Alternatives to Socket

Compare Socket alternatives for your business or organization using the curated list below. SourceForge ranks the best alternatives to Socket in 2026. Compare features, ratings, user reviews, pricing, and more from Socket competitors and alternatives in order to make an informed decision for your business.

  • 1
    Wiz

    Wiz

    Wiz

    Wiz is a new approach to cloud security that finds the most critical risks and infiltration vectors with complete coverage across the full stack of multi-cloud environments. Find all lateral movement risks such as private keys used to access both development and production environments. Scan for vulnerable and unpatched operating systems, installed software, and code libraries in your workloads prioritized by risk. Get a complete and up-to-date inventory of all services and software in your cloud environments including the version and package. Identify all keys located on your workloads cross referenced with the privileges they have in your cloud environment. See which resources are publicly exposed to the internet based on a full analysis of your cloud network, even those behind multiple hops. Assess the configuration of cloud infrastructure, Kubernetes, and VM operating systems against your baselines and industry best practices.
    Compare vs. Socket View Software
    Visit Website
  • 2
    Source Defense

    Source Defense

    Source Defense

    Source Defense is a mission critical element of web security designed to protect data at the point of input. The Source Defense Platform provides a simple and effective solution for data security and data privacy compliance – addressing threats and risks originating from the increased use of JavaScript, third-party vendors, and open-source code in your web properties. The Platform provides options for securing your own code, as well as addressing a ubiquitous gap in the management of third-party digital supply chain risk – controlling the actions of the third-party, fourth and nth party JavaScript that powers your site experience. The Source Defense Platform protects against all forms of client-side security incidents – keylogging, formjacking, digital skimming, Magecart, etc. – by extending web security beyond the server to the client-side (the browser).
    Partner badge
    Compare vs. Socket View Software
    Visit Website
  • 3
    Revenera SCA
    Take control of your open source software management. Empower your organization to manage open source software (OSS) and third-party components. FlexNet Code Insight helps development, legal and security teams to reduce open source security risk and manage license compliance with an end-to-end system. FlexNet Code Insight is a single integrated solution for open source license compliance and security. Find vulnerabilities and remediate associated risk while you build your products and during their entire lifecycle. Manage open source license compliance, add automation to your processes, and implement a formal OSS strategy that balances business benefits and risk management. Integrate with build tools, CI/CD and SCM tools, artifact repositories, external repositories or build your own integrations using the FlexNet Code Insight REST API framework to make code scanning easy and effective.
  • 4
    SonarQube Cloud

    SonarQube Cloud

    SonarSource

    Maximize your throughput and only release clean code SonarQube Cloud (formerly SonarCloud) automatically analyzes branches and decorates pull requests. Catch tricky bugs to prevent undefined behavior from impacting end-users. Fix vulnerabilities that compromise your app, and learn AppSec along the way with Security Hotspots. With just a few clicks you're up and running right where your code lives. Immediate access to the latest features and enhancements. Project dashboards keep teams and stakeholders informed on code quality and releasability. Display project badges and show your communities you're all about awesome. Code Quality and Code Security is a concern for your entire stack, from front-end to back-end. That’s why we cover 24 languages including Python, Java, C++, and many others. Transparency makes sense and that's why the trend is growing. Come join the fun, it's entirely free for open-source projects!
  • 5
    Xygeni

    Xygeni

    Xygeni Security

    Xygeni All-In-One AppSec Platform protects software from code to cloud with a unified solution built for Application Security Posture Management (ASPM). It gives CISOs, CIOs, and DevSecOps teams full visibility and control across the software supply chain, without slowing delivery. Xygeni secures every SDLC stage, code, dependencies, secrets, builds, IaC, containers, and CI/CD systems, detecting vulnerabilities, misconfigurations, and malware in real time. Powered by advanced AI, Xygeni prioritizes exploitable risks, cuts 90% of alert noise, and drives automated remediation through AI SAST, Auto-Fix, and Xygeni Bot. Developers scan and fix issues directly in their IDE, keeping code secure from the start. Early Malware Warning blocks zero-day supply-chain threats at publication, while smart dependency analysis prevents breaking updates. Seamless integration with GitHub, GitLab, Bitbucket, Jenkins, and Azure DevOps ensures a frictionless experience.
  • 6
    Socket Protocol

    Socket Protocol

    Socket Protocol

    Socket Protocol is the first Chain Abstraction Protocol, offering a modular, extensible, and composable stack that enables chain-abstracted applications. Socket Protocol leverages Modular Order Flow Auctions (MOFA) to allow developers to Compose with any App, Users, and Asset across Chains.
  • 7
    MergeBase

    MergeBase

    MergeBase

    With the lowest false positive software composition analysis (SCA) scanner, comprehensive software bill of materials (SBOM) engine, and patented Java Dynamic Application Hardening capability, MergeBase provides the only software supply chain security solution offering real-time DevSecOps visibility of third-party risk from development into operation covering all major languages from C/C++, .NET, JavaScript/NPM to Java.
    Starting Price: $380 per month
  • 8
    RunSafe Security

    RunSafe Security

    RunSafe Security

    RunSafe Security protects embedded software across critical infrastructure, delivering automated vulnerability identification and software hardening from build-time to runtime to defend the software supply chain and critical systems without compromising performance or requiring code rewrites. The RunSafe Security Platform includes the authoritative build-time SBOM generator for embedded systems and C/C++ projects, automated vulnerability identification and risk quantification, patented memory relocation techniques to mitigate memory-based vulnerabilities, and pre-hardened open-source packages and containers for immediate protection. RunSafe Security’s customers span the aerospace and defense, energy, operational technology, industrial automation, transportation and automotive, medical device, and high-tech manufacturing verticals.
  • 9
    ActiveState

    ActiveState

    ActiveState

    ActiveState provides software development teams with the world's most comprehensive library of secure and trusted open source, over 79 million vetted components across all major language ecosystems (e.g., Java, Javascript, Python, R, Go, etc.), including transitive dependencies and OS-level libraries. By building everything from source, we ensure that every component is what it says it is, contains the fewest amount of vulnerabilities, and is continuously remediated. Companies can consume this open source where and when they need it - through their existing artifact repositories, as container images or managed distributions, or via IDPs. When teams transfer their open source responsibility to ActiveState, developers and security teams break free from the endless cycle of vulnerability management. Developers gain confidence knowing their code will make it to production faster and with less friction. Security gains assurance that policy and compliance standards are met by default.
  • 10
    Arnica

    Arnica

    Arnica

    Put your software supply chain security on autopilot. Actively mitigate anomalies & risks in your development ecosystem, protect developers, and trust their code commits. Automate developer access management. Behavior-based developer access management with self-service provisioning in Slack or Teams. Continuously monitor and mitigate anomalous developer behavior. Identify hardcoded secrets. Validate and mitigate before they land in production. Go beyond SBOM and get visibility into all open-source licenses, infrastructure, vulnerabilities, and OpenSSF scorecards across your organization in minutes. Arnica is a behavior-based software supply chain security platform for DevOps. Arnica proactively protects your software supply chain by automating the day-to-day security operations and empowering developers to own security without incurring risks or compromising velocity. Arnica enables you to automate constant progress toward the least-privilege for developer permissions.
    Starting Price: Free
  • 11
    F5 Distributed Cloud Client-Side Defense
    Protect against Magecart, formjacking, skimming, PII harvesting, and other critical security vulnerabilities. Fill the gap in your security defenses. Gain visibility and control of third-party JavaScript libraries running in your web applications to keep customers’ personal and financial data out of the hands of criminals. Mitigate risk by monitoring JavaScript libraries in real time to identify vulnerabilities and anomalous behavior that could compromise customer data. Avoid customer fraud and compliance fines. Protect against data theft that would undermine customer confidence and damage your brand. Stop software supply chain attacks. Detect and track all third-party scripts running on your site to identify suspicious scripts or changes in the behavior of trusted scripts. Prevent credential stuffing on the client side to block account takeover attempts. Proactively monitor web apps in the browser to catch criminals in the act.
  • 12
    Sonatype Nexus Repository
    Sonatype Nexus Repository is a robust binary repository manager designed to store, manage, and distribute open-source components, dependencies, and artifacts across the software development lifecycle (SDLC). It supports over 20 formats, including Maven, npm, PyPI, and Docker, allowing for seamless integration with build tools and CI/CD pipelines. With advanced features like high availability, disaster recovery, and scalability across cloud platforms, Nexus Repository ensures secure and efficient management of your software artifacts. The platform enhances collaboration, automates workflows, and improves visibility into your software supply chain, helping teams manage dependencies and improve software quality.
  • 13
    Docker Scout
    Container images consist of layers and software packages, which are susceptible to vulnerabilities. These vulnerabilities can compromise the security of containers and applications. Docker Scout is a solution for proactively enhancing your software supply chain security. By analyzing your images, Docker Scout compiles an inventory of components, also known as a Software Bill of Materials (SBOM). The SBOM is matched against a continuously updated vulnerability database to pinpoint security weaknesses. Docker Scout is a standalone service and platform that you can interact with using Docker Desktop, Docker Hub, the Docker CLI, and the Docker Scout Dashboard. Docker Scout also facilitates integrations with third-party systems, such as container registries and CI platforms. Reveal and dig into the composition of your images. Ensure that your artifacts align with supply chain best practices.
    Starting Price: $5 per month
  • 14
    websockets

    websockets

    Python Software Foundation

    An implementation of the WebSocket Protocol (RFC 6455 & 7692). websockets is a library for building WebSocket servers and clients in Python with a focus on correctness, simplicity, robustness, and performance. Built on top of asyncio, Python’s standard asynchronous I/O framework, it provides an elegant coroutine-based API. websockets is heavily tested for compliance with RFC 6455. Continuous integration fails under 100% branch coverage. websockets is built for production. For example, it was the only library to handle backpressure correctly before the issue became widely known in the Python community. Memory usage is optimized and configurable. A C extension accelerates expensive operations. It’s pre-compiled for Linux, macOS, and Windows and packaged in the wheel format for each system and Python version. websockets takes care of everything under the hood so you can focus on your application!
    Starting Price: Free
  • 15
    Sonatype Repository Firewall
    Sonatype Repository Firewall is a security solution that provides proactive protection for your software supply chain by intercepting malicious open-source components before they enter your development process. Utilizing AI-powered behavioral analysis, it detects and prevents known and unknown vulnerabilities across dependencies. The platform offers real-time policy enforcement, allowing users to set customizable policies based on risk levels, such as the age or popularity of open-source components. With automated vulnerability prevention, Sonatype Repository Firewall helps businesses maintain compliance, enhance security, and reduce risk, while boosting developer productivity by avoiding unnecessary disruptions.
  • 16
    OpenMail

    OpenMail

    OpenMail

    OpenMail gives AI agents a dedicated email address. Provision an inbox with one CLI command or API call, each agent gets its own address, not a shared inbox or forwarding alias. Inbound email arrives instantly via webhook or WebSocket, parsed and threaded, with no polling required. Replies land in context so agents can respond without any new interface on the human side. Attachments: PDFs, CSVs, images, spreadsheets, Word documents are automatically converted to LLM-ready text; the agent never touches raw MIME. The API is small by design: one call to provision, standard calls to send, webhooks or WebSocket to receive. Integrates with LangChain, n8n, Make, Vercel AI SDK, and OpenClaw. Custom domains supported. Runs in the EU, GDPR-covered, 99.9% uptime SLA, SOC 2 in progress.
  • 17
    Socket.IO

    Socket.IO

    Socket.IO

    In most cases, the connection will be established with WebSocket, providing a low-overhead communication channel between the server and the client. Rest assured! In case the WebSocket connection is not possible, it will fall back to HTTP long-polling. And if the connection is lost, the client will automatically try to reconnect. Scale to multiple servers and send events to all connected clients with ease. Socket.IO is a library that enables low-latency, bidirectional and event-based communication between a client and a server. It is built on top of the WebSocket protocol and provides additional guarantees like a fallback to HTTP long-polling or automatic reconnection. WebSocket is a communication protocol that provides a full-duplex and low-latency channel between the server and the browser. There are several Socket.IO server implementations available. And client implementations in most major languages.
  • 18
    FossID

    FossID

    FossID

    Software Composition Analysis (SCA) FossID Workbench enables precise identification of open source components and vulnerabilities. It integrates into software development cycles, providing license recognition, proactive security checks, and detailed compliance reporting. FossID Workbench is available across various industries and helps to ensure that organizations can confidently meet their legal, security, and operational needs in open source software management. Comprehensive Scanning Creates a thorough and complete software bill of materials (SBOM) that catalogs all open source in use, regardless of how it made its way into the codebase. Detailed Reporting Ensures distribution compliance by generating reports, notices files, and copyright statements. Integration & Extensibility Features custom workflows, performing administrative tasks, generating reports, and more with the API.
  • 19
    Stacklok

    Stacklok

    Stacklok

    Software is eating the world. Hostile, sophisticated actors will ultimately eat the software industry if left unchecked. We build open source software that developers love, which in turn makes the world a safer place for all. From developers workflow to a running workload, end-to-end provenance and insight Software supply chain vulnerabilities are not a new phenomenon. Whether it is open source or proprietary software, some of the most significant exploitations in the history of software can be traced back to the software supply chain.
  • 20
    Reflex

    Reflex

    Pynecone

    Reflex is an open source framework that empowers Python developers to build full-stack web applications entirely in pure Python, eliminating the need for JavaScript or complex frontend frameworks. With Reflex, you can write, test, and refine your app using just Python, making it fast, flexible, and scalable. It features an AI Builder that allows you to describe your app idea, and it will generate a working Python app instantly, complete with backend, frontend, and database integration. Reflex's architecture compiles the frontend down to a single-page Next.js app, while the backend is powered by FastAPI, with communication handled via WebSockets. This setup ensures that all the app logic and state management stay in Python and run on the server. The framework offers over 60 built-in components based on Radix UI and supports custom React components, enabling developers to create complex UIs without writing HTML or CSS.
    Starting Price: $20 per month
  • 21
    Sphera Supply Chain Risk Management
    Sphera Supply Chain Risk Management helps you proactively identify, assess and mitigate supply chain risk. You need to master supply chain risk management—we can help. The Sphera Supply Chain Risk Management Solution helps you proactively identify, analyze and mitigate all types of supply chain risk. You can turn risk into opportunity to rise above the competition—and we can help. Prevent risk from costing you by strengthening your categories with Impact Analyzer. Assess supplier criticality and detect vulnerabilities at the category. Save valuable time by making the right moves with Action Planner. Collaborate across your organization and with your suppliers to proactively mitigate risk. For certain areas of your risk exposure, your suppliers themselves are the only ones who can provide the answers. This is where you need a professional. Establish a new level of collaboration by inviting your suppliers to join you in the next frontier of supply chain risk visibility.
  • 22
    1Exiger

    1Exiger

    Exiger

    Exiger's 1Exiger platform is a purpose-built, AI-powered solution designed to optimize third-party and supply chain risk management. With features like entity risk scoring, supply chain mapping, and deep risk analysis, it helps organizations uncover vulnerabilities, validate data, and make faster, data-driven decisions. Leveraging the world’s largest corporate and supply chain dataset, the platform empowers businesses to stay compliant and resilient in real-time, improving supply chain visibility and enabling proactive intelligence to address crises before they escalate.
  • 23
    DerScanner

    DerScanner

    DerSecur

    DerScanner is a convenient and easy-to-use officially CWE-Compatible solution that combines the capabilities of static (SAST), dynamic (DAST) and software composition analysis (SCA) in a single interface. It helps provide more thorough control over the security of applications and information systems and check both your own and open source code using one solution. Correlate the results of SAST and DAST, verify the detected vulnerabilities and eliminate them as a first priority. Strengthen your code by fixing vulnerabilities in both your own and third-party code. Perform an independent code review with developers-agnostic application analysis. Detect vulnerabilities and undocumented features in the code at all stages of the application development lifecycle. Control your in-house or third-party developers and secure legacy apps. Enhance user experience and feedback with a smoothly working and secure application.
    Starting Price: $500 USD
  • 24
    Check24-7.in

    Check24-7.in

    Check24-7.in

    With the 24-7Connect interface you enable us to communicate with your PMS data. Web sockets can also be used instead of webhooks. The web socket protocol is used for the transport, the interface remains unchanged.
  • 25
    finlight.me

    finlight.me

    finlight.me

    finlight.me is a powerful, developer-first news API that delivers real-time and historical financial, geopolitical, and market-moving news from a wide range of trusted sources in clean JSON format. It supports advanced querying, including keyword search with boolean operators, date/time filtering, source inclusion/exclusion, language options, sorting, and pagination, enabling precision targeting. The API offers both REST and WebSocket endpoints, the latter providing streaming delivery of new articles matching live queries, complete with sentiment analysis labels and confidence scores. Extended article endpoints include full content and summaries depending on the subscription tier. finlight’s AI-powered sentiment tagging and market-impact insights equip developers with actionable context, while support for WebSocket streaming allows for real-time alerts and deep analytics.
    Starting Price: $29 per month
  • 26
    Insignary Clarity
    Insignary Clarity is a specialized software composition analysis solution that helps customers gain visibility into the binary code they use by identifying known, preventable security vulnerabilities, while also highlighting potential license compliance issues. It uses unique fingerprint-based technology, which works on the binary-level without the need for source code or reverse engineering. Unlike checksum and hash-based binary code scanners, which are constrained by limited databases of pre-compiled binaries of the most commonly used open source components, Clarity is independent of compile times and CPU architectures. This makes it easy for software developers, value added resellers, systems integrators and security MSPs overseeing software deployments to take proper, preventive action before product delivery. Insignary, the global leader in binary-level, open source software security and compliance, is a venture-backed startup, headquartered in South Korea.
  • 27
    DeepSCA

    DeepSCA

    Deepbits Technology

    DeepSCA is a free online AI-powered software composition analysis service for software risk management. It supports various inputs such as binary, APK, JavaScript, Python, docker image, etc., and no source code is required.
  • 28
    Interos

    Interos

    Interos

    As disruptions increase, organizations need to modernize assessment and monitoring. What are you doing to prepare? Map and model supply chains deeper and farther, view and know everything, everywhere, about your business relationships, in seconds. Using an arsenal of natural-language AI models, trained on supply-chain data, we’ve built the most highly connected, multi-dimensional network of B2B relationships in existence. We continuously monitor global events providing real-time indicators of supply chain vulnerability and distress, across your business ecosystem, all the way down to the Nth tier. Build resilience into the extended supply chain. Proactively manage cyber threats, ensure regulatory compliance, and source confidently with one solution. Identify connections to restricted and prohibited countries, assess legal and regulatory compliance, and identify financial, cyber, governance, geographic, and operational risk down to any single supplier, anywhere.
  • 29
    TicketSocket

    TicketSocket

    TicketSocket

    Whether you’re a venue, a brand, an event organization, or a developer, you can bend TicketSocket to your will with complete ownership and customization from start to finish. Sell more tickets to your Races, festivals, and events and increase conversions. Take full control from online sales (printed and digital tickets) to on-site box-office check-in and walk-up sales. The TicketSocket platform lets organizers control each step of the ticketing process for a truly seamless experience. From small standing room only venues to forums and amphitheaters, TicketSocket can handle ticketing for any venue. For more complex ticket needs, advanced venues can get access to TicketSocket Enterprise, a fully developer-centric ticketing platform built for large venues and large volumes.
  • 30
    JFrog Xray
    DevSecOps Next Generation – Securing Your Binaries. Identify security vulnerabilities and license violations early in the development process and block builds with security issues from deployment. Automated and continuous governance and auditing of software artifacts and dependencies throughout the software development lifecycle from code to production. Additional functionalities include: - Deep recursive scanning of components drilling down to analyze all artifacts and dependencies and creating a graph of relationships between software components. - On-Prem, Cloud, Hybrid, or Multi-Cloud Solution - Impact analysis of how an issue in one component affects all dependent components with a display chain of impacts in a component dependency graph. - JFrog’s vulnerabilities database, continuously updated with new component vulnerability data, includes VulnDB, the industry’s most comprehensive security vulnerability database.
  • 31
    Chain49

    Chain49

    Hartmann IT Solutions GmbH

    Kickstart your next blockchain project with Chain49! We provide access to our network of blockchain full nodes located in Germany via JSON-RPC, WebSocket and a shared API based on battle-tested indexer Blockbook. We support the most popular blockchains like Bitcoin, Ethereum, BNB Smart Chain and more! By using our services, you can save a lot of time and money spent on setting up your own blockchain infrastructure and just focus on developing your idea. Dedicated nodes and custom setups are also available from over 50 different blockchains for the highest load requirements without any rate limits. Contact us for a free consultation today or register for a free key and start building awesome things!
    Starting Price: €49/month
  • 32
    BlockVigil

    BlockVigil

    BlockVigil

    Designed for entrepreneurial software developers, BlockVigil is the ultimate developer tool to build and scale blockchain apps with just a few lines of code. We allow you to build full-stack apps on blockchain, without learning protocol specifics. Smart contracts are quickly deployed through our system and the resulting API is instantly available to start testing. Use webhooks and WebSockets to integrate with third-party services in real-time with minimal technical effort. Our docs cater to every developer, all the way from beginners to advanced. We also provide examples to build upon. Use webhooks, WebSockets and Zapier to execute powerful off-chain and real-world workflows. BlockVigil's API gateway makes it super easy to build your blockchain apps, so you can quickly build and scale with just a few lines of code, from web developers to app developers.
  • 33
    Threatrix

    Threatrix

    Threatrix

    Threatrix autonomous platform manages your open source supply chain security and license compliance allowing your team to focus on delivering great software. Enter a new era of open source with Threatrix autonomous open source management. Threatrix autonomous platform effectively eliminates security risks and helps your team quickly manage license compliance in a single, tightly integrated platform. Scans complete in seconds, never holding up your builds. Proof of origin instantly ensures actionable results. Seamlessly processes billions of source files every day, providing unparalleled scalability for even the largest of organizations. Empower your vulnerability detection with unmatched control and risk visibility thanks to the unparalleled capabilities of our TrueMatch technology. A comprehensive vulnerability knowledge base aggregates all known open source vulnerability data and pre-zero-day vulnerability intelligence from the dark web.
    Starting Price: $41 per month
  • 34
    Azure Web PubSub
    ​Azure Web PubSub is a fully managed service that enables developers to build real-time web applications using WebSockets and the publish-subscribe pattern. It supports native and serverless WebSockets, allowing for scalable, bi-directional communication without the need to manage infrastructure. This service is ideal for applications such as chat rooms, live broadcasting, and IoT dashboards. ​Supports real-time publish-subscribe messaging for web application development through native and serverless WebSocket support. Built-in support for large-scale client connections and highly available architectures, enabling applications to handle numerous simultaneous users. Offers support for a wide variety of client SDKs and programming languages, facilitating seamless integration into existing applications. Provides built-in security features, including Azure Active Directory integration and private endpoints, to help protect data and manage access.
  • 35
    Sonatype Auditor
    Sonatype Auditor is a powerful software tool designed to automate and streamline open-source security and compliance management. It enables organizations to generate a Software Bill of Materials (SBOM) and identify any open-source components in third-party or legacy applications. Auditor scans for security risks, such as vulnerabilities or restricted licenses, and provides real-time alerts for continuous monitoring. With its remediation guidance, users can easily address identified issues and improve their security posture. This tool is ideal for businesses looking to manage open-source components, ensure compliance, and reduce risk across their software environments.
  • 36
    CycloneDX

    CycloneDX

    CycloneDX

    OWASP CycloneDX is a lightweight Software Bill of Materials (SBOM) standard designed for use in application security contexts and supply chain component analysis. Strategic direction and maintenance of the specification is managed by the CycloneDX Core working group, with origins in the OWASP community. A complete and accurate inventory of all first-party and third-party components is essential for risk identification. BOMs should ideally contain all direct and transitive components and the dependency relationships between them. Adopting CycloneDX allows organizations to quickly meet these minimum requirements and mature into using more sophisticated use cases over time. CycloneDX is capable of achieving all SBOM requirements defined in the OWASP Software Component Verification Standard (SCVS).
  • 37
    JFrog

    JFrog

    JFrog

    Fully automated DevOps platform for distributing trusted software releases from code to production. Onboard DevOps projects with users, resources and permissions for faster deployment frequency. Fearlessly update with proactive identification of open source vulnerabilities and license compliance violations. Achieve zero downtime across your DevOps pipeline with High Availability and active/active clustering for your enterprise. Control your DevOps environment with out-of-the-box native and ecosystem integrations. Enterprise ready with choice of on-prem, cloud, multi-cloud or hybrid deployments that scale as you grow. Ensure speed, reliability and security of IoT software updates and device management at scale. Create new DevOps projects in minutes and easily onboard team members, resources and storage quotas to get coding faster.
    Starting Price: $98 per month
  • 38
    CodeSentry

    CodeSentry

    CodeSecure

    CodeSentry is a Binary Composition Analysis (BCA) tool designed to provide detailed insights into the components of binaries, including open-source software, firmware, and containers. It helps identify vulnerabilities within these components by generating Software Bill of Materials (SBOMs) in formats like SPDX and CycloneDX. By mapping components to a comprehensive vulnerability database, CodeSentry enables organizations to mitigate risks and improve software security. It is effective for both pre-production analysis and post-production monitoring, allowing teams to track vulnerabilities throughout the software lifecycle. The tool is flexible in deployment, supporting SaaS and on-premise configurations.
  • 39
    Kusari

    Kusari

    Kusari

    Kusari’s platform offers "always-on transparency” for the visibility and insights you need. Secure your software development lifecycle end-to-end, powered by open source GUAC and open standards. Understand the composition of any software artifact with GUAC, a queryable open-source knowledge graph. Evaluate artifacts before you ingest them, and create policies to automatically prevent risky or vulnerable dependencies from entering your supply chain. Make your development process secure by default without interrupting developer workflows. Kusari meets you where you are by integrating with your existing IDE and CI/CD tools. Put software supply chain security best practices on autopilot, ensuring the integrity of each build and generating the metadata to prove it.
  • 40
    Rio

    Rio

    Rio

    Rio is an open source Python framework that enables developers to build modern web and desktop applications entirely in Python. Inspired by frameworks like React and Flutter, Rio introduces a declarative UI model where components are defined as Python data classes with a build() method, allowing for reactive state management and seamless UI updates. It includes over 50 built-in components adhering to Google's Material Design, facilitating the creation of professional-grade interfaces. Rio's layout system is Pythonic and intuitive, calculating each component's natural size before distributing available space, eliminating the need for traditional CSS. Developers can run applications locally or in the browser with the backend powered by FastAPI and communication handled via WebSockets.
    Starting Price: Free
  • 41
    Apex-Pro Systems

    Apex-Pro Systems

    Apex-Pro Systems

    These are the management processes that a world class retailer, wholesaler and manufacturer need to automate and collaborate with all the partners in their supply chain. Apex-Pro provides you with a single-vendor, one-stop Supply Chain Management solutions suite that is internet enabled, readily integrated with your and your partners' systems and that is easily extendible under an open environment to protect, and maximize the return on your investments. The APEX Supply Chain Management (SCM) Solution is specially developed for procurement organizations that purchases from wholesalers and offshore factories directly, via overseas sourcing offices or through agents. The APEX SCM Solution fully leverages the internet and state-of-the-art system integration technologies to enhance the management and control of your worldwide supply chain operations. Designed to cater for the most sophisticated sourcing organizations.
  • 42
    Infor Nexus
    Infor Nexus™ is the world’s leading business network for multi-enterprise supply chain orchestration and optimization, connecting businesses to the entire supply chain for enhanced supply chain visibility, collaboration, and predictive intelligence. With advanced planning, execution, and finance capabilities, businesses can intelligently sense and respond to supply chain activities in real-time. Leverage predictive intelligence for proactive sense and response. Enable interoperability across multiple vendor systems of record. Rely on a single version of truth across all supply chain partners. Conduct global shipment planning and optimization from origin. Strengthen the supply chain and improve working capital. Continually monitor demand and supply signals in real-time. Manage complex international supply chain flows to optimize both freight spend and shipping performance. Synchronize systems and service providers across modes and geographies for improved control and reliability.
  • 43
    Sonatype Intelligence
    Sonatype Intelligence provides a powerful platform for managing open-source security risks with advanced tools for vulnerability identification and remediation. It uses cutting-edge technology like Advanced Binary Fingerprinting (ABF) to scan deployed applications for embedded third-party components, minimizing false positives. Sonatype Intelligence goes beyond public data sources, continuously monitoring GitHub commits, advisory sites, and vulnerability databases to offer real-time insights into emerging threats. With expert-curated guidance for developers, it helps teams quickly identify and fix vulnerabilities, ensuring the security of their open-source components and enhancing their software supply chain security.
  • 44
    Finage

    Finage

    Finage

    Financial data & solutions for everyone. Real-time Stock, Forex and Cryptocurrency market data via API, WebSocket & Widgets. Finage has more than 28.000+ symbols in real-time. We bring together everything that’s required to build financial applications that need Real-Time stock, forex and cryptocurrency data via APIs and WebSocket. You can reach more than 25.000+ U.S. stock data via Finage's Real-Time WebSocket and APIs. You can also use the 15-year Historical Data API for the U.S stocks as well. Finage offers more than 1300+ currencies in real-time & Historical Data API. Forex data all in one place, so you can access our full selection of data. We offer you more than 1500+ cryptocurrencies via API and WebSocket. Finage has the most popular cryptocurrencies as Real-time. Visuality is the best way to demonstrate complex data for easy understanding. Select custom widgets with different color schemes to best fit best on your platform. Available across most of popular platforms.
    Starting Price: $99 per month
  • 45
    Microsoft Supply Chain Center
    Create a more resilient and sustainable supply chain using an open, flexible, collaborative, and secured supply chain platform—and meet your business and customer commitments profitably, every time. Get more value from your data across new and existing solutions with a platform that connects your entire supply chain. Predict supply chain disruptions before they happen and proactively address risks through intelligent orchestration. Keep goods flowing with the agility to rapidly adjust to changing markets and meet evolving customer demands. Meet your sustainability goals, improve brand perceptions, and minimize the carbon impact of your organization.
  • 46
    DoInventory

    DoInventory

    WakefieldSoft

    DoInventory™ is your complete asset tracking and inventory software for Blackberry devices, Palm OS or webOS Palm handhelds, Windows Mobile handhelds, and Windows PCs! Inventory your home, office, business, collections, etc. Carry your inventory with you. Supports numerous barcode scanners. Compatible with barcode scanners including Symbol CSM150 (springboard for Visor), Symbol 1500, 1700, 1800, Janam XP20, XP30 (all Palm OS), the Socket SDIO In-Hand and 3E (Palm OS or Pocket PC / Windows Mobile), and any barcode scanner supported by SerialMagic(tm) Professional for Palm OS from Serialio.com (including LaserChamp and Socket CHS 7 scanners). Blackberry, Palm OS, and Windows Mobile book and library software with PC companion desktop software. Assign a category to each item, and you can search by category. We provide a starting list of categories, but you can add and delete categories on the PC.
  • 47
    SocketLabs

    SocketLabs

    SocketLabs

    SocketLabs is a reliable email delivery engine built designed to help companies of all sizes send marketing and transactional email fast and easy. Trusted by leading organizations such as Virgin and the American Red Cross, SocketLabs combines a feature-rich outgoing mail server delivery solution, an easy-to-use dashboard interface, and an even easier setup. It also features outgoing mail servers, advanced analytics, and top notch customer support.
  • 48
    Kodey

    Kodey

    Kodey

    Kodey is a comprehensive AI-agent platform that lets users build, deploy, and manage autonomous AI agents without needing to write code. It offers a visual agent builder for non-technical users, enabling you to drag and drop components and connect workflows or data sources in minutes, plus full-support SDKs and APIs (e.g., Python, JavaScript, REST/GraphQL) for developers who want deeper customization. Once configured, agents run in secure, containerized environments and can be deployed to production via REST, WebSocket, or as embeddable web components; Kodey.ai automatically scales infrastructure to meet demand. It includes prebuilt integrations (databases, third-party tools, etc.), real-time monitoring and analytics, version control, and collaboration tools with role-based access control, all ensuring reliability, security, and maintainability in production workflows.
    Starting Price: $100 per month
  • 49
    Sonatype SBOM Manager
    Sonatype SBOM Manager is a comprehensive solution for creating, managing, and monitoring Software Bills of Materials (SBOMs), ensuring compliance with global regulations and strengthening the security of your software supply chain. It supports the generation and analysis of SBOMs in CycloneDX and SPDX formats, integrating with both third-party software and internal applications. SBOM Manager automates vulnerability scanning, tracks software components, and alerts teams to security risks, making it easier to meet regulatory requirements. With advanced features like real-time monitoring, customizable reporting, and continuous security updates, SBOM Manager helps organizations proactively manage open-source risks and improve software security posture.
  • 50
    SOOS

    SOOS

    SOOS

    Industry-low pricing for SCA, DAST and SBOM management. SOOS SCA gives you everything you need in an SCA solution for one low price. SOOS DAST integrates into your build pipeline and consolidates DAST test results with SCA vulnerability scans in a single powerful web dashboard. Assembling a comprehensive SBOM from third party software or open source components is easy with SOOS SBOM Manager. Ingest, manage, and continually monitor third party SBOMs. Add SBOMs generated by your in house software developers using SOOS SCA. Use our API to access any of our 54M+ open source SBOMs. SOOS makes it easy to comply with government SBOM regulations and mandates.
    Starting Price: $0 per month