application delivery lifecycle. Get a head start on your coding by leveraging Docker images to efficiently develop your own unique applications on Windows and Mac. Create your multi-container application using Docker Compose. Integrate with your favorite tools throughout your development pipeline, Docker works with all development tools you use including VS Code, CircleCI and GitHub. Package applications as portable container images to run in any environment consistently from on-premises Kubernetes to AWS ECS, Azure ACI, Google GKE and more. Leverage Docker Trusted Content, including Docker Official Images and images from Docker Verified Publishers.
  • 5
    GitLab

    GitLab

    GitLab

    GitLab is a complete DevOps platform. With GitLab, you get a complete CI/CD toolchain out-of-the-box. One interface. One conversation. One permission model. GitLab is a complete DevOps platform, delivered as a single application, fundamentally changing the way Development, Security, and Ops teams collaborate. GitLab helps teams accelerate software delivery from weeks to minutes, reduce development costs, and reduce the risk of application vulnerabilities while increasing developer productivity. Source code management enables coordination, sharing and collaboration across the entire software development team. Track and merge branches, audit changes and enable concurrent work, to accelerate software delivery. Review code, discuss changes, share knowledge, and identify defects in code among distributed teams via asynchronous review and commenting. Automate, track and report code reviews.
    Leader badge
    Starting Price: $29 per user per month
  • 6
    Mirantis Secure Registry
    Mirantis Secure Registry (formerly Docker Trusted Registry) provides an enterprise grade container registry solution that can be easily integrated to provide the core of an effective secure software supply chain. Enterprise-grade security Centralize control for container images: Store, share, and manage images from a secure docker registry under your control, enabling developers to use and run only approved images. Protect and verify: Scan images against a continuously updated vulnerability database, and validate with cryptographic signing. Secure and accelerate CI/CD workflows: Automatically promote images from test to prod for a secure, efficient software pipeline—all while maintaining policy-based controls.
  • 7
    MyGet

    MyGet

    MyGet

    The Secure Universal Package Manager. Continuously govern and audit all packages in your DevOps lifecycle. Thousands of teams worldwide trust MyGet with their package management and governance. Accelerate your software team with cloud package management, robust security controls and easy continuous integration build services. MyGet is a Universal Package Manager that integrates with your existing source code ecosystem and enables end-to-end package management. Centralized package management delivers consistency and governance to your DevOps workflow. MyGet real-time software license detection tracks your teams’ package usage and detects dependencies across all of your packages. Customized usage policies ensure your teams are only using approved packages while reporting vulnerabilities and outdated packages early in your software build and release cycles.
    Starting Price: $15 per month
  • 8
    Nexus Repository OSS
    Give your teams a single source of truth for every component they use. Optimize build performance and reliability by caching proxies of remote repositories. Deliver universal coverage for all major package types and formats. Install on an unlimited amount of servers for an unlimited amount of users. Store and distribute Maven/Java, npm, NuGet, Helm, Docker, P2, OBR, APT, GO, R, Conan components and more. Manage components from dev through delivery, binaries, containers, assemblies, and finished goods. Awesome support for the Java Virtual Machine (JVM) ecosystem, including Gradle, Ant, Maven, and Ivy. Streamline productivity by sharing components internally. Gain insight into component security, license, and quality issues. Build off-line with remote package availability. Integrate with industry-leading build tools. Nexus Repository Pro capabilities for your binaries and build artifacts across the entire software supply chain.
  • 9
    JFrog Artifactory
    The Industry Standard Universal Binary Repository Manager. Supports all major package types (over 27 and growing) such as Maven, npm, Python, NuGet, Gradle, Go, and Helm including Kubernetes and Docker as well as integration with leading CI servers and DevOps tools that you already use. Additional functionalities include: - High Availability that scales to infinity with active/active clustering of your DevOps environment and scales as business grows - On-Prem, Cloud, Hybrid, or Multi-Cloud Solution - De Facto Kubernetes Registry managing application packages, operating system’s component dependencies, open source libraries, Docker containers, and Helm charts with full visibility of all dependencies. Compatible with a growing list of Kubernetes cluster providers.
  • 10
    JFrog Platform
    Fully automated DevOps platform for distributing trusted software releases from code to production. Onboard DevOps projects with users, resources and permissions for faster deployment frequency. Fearlessly update with proactive identification of open source vulnerabilities and license compliance violations. Achieve zero downtime across your DevOps pipeline with High Availability and active/active clustering for your enterprise. Control your DevOps environment with out-of-the-box native and ecosystem integrations. Enterprise ready with choice of on-prem, cloud, multi-cloud or hybrid deployments that scale as you grow. Ensure speed, reliability and security of IoT software updates and device management at scale. Create new DevOps projects in minutes and easily onboard team members, resources and storage quotas to get coding faster.
    Starting Price: $98 per month
  • 11
    Helix TeamHub
    Your code repository software is where you store your source code. This might be a Mercurial, Git, or SVN repository. Helix TeamHub can host your source code repository, whether it’s Mercurial, Git, or SVN. You can add multiple repositories in one project — or create a separate project for each repository. Helix TeamHub can host more than your code repositories. You can manage and maintain all of your software assets in one spot. This includes build artifacts (Maven, Ivy) and Docker container registries. It also includes private file sharing through WebDAV repositories for your other binary files. You can use Helix TeamHub on its own or alongside Helix Core to maintain a single source of truth across development teams via Helix4Git. For example, you can keep large binary files in Helix Core, then combine those files with Git assets from Helix TeamHub in a hybrid workspace to achieve high build performance.
    Starting Price: $1.05/month
  • 12
    Azure Container Registry
    Build, store, secure, scan, replicate, and manage container images and artifacts with a fully managed, geo-replicated instance of OCI distribution. Connect across environments, including Azure Kubernetes Service and Azure Red Hat OpenShift, and across Azure services like App Service, Machine Learning, and Batch. Geo-replication to efficiently manage a single registry across multiple regions. OCI artifact repository for adding helm charts, singularity support, and new OCI artifact-supported formats. Automated container building and patching including base image updates and task scheduling. Integrated security with Azure Active Directory (Azure AD) authentication, role-based access control, Docker content trust, and virtual network integration. Streamline building, testing, pushing, and deploying images to Azure with Azure Container Registry Tasks.
    Starting Price: $0.167 per day
  • 13
    Azure Artifacts
    Add fully integrated package management to your continuous integration/continuous delivery (CI/CD) pipelines with a single click. Create and share Maven, npm, NuGet, and Python package feeds from public and private sources with teams of any size. Create and share Maven, npm, NuGet, and Python package feeds from public and private sources. Easily share code across small teams and large enterprises. Get universal artifact management for Maven, npm, NuGet, and Python. Share packages, and use built-in CI/CD, versioning, and testing. Share code effortlessly by storing Maven, npm, NuGet, and Python packages together. And there's no need to store binaries in Git, simply store them using Universal Packages. Keep every public source package you use, including packages from npmjs and nuget.org, safe in your feed where only you can delete it, and where it's backed by the enterprise-grade Azure SLA.
    Starting Price: $6 per user per month
  • 14
    Dist

    Dist

    Dist

    Highly available and super fast artifact repositories and container registries that keep your developers, operations teams, and customers happy and productive. Dist is the simplest and most reliable way to securely distribute Docker container images and Maven artifacts across your team, systems, and customers. Our purpose-built edge network ensures optimal performance, wherever your team and customers are. Dist is fully managed in the cloud. We take care of operations, maintenance, and backups so you can focus on your business. Restrict access to repositories by users and groups. Each user can further compartmentalize their own access using access tokens. All artifacts, container images, and their associated metadata are encrypted at rest and in transit.
    Starting Price: $39 per month
  • 15
    Red Hat Quay
    Red Hat® Quay container image registry provides storage and enables you to build, distribute, and deploy containers. Gain more security over your image repositories with automation, authentication, and authorization systems. Quay is available with OpenShift or as a standalone component. Control access of the registry with multiple identity and authentication providers (including support for teams and organization mapping). Use a fine-grained permissions system to map to your organizational structure. Transport layer security encryption helps you transit between Quay.io and your servers automatically. Integrate with vulnerability detectors (like Clair) to automatically scan your container images. Notifications alert you to known vulnerabilities. Streamline your continuous integration/continuous delivery (CI/CD) pipeline with build triggers, git hooks, and robot accounts. Audit your CI pipeline by tracking API and UI actions.
  • 16
    ProGet

    ProGet

    inedo

    Scan for vulnerabilities and control who can access different feeds and actions, all within minutes of download and fast install. ProGet is self-managed and is available in a powerful free version that can be upgraded as needed. ProGet helps you package applications and components so you can ensure your software is built only once, and then deployed consistently across environments. This means everyone can be certain that what goes to production is exactly what was built and tested. Third-party packages (such as NuGet, npm, PowerShell, and Chocolatey) and Docker containers are also supported, allowing you to enforce quality standards, monitor for open-source licenses, and scan for vulnerabilities across all packages, much earlier in the development cycle. With high availability, load-balancing, and multi-site replication, ProGet can centralize your organization’s software applications and components to provide uniform access to developers and servers.
    Starting Price: $9,995 per year
  • 17
    ActiveState

    ActiveState

    ActiveState

    Protect your software supply chain with the ActiveState Platform. The only turn-key software supply chain that automates and secures importing, building & consuming open source. Available now for Python, Perl & Tcl. Our secure supply chain starts with modern package management that’s 100% compatible with the packages you use, highly-automated, and includes key enterprise features. Automated builds from source code, including linked C libraries. Per-package and per-version vulnerability flagging ensures you can automatically build/rebuild secure environments. A complete Bill of Materials (BOM) including provenance, licensing & all dependencies, including transient, OS & shared dependencies. Built-in virtual environments simplify development, debugging, testing and multi-project work. Web UI, API & CLI for Windows/Linux, with full macOS support soon. Spend less time wrestling with packages, dependencies, and vulnerabilities and more time focused on doing what you do best, coding!
    Starting Price: $167 per month
  • 18
    JFrog Xray
    DevSecOps Next Generation – Securing Your Binaries. Identify security vulnerabilities and license violations early in the development process and block builds with security issues from deployment. Automated and continuous governance and auditing of software artifacts and dependencies throughout the software development lifecycle from code to production. Additional functionalities include: - Deep recursive scanning of components drilling down to analyze all artifacts and dependencies and creating a graph of relationships between software components. - On-Prem, Cloud, Hybrid, or Multi-Cloud Solution - Impact analysis of how an issue in one component affects all dependent components with a display chain of impacts in a component dependency graph. - JFrog’s vulnerabilities database, continuously updated with new component vulnerability data, includes VulnDB, the industry’s most comprehensive security vulnerability database.
  • 19
    JFrog Container Registry
    The world’s most advanced, powerful, hybrid Docker and Helm registry. Power your world of Docker without limits. The JFrog Container Registry is the most comprehensive and advanced registry in the market today, supporting Docker containers and Helm Chart repositories for your Kubernetes deployments. Use it as your single access point to manage and organize your Docker images, while avoiding Docker Hub throttling or retention issues. JFrog provides reliable, consistent, and efficient access to remote Docker container registries with integration to your build ecosystem. Develop and deploy your way. Supports your current and future business model with on-prem / self-hosted, hybrid, and multi-cloud environments on your choice of AWS, Microsoft Azure, and Google Cloud. Built on JFrog Artifactory’s proven track record of power, stability, and resilience to easily manage and deploy your Docker images and provide your DevOps teams with full control over access and permissions.
    Starting Price: $98 per month
  • 20
    RapidFort

    RapidFort

    RapidFort

    Automatically eliminate unused software components and deploy smaller, faster, more secure workloads. RapidFort drastically reduces vulnerability and patch management queues so that developers can focus on building. By eliminating unused container components, RapidFort enhances production workload security and saves developers from unnecessarily patching and maintaining unused code. RapidFort profiles containers to understand what components are needed to run. Run your containers as normal in any environment, dev, test, or prod. Use any container deployment, including Kubernetes, Docker Compose, Amazon EKS, and AWS Fargate. RapidFort then identifies which packages you must keep, enabling you to remove unused packages. Typical improvements are in the 60% to 90% range. RapidFort also provides the option to build and customize remediation profiles, allowing you to pick and choose what to retain or remove.
    Starting Price: $5,000 per month
  • 21
    Amazon Elastic Container Registry (ECR)
    Easily store, share, and deploy your container software anywhere. Push container images to Amazon ECR without installing or scaling infrastructure, and pull images using any management tool. Share and download images securely over Hypertext Transfer Protocol Secure (HTTPS) with automatic encryption and access controls. Access and distribute your images faster, reduce download times, and improve availability using a scalable, durable architecture. Amazon ECR is a fully managed container registry offering high-performance hosting, so you can reliably deploy application images and artifacts anywhere. Meet your organization’s image compliance security requirements using insights from common vulnerabilities and exposures (CVEs) and the Common Vulnerability Scoring System (CVSS). Publish containerized applications with a single command and easily integrate your self-managed environments.
  • 22
    IBM Cloud Container Registry
    Store and distribute container images in a fully managed private registry. Push private images to conveniently run them in the IBM Cloud® Kubernetes Service and other runtime environments. Images are checked for security issues so you can make informed decisions about your deployments. Install the IBM Cloud Container Registry CLI to use the command line to manage your name spaces and Docker images in the IBM Cloud® private registry. View information about potential vulnerabilities and the security of images in the IBM Cloud Container Registry public and private repositories with the IBM Cloud console. Check the security status of container images that are provided by IBM, third parties or that are added to your organization's registry namespace. Advanced capabilities for security compliance insight. Access controls and image signing capabilities. Pre-integration with Kubernetes Service.
  • 23
    DeepSCA

    DeepSCA

    Deepbits Technology

    DeepSCA is a free online AI-powered software composition analysis service for software risk management. It supports various inputs such as binary, APK, JavaScript, Python, docker image, etc., and no source code is required.
  • 24
    IBM Rational Synergy
    A task-based, software configuration management solution that brings together global, distributed development teams on a unified platform. IBM® Rational® Synergy is a task-based, software configuration management (SCM) solution that brings together global, distributed development teams on a unified platform. It provides capabilities that help software and systems development teams work and collaborate faster and easier. IBM Rational Synergy helps software delivery teams manage the complexity of global collaboration and boosts overall productivity. Software changes and tasks are synchronized in real-time, so dispersed teams can collaborate in a cohesive fashion over the global delivery framework. High-performance WAN access allows distributed teams to carry out operations at LAN-like speeds, reducing the overhead of having multiple servers. The single SCM repository manages all artifacts related to software development, including source code, documents, and more.
  • 25
    Bower

    Bower

    Bower

    Web sites are made of lots of things, frameworks, libraries, assets, and utilities. Bower manages all these things for you. Keeping track of all these packages and making sure they are up to date (or set to the specific versions you need) is tricky. Bower to the rescue! Bower can manage components that contain HTML, CSS, JavaScript, fonts, or even image files. Bower doesn’t concatenate or minify code or do anything else, it just installs the right versions of the packages you need and their dependencies. To get started, Bower works by fetching and installing packages from all over, taking care of hunting, finding, downloading, and saving the stuff you’re looking for. Bower keeps track of these packages in a manifest file, bower.json. How you use packages is up to you. Bower provides hooks to facilitate using packages in your tools and workflows. Bower is optimized for the front-end. If multiple packages depend on a package, jQuery, for example, Bower will download jQuery just once.
  • 26
    Xygeni

    Xygeni

    Xygeni Security

    Secure your Software Development and Delivery! Xygeni specializes in Application Security Posture Management (ASPM), using deep contextual insights to effectively prioritize and manage security risks while minimizing noise and overwhelming alerts. Our innovative technologies automatically detect malicious code in real-time upon new and updated components publication, immediately notifying customers and quarantining affected components to prevent potential breaches. With extensive coverage spanning the entire Software Supply Chain—including Open Source components, CI/CD processes and infrastructure, Anomaly detection, Secret leakage, Infrastructure as Code (IaC), and Container security—Xygeni ensures robust protection for your software applications. Trust Xygeni Security to protect your operations and empower your team to build and deliver with integrity and security.
  • 27
    CloudRepo

    CloudRepo

    CloudRepo

    CloudRepo provides fully managed, cloud-based, private repositories. With CloudRepo, developers store and access Public and Private, Maven, and Python repositories in the cloud. CloudRepo stores your maven repositories across multiple physical servers reducing the probability of data loss & maven repository downtime due to hardware failure. We help reduce time and resources spent running unsecured & vulnerable maven repositories, which allows everyone to focus on developing more. Your team has completed all this developing to ultimately distribute your repositories. Use the Software Distribution feature to make sure your repositories get in the right hands.
    Starting Price: $79 per month
  • 28
    Oracle Cloud Container Registry
    Oracle Cloud Infrastructure Container Registry is an open standards-based, Oracle-managed Docker registry service for securely storing and sharing container images. Engineers can easily push and pull Docker images with the familiar Docker Command Line Interface (CLI) and API. To support container lifecycles, Registry works with Container Engine for Kubernetes, Identity and Access Management (IAM), Visual Builder Studio, and third-party developer and DevOps tools. Work with Docker images and container repositories using familiar Docker CLI commands and Docker HTTP API V2. Oracle takes care of operating and patching the service, so that developers can focus on building and deploying containerized applications. Built using object storage, Container Registry provides data durability and high service availability with automatic replication across fault domains. Oracle does not charge separately for the service. Users pay only for the associated storage and network resources they consume.
  • 29
    Yandex Container Registry
    Docker images are placed in fault-tolerant storage. Automatic replication is configured for all data, each replica changes when Docker images are edited, created, or deleted. The service provides containers for Linux and Windows OS. Use them however you want, running on your local machine or on a Yandex Compute Cloud VM. High-speed Docker image operations without expenses for external traffic, Docker image registries are hosted in the same data centers where your cloud infrastructure is deployed. Docker images are transmitted via HTTPS. You choose who can view, pull, push, or delete them. You use a Docker image and we take care of maintaining the infrastructure where your registry is running. You only pay for the space used by your Docker images. You can use the service via the management console, command line interface (CLI), API, or the standard Docker CLI, the service is compatible with the Docker registry HTTP API V2.
    Starting Price: $0.012240 per GB
  • 30
    Alibaba Cloud Container Registry
    Container Registry allows you to manage images throughout the image lifecycle. It provides secure image management, stable image build creation across global regions, and easy image permission management. This service simplifies the creation and maintenance of the image registry and supports image management in multiple regions. Combined with other cloud services such as container service, container registry provides an optimized solution for using Docker in the cloud. Provides an intranet URL of the image repository for each region. You can visit this URL to download images without using traffic. Builds services automatically, in regions outside China, and in stages. Allows you to easily scan the image security status and provides multi-dimensional vulnerability reports. Provides an easy Docker-based continuous integration and continuous delivery solution. Easy operations allow you to quickly start using the service at low management and maintenance costs.
    Starting Price: $113 per month
  • 31
    Google Cloud Container Registry
    With Container Registry your team can manage Docker images, perform vulnerability scans and decide who accesses what resources with precise access control; All in one place. Existing CI / CD integrations allow you to configure fully automated Docker pipelines for information without delay. Get access to private and secure Docker image storage on Google Cloud Platform in minutes. Control who can access, view or download images. Get consistent uptime on a protected infrastructure with Google security. Build and push images to the private registry automatically when you commit code to Cloud Source Repositories, GitHub, or Bitbucket. Easily configure CI / CD pipelines with Cloud Build integration or deploy directly to Google Kubernetes Engine, App Engine, Cloud Functions, or Firebase. Automatically build containers on code or tag changes to a repository. Search across previous builds from the UI or view build details like a trigger, source, steps, and logs.
  • 32
    Slim.AI

    Slim.AI

    Slim.AI

    Easily connect your own private registries and share images with your team. Explore the world’s largest public registries to find the right container image for your project. If you don’t know what’s in your containers, you can’t have software security. The Slim platform lifts the veil on container internals so you can analyze, optimize, and compare changes across multiple containers or versions. Use DockerSlim, our open-source project, to automatically optimize your container images. Remove bulky or dangerous packages, so you ship only what you need to produce. Find out how the Slim platform can help your team automatically improve software and supply chain security, tune containers for development, testing, and production, and ship secure container-based apps to the cloud. Accounts are free and there is no charge to use the platform at this time. We're container enthusiasts, not salespeople, so know that your privacy and security are the founding principles of our business.
  • 33
    Tencent Container Registry
    Tencent Container Registry (TCR) offers secure, dedicated, and high-performance container image hosting and distribution service. You can create dedicated instances in multiple regions across the globe and pull container images from the nearest region to reduce pulling time and bandwidth costs. To guarantee data security, TCR features granular permission management and access control. It also supports P2P accelerated distribution to break through the performance bottleneck due to concurrent pulling of large images by large-scale clusters, helping you quickly expand and update businesses. You can customize image synchronization rules and triggers, and use TCR flexibly with your existing CI/CD workflow to quickly implement container DevOps. TCR instance adopts containerized deployment. You can dynamically adjust the service capability based on actual usage to manage sudden surges in business traffic.
  • 34
    Perforce Helix Core
    Perforce version control — Helix Core — tracks and manages changes to your source code, digital assets, and large binary files. But it does so much more than that. Helix Core helps development teams move faster, even as they develop more complex products. And it provides a single source of truth across development. Contributors can sync their work into Helix Core from the tools they’re already using. Plus, Helix Core can handle everything. 10s of thousands of users. 10s of millions of daily transactions, 100s of terabytes of data. And 10,000+ concurrent commits. It can even deliver files quickly to remote users without the WAN wait. And it can be used on-premises or in the cloud. Spend less time dealing with tools and processes — and more time delivering value. Helix Core ensures that everyone is efficient. You'll get fast feedback, flexibility, and automation for faster builds. Stop wasting your developers’ time with manual workflows — and let them get back to coding.
  • 35
    packagecloud

    packagecloud

    packagecloud

    Fast, reliable, and secure software starts here. A unified, developer-friendly interface for all of your artifacts written in any language, delivered to any infrastructure. Ship securely and quickly knowing your packages are handled by packagecloud. Consistent package repositories, at enterprise scale and startup speed. A single API and CLI for every environment and package type. Works seamlessly and harmoniously with the systems you already use. Manage all of your packages and deploy to any environment, from one beautiful interface, on-premise or in the cloud. Packagecloud supports the most popular package types, from Java to Python to Ruby and Node, and more. Built for teams with collaboration and access control features. Packagecloud just works. Upload any supported package type via a single, consistent API and deploy with ease. We run thousands of tests to ensure correct and consistent behavior even in the face of bugs in the packaging systems themselves.
    Starting Price: $150 per month
  • 36
    InstallAnywhere
    Don’t risk an installation error and poor customer experience. InstallAnywhere is the leading multi-platform solution for developers creating installers for physical, virtual, and cloud environments. InstallAnywhere makes it easy for developers to create professional installation software that performs the same, no matter what the platform. You’ll be able to create reliable installations for on-premises platforms like Windows, Linux, Apple, Solaris, AIX, HP-UX, and IBM, and then deploy them physically, virtually, or to the cloud (you can even package it up into a Docker container) all from a single project file. Whether for standalone instances or integrated into your current systems, with InstallAnywhere, you’ll be able to adapt to industry changes quickly, get to market faster and deliver an engaging customer experience. Reduce software development time and go to market faster. Impress end-users with customized installations. Simplify Virtualization and cloud-based deployments.
    Starting Price: $7,423 per 3 years
  • 37
    Chocolatey

    Chocolatey

    Chocolatey

    Chocolatey has the largest online registry of Windows packages. Chocolatey packages encapsulate everything required to manage a particular piece of software into one deployment artifact by wrapping installers, executables, zips, and/or scripts into a compiled package file. Package submissions go through a rigorous moderation review process, including automatic virus scanning. The community repository has a strict policy on malicious and pirated software. Many organizations face the ongoing challenge of deploying and supporting various versions of software. Chocolatey allows organizations to automate and simplify the management of their complex Windows environments. Our customers have experienced a massive reduction in effort, improved speed of deployment, high reliability, and comprehensive reporting. Reduce complexity, save yourself time, and get up to speed on the latest technologies and approaches.
  • 38
    Cloudsmith

    Cloudsmith

    Cloudsmith

    Cloudsmith is a Software-as-a-Service (SaaS) platform that acts as the single source of truth for software everywhere. We help organisations reliably manage the dependencies, deployment and distribution of their software stack in one centralised place, ensuring their software supply chain remains secure. We are here to empower teams to deliver software faster, without restrictions of managing different asset types, while remaining scalable and cost-efficient. From source to delivery — with complete trust, control, and security.
    Starting Price: $89 per month
  • 39
    Insignary Clarity
    Insignary Clarity is a specialized software composition analysis solution that helps customers gain visibility into the binary code they use by identifying known, preventable security vulnerabilities, while also highlighting potential license compliance issues. It uses unique fingerprint-based technology, which works on the binary-level without the need for source code or reverse engineering. Unlike checksum and hash-based binary code scanners, which are constrained by limited databases of pre-compiled binaries of the most commonly used open source components, Clarity is independent of compile times and CPU architectures. This makes it easy for software developers, value added resellers, systems integrators and security MSPs overseeing software deployments to take proper, preventive action before product delivery. Insignary, the global leader in binary-level, open source software security and compliance, is a venture-backed startup, headquartered in South Korea.
  • 40
    CycloneDX

    CycloneDX

    CycloneDX

    OWASP CycloneDX is a lightweight Software Bill of Materials (SBOM) standard designed for use in application security contexts and supply chain component analysis. Strategic direction and maintenance of the specification is managed by the CycloneDX Core working group, with origins in the OWASP community. A complete and accurate inventory of all first-party and third-party components is essential for risk identification. BOMs should ideally contain all direct and transitive components and the dependency relationships between them. Adopting CycloneDX allows organizations to quickly meet these minimum requirements and mature into using more sophisticated use cases over time. CycloneDX is capable of achieving all SBOM requirements defined in the OWASP Software Component Verification Standard (SCVS).
  • 41
    Nexus Auditor
    Know what production apps are made of. Nexus Auditor automatically generates a software bill of materials to identify open source components used within 3rd party or legacy applications. Get a complete list of open source components included within your app to quickly identify components that violate your open source policies.
  • 42
    FossID

    FossID

    FossID

    Software Composition Analysis (SCA) FossID Workbench enables precise identification of open source components and vulnerabilities. It integrates into software development cycles, providing license recognition, proactive security checks, and detailed compliance reporting. FossID Workbench is available across various industries and helps to ensure that organizations can confidently meet their legal, security, and operational needs in open source software management. Comprehensive Scanning Creates a thorough and complete software bill of materials (SBOM) that catalogs all open source in use, regardless of how it made its way into the codebase. Detailed Reporting Ensures distribution compliance by generating reports, notices files, and copyright statements. Integration & Extensibility Features custom workflows, performing administrative tasks, generating reports, and more with the API.
  • 43
    Black Duck

    Black Duck

    Synopsys

    For over 15 years, security, development, and legal teams around the globe have relied on Black Duck to help them manage the risks that come with the use of open source. Built on the Black Duck KnowledgeBase™—the most comprehensive database of open source component, vulnerability, and license information—Black Duck software composition analysis solutions and open source audits give you the insight you need to track the open source in your code, mitigate security and license compliance risks, and automatically enforce open source policies using your existing DevOps tools and processes. Black Duck provides a comprehensive software composition analysis (SCA) solution for managing security, quality, and license compliance risk that comes from the use of open source and third-party code in applications and containers. Black Duck gives you unmatched visibility into third-party code, enabling you to control it across your software supply chain and throughout the application life cycle.
  • 44
    Snyk

    Snyk

    Snyk

    Snyk is the leader in developer security. We empower the world’s developers to build secure applications and equip security teams to meet the demands of the digital world. Our developer-first approach ensures organizations can secure all of the critical components of their applications from code to cloud, leading to increased developer productivity, revenue growth, customer satisfaction, cost savings and an overall improved security posture. Snyk’s Developer Security Platform automatically integrates with a developer’s workflow and is purpose-built for security teams to collaborate with their development teams. Snyk is used by 1,200 customers worldwide today, including industry leaders such as Asurion, Google, Intuit, MongoDB, New Relic, Revolut and Salesforce. Snyk is recognized on the Forbes Cloud 100 2021, the 2021 CNBC Disruptor 50 and was named a Visionary in the 2021 Gartner Magic Quadrant for AST.
  • 45
    Timesys Vigiles

    Timesys Vigiles

    Timesys Corporation

    The timesys vigiles vulnerability management suite is a best-in-class Software Composition Analysis (sca) and vulnerability management solution optimized for embedded systems built on top of the linux operating system. Vigiles will reveal your exposure for every product and software release, and provide clear engineering guidance on how to remediate vulnerabilities. Now your customers can receive software updates sooner and stay secure throughout the lifecycle. Automatically monitors thousands of reported vulnerabilities and provides unique targeted vulnerability detection for your specific product components, including alerts of new vulnerabilities, summaries of severities and status, and on-demand reports for your projects. Gives you all of the Free version’s vulnerability monitoring features along with powerful vulnerability analysis, triage, and collaboration tools, to enable your team to rapidly prioritize, assess and mitigate security issues.
  • 46
    Portus

    Portus

    Portus

    Portus implements the new authorization scheme defined by the latest version of the Docker registry. It allows for fine grained control over all of your images. You decide which users and teams are allowed to push or pull images. Map your company organization inside of Portus, define as many teams as you want and add and remove users from them. Portus provides an intuitive overview of the contents of your private registry. It also features a search capability to find images even faster. User privileges are constantly taken into account, even when browsing the contents of the repository or when performing searches. Keep everything under control. All the relevant events are automatically logged by Portus and are available for analysis by admin users. Non-admin users can also use this feature to keep up with relevant changes.
  • 47
    Harbor

    Harbor

    Harbor

    CNCF Harbor is an open-source project that enhances container registry capabilities with a focus on security and compliance. It builds upon basic registry functionality by offering features such as vulnerability scanning to identify known security weaknesses in images, role-based access control for granular image access management, image signing to ensure authenticity and prevent tampering, and replication for efficient syncing of images across multiple other registries. Harbor strengthens the security of the image management process. It can be particularly beneficial for organizations that prioritize security and compliance in their containerized environments. However, users should be aware that setting up and maintaining Harbor can require additional effort and expertise compared to simpler container registries. 
  • 48
    Scaleway

    Scaleway

    Scaleway

    The Cloud that makes sense. From high-performance cloud ecosystem to hyperscale green datacenters, Scaleway provides the foundation for digital success. Cloud platform designed for developers & growing companies. All you need to create, deploy and scale your infrastructure in the cloud. Compute, GPU, Bare Metal & Containers. Evolutive & Managed Storage. Network. IoT. The largest choice of dedicated servers to succeed in the most demanding projects. High-end dedicated servers Web Hosting. Domain Names Services. Take advantage of our cutting-edge expertise to host your hardware in our resilient, high-performance and secure data centers. Private Suite & Cage. Rack, 1/2 & 1/4 Rack. Scaleway data centers. Scaleway is driving 6 data centers in Europe and offers cloud solutions to customers in more that 160 countries around the world. Our Excellence team: Experts by your side 24/7 year round Discover how we help our customers to use, tune & optimize their platforms with skilled expert
  • 49
    Rails Assets

    Rails Assets

    Rails Assets

    Rails Assets is the frictionless proxy between Bundler and Bower. It automatically converts the packaged components into gems that are easily droppable into your asset pipeline and stay up to date. First, make sure you use bundler >= 1.8.4. Add Rails Assets as a new gem source, then reference any Bower components that you need as gems. In development, if you have issues with SSL certificates and security is not a priority, you can use the alternate endpoint instead. During bundle install, if Bundler requests a package like this, Rails Assets’ daemon automatically will fetch the component from Bower’s registry, analyze its manifest file, bower.json, repackage the component as a valid Ruby gem and serve it to your application. Dependencies are handled the same way recursively. Gems created by Rails Assets work great with any Sprockets-based application. It works with Sinatra too!
  • 50
    npm

    npm

    npm

    We're npm, Inc., the company behind Node package manager, the npm Registry, and npm CLI. We offer those to the community for free, but our day job is building and selling useful tools for developers like you. Get started today for free, or step up to npm Pro to enjoy a premium JavaScript development experience, with features like private packages. Bring the best of open source to you, your team, and your company. Relied upon by more than 11 million developers worldwide, npm is committed to making JavaScript development elegant, productive, and safe. The free npm Registry has become the center of JavaScript code sharing, and with more than one million packages, the largest software registry in the world. Our other tools and services take the Registry, and the work you do around it, to the next level. At npm, Inc., we're proud to dedicate teams of full-time employees to operating the npm Registry, enhancing the CLI, improving JavaScript security, and other projects.
    Starting Price: $7 per month