66 Integrations with Veracode

View a list of Veracode integrations and software that integrates with Veracode below. Compare the best Veracode integrations as well as features, ratings, user reviews, and pricing of software that integrates with Veracode. Here are the current Veracode integrations in 2024:

  • 1
    Exact Payments

    Exact Payments

    Exact Payments

    Exact Payments develops and delivers easy-to-integrate and highly scalable payments technology for SaaS companies to seamlessly embed payment flows into their software and activate a new, high-margin revenue stream. With Exact’s PayFac-as-a-Service solution, SaaS providers build frictionless buying journeys that enhance customer experience, improve retention, and increase the lifetime value of a customer by as much as 5x. Today, Exact processes nearly 1 billion transactions annually for prominent customers, including Chase, Ordway, Cineplex, Allianz, Levi’s, and Carfax. Exact is integrated with leading processors in the US and Canada, including Elavon, Fiserv, Global Payments/TSYS, Chase Canada, and Moneris. Our payment solutions are designed for performance and reliability, supporting over 10,000 merchant clients and delivering 99.99% uptime availability with transaction response times of less than 1 second.
    Leader badge
    Starting Price: Free
    Partner badge
    View Software
    Visit Website
  • 2
    Docker

    Docker

    Docker

    Docker takes away repetitive, mundane configuration tasks and is used throughout the development lifecycle for fast, easy and portable application development, desktop and cloud. Docker’s comprehensive end-to-end platform includes UIs, CLIs, APIs and security that are engineered to work together across the entire application delivery lifecycle. Get a head start on your coding by leveraging Docker images to efficiently develop your own unique applications on Windows and Mac. Create your multi-container application using Docker Compose. Integrate with your favorite tools throughout your development pipeline, Docker works with all development tools you use including VS Code, CircleCI and GitHub. Package applications as portable container images to run in any environment consistently from on-premises Kubernetes to AWS ECS, Azure ACI, Google GKE and more. Leverage Docker Trusted Content, including Docker Official Images and images from Docker Verified Publishers.
    Starting Price: $7 per month
  • 3
    Jira

    Jira

    Atlassian

    Jira is the only project management tool you need to plan and track work across every team. Jira by Atlassian is the #1 software development tool for teams planning and building great products. Trusted by thousands of teams, Jira offers access to a wide range of tools for planning, tracking, and releasing world-class software, capturing and organizing issues, assigning work, and following team activity. It also integrates with leading developer tools for end-to-end traceability. From short projects, to large cross-functional programs, Jira helps break big ideas down into achievable steps. Organize work, create milestones, map dependencies and more. Link work to goals so everyone can see how their work contributes to company objectives and stay aligned to what’s important. Your next move, suggested by AI. Atlassian Intelligence takes your big ideas and automatically suggests the tasks to help get it done.
    Leader badge
    Starting Price: Free
  • 4
    IntelliJ IDEA

    IntelliJ IDEA

    JetBrains

    IntelliJ IDEA analyzes your code, looking for connections between symbols across all project files and languages. Using this information it provides in-depth coding assistance, quick navigation, clever error analysis, and, of course, refactorings. ^⇧Space gives you a list of the most relevant symbols applicable in the current context. This and other completions are constantly learning from you, moving the members of the most frequently used classes and packages to the top of the suggestions list, so you can select them faster. Digs a tad deeper than Smart Completion and lists applicable symbols accessible via methods or getters in the current context. Say you're looking for a value of Project and only have the Module module declaration. Press ^⇧Space twice to get module.getProject() without any additional effort. Static members completion Lets you easily use static methods or constants. Offers a list of symbols matching your input and automatically adds required import statements.
    Leader badge
    Starting Price: $14.90 per user per month
  • 5
    GitHub

    GitHub

    GitHub

    GitHub is the world’s most secure, most scalable, and most loved developer platform. Join millions of developers and businesses building the software that powers the world. Build with the world’s most innovative communities, backed by our best tools, support, and services. If you manage multiple contributors , there’s a free option: GitHub Team for Open Source. We also run GitHub Sponsors, where we help fund your work. The Pack is back. We’ve partnered up to give students and teachers free access to the best developer tools—for the school year and beyond. Work for a government-recognized nonprofit, association, or 501(c)(3)? Get a discounted Organization account on us.
    Leader badge
    Starting Price: $7 per month
  • 6
    GitLab

    GitLab

    GitLab

    GitLab is a complete DevOps platform. With GitLab, you get a complete CI/CD toolchain out-of-the-box. One interface. One conversation. One permission model. GitLab is a complete DevOps platform, delivered as a single application, fundamentally changing the way Development, Security, and Ops teams collaborate. GitLab helps teams accelerate software delivery from weeks to minutes, reduce development costs, and reduce the risk of application vulnerabilities while increasing developer productivity. Source code management enables coordination, sharing and collaboration across the entire software development team. Track and merge branches, audit changes and enable concurrent work, to accelerate software delivery. Review code, discuss changes, share knowledge, and identify defects in code among distributed teams via asynchronous review and commenting. Automate, track and report code reviews.
    Leader badge
    Starting Price: $29 per user per month
  • 7
    Bitbucket

    Bitbucket

    Atlassian

    Bitbucket is more than just Git code management. Bitbucket gives teams one place to plan projects, collaborate on code, test, and deploy. Free for small teams under 5 and priced to scale with Standard ($3/user/mo) or Premium ($6/user/mo) plans. Keep your projects organized by creating Bitbucket branches right from Jira issues or Trello cards. Build, test and deploy with integrated CI/CD. Benefit from configuration as code and fast feedback loops. Approve code review more efficiently with pull requests. Create a merge checklist with designated approvers and hold discussions right in the source code with inline comments. Bitbucket Pipelines with Deployments lets you build, test and deploy with integrated CI/CD. Benefit from configuration as code and fast feedback loops. Know your code is secure in the Cloud with IP whitelisting and required 2-step verification. Restrict access to certain users, and control their actions with branch permissions and merge checks for quality code.
    Leader badge
    Starting Price: $15 per month
  • 8
    Eclipse IDE

    Eclipse IDE

    Eclipse Foundation

    Eclipse IDE The Leading Open Platform for Professional Developers used in computer programming. Better Than Ever. The Eclipse IDE delivers what you need to rapidly innovate. Easier IDE configuration The Eclipse IDE Installer 2020-09 and several packages now include a Java Runtime Environment (JRE). Improved theming and styling. Improved Windows dark theme and GTK light theme. Moving to bleeding edge. Eclipse IDE now needs Java 11 as a minimum version to run on, but you can compile any version as usual. New experimental features. Support for aarch64. Linux support landed this version. Node.js is now embedded For all our LSP-based toolings, Node.js is now embedded to make things work out of the box Free and open source Free and open source; released under the terms of the Eclipse Public License 2.0. Powered by Participation. A vast ecosystem of plugins from an active community
  • 9
    Okta

    Okta

    Okta

    One platform, infinite ways to connect to your employees and customers. Build auth into any app. Create secure, delightful experiences quickly by offloading customer identity management to Okta. Get security, scalability, reliability, and flexibility by combining Okta’s Customer Identity products to build the stack you need. Protect and enable your employees, contractors, and partners. Secure your employees—wherever they are—with Okta’s workforce identity solutions. Get the tools to secure and automate cloud journeys, with full support for hybrid environments along the way. Companies around the world trust Okta with their workforce identity.
  • 10
    Jenkins

    Jenkins

    Jenkins

    The leading open source automation server, Jenkins provides hundreds of plugins to support building, deploying and automating any project. As an extensible automation server, Jenkins can be used as a simple CI server or turned into the continuous delivery hub for any project. Jenkins is a self-contained Java-based program, ready to run out-of-the-box, with packages for Windows, Linux, macOS and other Unix-like operating systems. Jenkins can be easily set up and configured via its web interface, which includes on-the-fly error checks and built-in help. With hundreds of plugins in the Update Center, Jenkins integrates with practically every tool in the continuous integration and continuous delivery toolchain. Jenkins can be extended via its plugin architecture, providing nearly infinite possibilities for what Jenkins can do. Jenkins can easily distribute work across multiple machines, helping drive builds, tests and deployments across multiple platforms faster.
  • 11
    ServiceNow

    ServiceNow

    ServiceNow

    Digitize your workflows - they'll love you for it. Your company can be more productive and your people more engaged. ServiceNow makes work, work better for people. Transform old, manual ways of working into modern digital workflows, so employees and customers get what they need, when they need it—fast, simple, easy. ServiceNow delivers digital workflows that create great experiences and unlock productivity for employees and the enterprise. We simplify the complexity of work on a single, enterprise cloud platform. The Now Platform: The intelligent and intuitive cloud platform for work. Choose from our workflows or build your own apps. Built on the Now Platform, our product portfolio delivers the  IT,  Employee, and  Customer Workflows that matter with enterprise solutions to help drive every part of your digital transformation. Create the great experiences you want and unlock the productivity you need, now with native mobile capabilities for everyday work across the enterprise.
    Starting Price: $100 per month
  • 12
    Travis CI

    Travis CI

    Travis CI

    The simplest way to test and deploy your projects in the cloud or on-prem. Easily sync your projects with Travis CI and you’ll be testing your code in minutes. Check out our features – now you can sign up for Travis CI using your Assembla, Bitbucket, GitHub or GitLab account to connect your repositories! Testing your open-source projects is always 100% free! Log in with your cloud repository, tell Travis CI to test a project, and then push. Could it be any simpler? Many databases and services are pre-installed and can be enabled in your build configuration. Make sure every Pull Request to your project is tested before it’s merged. Updating staging or production as soon as your tests pass has never been easier! Builds on Travis CI are configured mostly through the build configuration stored in the file .travis.yml in your repository. This allows your configuration to be version controlled and flexible.
    Starting Price: $63 per month
  • 13
    Nucleus

    Nucleus

    Nucleus

    Nucleus is redefining the vulnerability management software category as the single source of record for all assets, vulnerabilities, and associated data. We unlock the value you’re not getting from existing tools and place you squarely on the path to program maturity by unifying the people, processes, and technology involved in vulnerability management. With Nucleus, you receive unmatched visibility into your program and a suite of tools with functionality that simply can’t be replicated in any other way. Nucleus is the single shift-left tool that unifies development and security operations. It unlocks the value you’re not getting out of your existing tools and puts you on the path to unifying the people, processes, and technology involved in addressing vulnerabilities and code weaknesses. With Nucleus, you’ll get unmatched pipeline integration, tracking, triage, automation and reporting capabilities and a suite of tools with functionality.
    Starting Price: $10 per user per year
  • 14
    Bugzilla

    Bugzilla

    Bugzilla

    Bugzilla is server software designed to help you manage software development. Optimized database structure for increased performance and scalability. Excellent security to protect confidentiality. Advanced query tool that can remember your searches. Integrated email capabilities. Editable user profiles and comprehensive email preferences. Comprehensive permissions system. Proven under fire as Mozilla's bug tracking system. A large number of companies, organizations, and projects use Bugzilla. This page showcases a few particularly high-profile or otherwise interesting installations, and also contains a list of public Bugzillas. Includes bug fixes and performance improvements only. No new features or large scale performance improvements. No database schema changes. May contain documentation changes. No changes to templates that aren't part of bug fix, other than typos or grammatical fixes.
  • 15
    Azure DevOps Server
    Share code, track work, and ship software using integrated software delivery tools, hosted on premisis. Use all the Azure DevOps services or just the ones you need to complement your existing workflows. Previously known as Team Foundation Server (TFS), Azure DevOps Server is a set of collaborative software development tools, hosted on-premises. Azure DevOps Server integrates with your existing IDE or editor, enabling your cross-functional team to work effectively on projects of all sizes. Azure DevOps Server is source code management software, and includes features such as access Controls/Permissions, bug tracking, build automation, change management, code review, collaboration, continuous integration, and version control.
    Starting Price: $6 per user per month
  • 16
    Bamboo

    Bamboo

    Atlassian

    Bamboo offers first-class support for the "delivery" aspect of continuous delivery. Deployment projects automate the tedium right out of releasing into each environment, while letting you control the flow with per-environment permissions.
    Starting Price: $10 for up to 10 jobs
  • 17
    CircleCI

    CircleCI

    CircleCI

    Automate your development process with CI hosted in the cloud or on a private server. Take control of your code and manage every source of change. CircleCI means change validation, at every step. Trust that you can release updates right when your customers need them, with the certainty they’ll work every time. The power to create without limits. Code in every language and across multiple execution environments. If you can write it, we can build, test, and deploy it. With flexible environments and thousands of pre-built integrations, your pipelines never limit the possibility of what you can deliver. We’re the only CI/CD platform that’s FedRAMP certified and SOC 2 Type II compliant. Built-in features like audit logs, OpenID Connect, third-party secrets management, and LDAP give you complete control of your code.
    Starting Price: $50 per month
  • 18
    NorthStar Navigator

    NorthStar Navigator

    NorthStar.io, Inc.

    NorthStar is redefining Risk-Based Vulnerability Management with simple, contextual vulnerability prioritization for easier remediation. Common challenges NorthStar addresses are listed below: • Prioritize issues that should be addressed first in order to make the best use of limited resources. • Address lingering exposures that could impact critical business services, applications, and data stores. • Bridge the visibility gap and discrepancies that exist between vulnerability assessment and patch management. • Track reduction in risk over time and validate the most important issues are being addressed first. • Deliver a complete view of their environment – all assets, vulnerabilities and exposures. • Eliminate manual processes and unnecessary spreadsheet work.
    Starting Price: $8 per device
  • 19
    JupiterOne

    JupiterOne

    JupiterOne

    JupiterOne is a cyber asset analysis platform every modern security team needs to collect and transform asset data into actionable insights to secure their attack surface. JupiterOne was created to make security as simple as asking a question and getting the right answer back, with context, to make the right decision. With JupiterOne, organizations are able to see all asset data in a single place, improve confidence in choosing their priorities and optimize the deployment of their existing security infrastructure.
    Starting Price: $2000 per month
  • 20
    Vulcan Cyber

    Vulcan Cyber

    Vulcan Cyber

    At Vulcan Cyber we’re changing the way businesses reduce cyber risk through vulnerability remediation orchestration. We help IT security teams go beyond remedial vulnerability management to help them drive vulnerability remediation outcomes. The Vulcan platform consolidates vulnerability and asset data, with threat intelligence and customizable risk parameters to deliver risk-based vulnerability prioritization insights. But we don't stop there. Vulcan remediation intelligence takes the vulnerabilities that matter to your business and attaches the remedies and fixes needed to mitigate the threat. Then Vulcan orchestrates and measures the rest of the remediation process with integrations and inputs into application security, DevSecOps, patch management, configuration management, and cloud security tools, teams and functions. From scan to fix, Vulcan Cyber delivers the unique ability to orchestrate the entire vulnerability remediation process to GET FIX DONE at scale.
    Starting Price: $999 / month
  • 21
    Visual Studio

    Visual Studio

    Microsoft

    Full-featured IDE to code, debug, test, and deploy to any platform. Code faster. Work smarter. Create the future with the best-in-class IDE. Develop with the entire toolset from initial design to final deployment. Improved IntelliSense performance for C++ files. Local development with many common emulators. Simplified test access in Solution Explorer. Git management and repo creation in the IDE. Kubernetes support now included in Microsoft Azure workload.
    Starting Price: $45.00 per month
  • 22
    CodeShip

    CodeShip

    CloudBees

    Do you want everything set up for you instantly, or do you want to customize your environment and your workflow? CodeShip lets the developer pick the path that’s best for them, to maximize productivity and let teams evolve over time. From deployments to notifications to code coverage to security scanning and on-premise SCMs, CodeShip lets you integrate with any tool, service or cloud you need for your organization’s perfect workflow. Not only do we make CodeShip easy to use, we also provide fast and thorough developer support. When you need help or identify a problem, you want to talk to someone technical sooner rather than later, and that’s what you’ll get with CodeShip. You can get your builds and deployments working in less than 5 minutes with CodeShip’s turnkey environment and simple UI. From there, you can evolve into more sophisticated workflows and config-as-code as your projects grow.
    Starting Price: $49 per month
  • 23
    Active Directory
    Active Directory stores information about objects on the network and makes this information easy for administrators and users to find and use. Active Directory uses a structured data store as the basis for a logical, hierarchical organization of directory information. This data store, also known as the directory, contains information about Active Directory objects. These objects typically include shared resources such as servers, volumes, printers, and the network user and computer accounts. For more information about the Active Directory data store, see Directory data store. Security is integrated with Active Directory through logon authentication and access control to objects in the directory. With a single network logon, administrators can manage directory data and organization throughout their network, and authorized network users can access resources anywhere on the network. Policy-based administration eases the management of even the most complex network.
    Starting Price: $1 per user per month
  • 24
    Gradle

    Gradle

    Gradle

    Gradle Inc. is the company behind the leading software solution for improving developer productivity and happiness called Develocity (formerly Gradle Enterprise) and the popular open-source Gradle Build Tool, which is downloaded over 30 million times a month. Gradle is also pioneering the emerging practice of Developer Productivity Engineering (DPE). Elite development teams from companies like Airbnb, LinkedIn, Microsoft, Nasdaq, and Netflix, practice DPE to deliver quality software more rapidly at scale. They achieve this by leveraging Develocity’s innovative build and test performance acceleration technologies and analytics to proactively improve the reliability of the developer toolchain and make failure troubleshooting more efficient.
  • 25
    SD Elements

    SD Elements

    Security Compass

    Security Compass, a pioneer in application security, enables organizations to shift left and build secure applications by design, integrated directly with existing DevSecOps tools and workflows. Its flagship product, SD Elements, helps organizations accelerate software time to market and reduce cyber risks by taking an automated, developer-centric approach to threat modeling, secure development, and compliance. Security Compass is the trusted solution provider to leading financial and technology organizations, the U.S. Department of Defense, government agencies, and renowned global brands across multiple industries.
  • 26
    ThreadFix

    ThreadFix

    Denim Group

    ThreadFix 3.0 provides a comprehensive view of your risk from applications and their supporting infrastructure. Skip the spreadsheets and PDFs forever. From Application Security Managers to CISOs, ThreadFix helps increase efficiency across teams and provides powerful reporting to upper management. Explore the powerful benefits of ThreadFix, the industry leading application vulnerability management platform. Automatically consolidate, de-duplicate, and correlate vulnerabilities in applications to the infrastructure assets that support them using results from commercial and open source application and network scanning tools. Knowing which vulnerabilities exist is important, but it’s just a start. With ThreadFix, you will quickly spot vulnerability trends and make smart remediation decisions based on data in a centralized view. When vulnerabilities are discovered, it can be tough to go back and fix them.
    Starting Price: $2000 per month
  • 27
    Legit Security

    Legit Security

    Legit Security

    Legit Security protects software supply chains from attack by automatically discovering and securing the pipelines, infrastructure, code and people so that businesses can stay safe while releasing software fast. Automatically discover security issues, remediate threats and ensure the integrity and compliance of software releases. Comprehensive, visual SDLC inventory that's continually updated. Reveal unknown, misconfigured and vulnerable SDLC systems and infrastructure. Centralized visibility over location, coverage and configuration of your existing security tools and scanners. Catch insecure build actions before they can embed vulnerabilities downstream. Centralized, early prevention of sensitive data leaks, secrets and PII, before being pushed into the SDLC. Track security trends across teams and product lines to improve security posture and incentivize behavior. Get security posture at-a-glance with Legit Security Scores, Integrate your own alert and ticketing tools or use ours.
  • 28
    C#

    C#

    Microsoft

    C# (also known as C Sharp, pronounced "See Sharp") is a modern, object-oriented, and type-safe programming language. C# enables developers to build many types of secure and robust applications that run in .NET. C# has its roots in the C family of languages and will be immediately familiar to C, C++, Java, and JavaScript programmers. This tour provides an overview of the major components of the language in C# 8 and earlier. C# is an object-oriented, component-oriented programming language. C# provides language constructs to directly support these concepts, making C# a natural language in which to create and use software components. Since its origin, C# has added features to support new workloads and emerging software design practices. At its core, C# is an object-oriented language. You define types and their behavior.
    Starting Price: Free
  • 29
    Visual Basic

    Visual Basic

    Microsoft

    Visual Basic is an object-oriented programming language developed by Microsoft. Using Visual Basic makes it fast and easy to create type-safe .NET apps. Visual Basic focuses on supplying more of the features of the Visual Basic Runtime (microsoft.visualbasic.dll) to .NET Core and is the first version of Visual Basic focused on .NET Core. Many portions of the Visual Basic Runtime depend on WinForms and these will be added in a later version of Visual Basic. .NET is a free, open-source development platform for building many kinds of apps. With .NET, your code and project files look and feel the same no matter which type of app you're building. You have access to the same runtime, API, and language capabilities with each app. A Visual Basic program is built up from standard building blocks. A solution comprises one or more projects. A project in turn can contain one or more assemblies. Each assembly is compiled from one or more source files.
    Starting Price: Free
  • 30
    Phoenix Security

    Phoenix Security

    Phoenix Security

    Phoenix Security enables security, developers, and businesses to all talk the same language. We help security professionals focus on the vulnerabilities that matter most across cloud, infrastructure, and application security. Laser focuses on the 10% of vulnerabilities that matter today, and reduces risk faster with prioritized contextualized vulnerabilities. Threat intelligence automatically in the risk improves efficiency enabling fast reaction. Threat intelligence automatically in the risk improves efficiency enabling fast reaction. Aggregate, correlate and contextualize multiple security tools and data sources, providing your business with unprecedented visibility. Break down the silos between application security, operational security, and the business.
    Starting Price: $3,782.98 per month
  • 31
    Conviso Platform

    Conviso Platform

    Conviso Platform

    Gain a complete view of your application security. Increase security maturity in your secure development process, and reduce the risks associated with your products. Application Security Posture Management (ASPM) solutions play a crucial role in the ongoing management of application risks, addressing security issues from the development phase to deployment. Efficiently managing an AppSec program, dealing with a growing number of products, and lacking a comprehensive view of vulnerabilities are typically significant challenges for the development team. We enhance the evolution of maturity by supporting the implementation of AppSec programs, monitoring established and executed actions, KPIs, and much more. We enable security to be incorporated into the early stages of development by defining requirements, processes, and policies and optimizing resources and time invested in additional testing or validations.
    Starting Price: $20.99 per asset
  • 32
    Cisco Vulnerability Management
    A tidal wave of vulnerabilities, but you can’t fix them all. Rely on extensive threat intel and patented prioritization to cut costs, save time, and keep your teams efficiently focused on reducing the biggest risks to your business. This is Modern Risk-Based Vulnerability Management. We created Risk-Based Vulnerability Management software and now we’re defining the modern model. Show your security and IT teams which infrastructure vulnerabilities they should remediate, when. Our latest version reveals exploitability can be measured, and accurately measuring exploitability can help you minimize it. Cisco Vulnerability Management (formerly Kenna.VM) combines real-world threat and exploit intelligence and advanced data science to determine which vulnerabilities pose the highest risk and which you can deprioritize. Spoiler alert: Your mega-list of “critical vulnerabilities” will shrink faster than a woolen sweater-vest in a hot cycle.
  • 33
    Broadcom Clarity
    Speed up your digital transformation with Clarity, the leading investment-planning solution for the enterprise. Instead of traditional project management, we help you transition to digital product management, where you manage value streams to counter market disruptions, maximize enterprise resources, and pivot with fluctuating customer demands. Make sure you are investing the company’s time and money in the right business initiatives. See how your investments are doing in real time. Base your prioritization on value-based decisions, not gut feelings. Strategic portfolio management allows you to continuously plan and prioritize work to fit both customer demands and business needs. To succeed, however, you need a solution that helps you manage the entire value stream – from concept to cash. Spin up projects in minutes and let teams work the way they want, while staying engaged with the business.
  • 34
    F5 Advanced WAF
    Advanced Web Application Firewall (WAF) protect your apps with behavioral analytics, proactive bot defense, and application-layer encryption of sensitive data. Use the ROI Estimator from F5 and Forrester to find out how Advanced WAF can improve your security posture and save you money. The F5 Advanced Web Application Firewall (WAF) provides a powerful set of security features that will keep your Web Applications safe from attack. Many WAFs offer a basic level of protection from attack at the higher layers of the OSI stack, but the F5 Advanced WAF takes things even further and offers some serious security features like Anti Bot Mobile SDK, Credential Stuffing threat feeds, Proactive Bot Defense, and Datasafe to name a few. In this video, John outlines many of the exciting features offered in the F5 Advanced WAF.
  • 35
    Imperva CDN

    Imperva CDN

    Imperva

    Deploying your websites and applications around the globe can lead to more cyber attacks and fraud, unless you have effective security. The Imperva Content Delivery Network (CDN) brings content caching, load balancing, and failover built natively into a comprehensive Web Application and API Protection (WAAP) platform, so your applications are securely delivered across the globe. Let machine learning do the work for you. It efficiently caches your dynamically-generated pages, while ensuring content freshness. This significantly improves cache utilization and further reduces bandwidth usage. Take advantage of multiple content and networking optimization techniques to minimize page rendering time and improve user experience. Imperva’s global CDN uses advanced caching and optimization techniques to improve connection and response speeds while lowering bandwidth costs.
  • 36
    Imperva WAF

    Imperva WAF

    Imperva

    Web application attacks prevent important transactions and steal sensitive data. Imperva Web Application Firewall (WAF) analyzes traffic to your applications to stop these attacks and ensure uninterrupted business operations. A noisy WAF forces you to choose between blocking legitimate traffic or manually containing attacks your WAF let through. Imperva Research Labs ensure accuracy to WAF customers as the threat landscape changes. Automatic policy creation and fast rule propagation empower your security teams to use third-party code without risk while working at the pace of DevOps. Imperva WAF is a key component of a comprehensive Web Application and API Protection (WAAP) stack that secures from edge to database, so the traffic you receive is only the traffic you want. We provide the best website protection in the industry – PCI-compliant, automated security that integrates analytics to go beyond OWASP Top 10 coverage, and reduces the risks created by third-party code.
  • 37
    Imperva DDoS Protection
    Imperva DDoS Protection secures all your assets at the edge for uninterrupted operation. Ensure business continuity with guaranteed uptime. When it comes to DDoS mitigation, the rule of thumb is: ‘moments to go down, hours to recover’. This is why, when defending against an attack, every second counts. Imperva gives you the peace of mind that attack traffic will be automatically blocked at the edge – without you having to scale up in bandwidth to pay for it. Imperva DDoS Protection for Websites is an always-on service that immediately mitigates any type or size of DDoS attack targeting web applications. Our DDoS protection for websites complements the Imperva cloud web application firewall (WAF), which blocks hacking attempts and attacks by malicious bots. A change to your DNS records ensures that all HTTP/S traffic to your domain(s) is routed through the Imperva network. Acting as a secure proxy, Imperva DDoS protection for websites masks your origin server IP.
  • 38
    Scuba Database Vulnerability Scanner
    Scuba Database Vulnerability Scanner. Download Scuba, a free tool that uncovers hidden security risks. Scan enterprise databases for vulnerabilities and misconfiguration. Know the risks to your databases. Get recommendations on how to mitigate identified issues. Available for Windows, Mac, Linux (x32), and Linux (x64), Scuba offers over 2,300 assessment tests for Oracle, Microsoft SQL, SAP Sybase, IBM DB2 and MySQL. Scuba is a free tool that scans leading enterprise databases for security vulnerabilities and configuration flaws, including patch levels, that allows you to uncover potential database security risks. It includes more than 2,300 assessment tests for Oracle, Microsoft SQL Server, SAP Sybase, IBM DB2 and MySQL. It’s possible to run a Scuba scan from any Windows, Mac or Linux client. Depending on your database size, users, groups and network connection, an average Scuba scan normally takes 2-3 minutes. No pre-installation or other dependencies are required.
  • 39
    Imperva Database Security
    Imperva delivers analytics, protection and response across all your data assets, on-premise and in the cloud - giving you the risk visibility to prevent data breaches and avoid compliance incidents. Pre-configured and extensible templates, policies, reports and more come “out-of-the-box” for quick, continuous compliance and risk management – with no manual/DIY work required. Single pane of glass across distributed environments on-premise, in-cloud and multi-cloud to find ungoverned database instances, classify data, assess vulnerabilities, and investigate user activity. Detect both outsider and insider threats and automate response procedures. Consolidate reporting operations and get cost effective multi-year retention of audit and forensic records. Imperva Database Security unifies governance across on-premise and hybrid cloud environments and presents it all in a single view.
  • 40
    AuthPoint

    AuthPoint

    WatchGuard

    Our unique multi-factor authentication (MFA) solution not only helps to reduce the likelihood of network disruptions and data breaches arising from lost or stolen credentials, but we deliver this important capability entirely from the Cloud for easy set-up and management. AuthPoint goes beyond traditional 2-Factor Authentication (2FA) by considering innovative ways to positively identify users, and our large ecosystem of 3rd party integrations means that you can use MFA to protect access. Ultimately, WatchGuard AuthPoint is the right solution at the right time to make MFA a reality for the businesses who desperately need it to block attacks. AuthPoint uses a push message, QR code, or one-time password (OTP) as an additional factor proving your identity, and our mobile device DNA matches the authorized user’s phone when granting access to systems and applications. Therefore, any attacker who clones a user’s device in an attempt to access a protected system would be blocked.
  • 41
    Panaseer

    Panaseer

    Panaseer

    Panaseer’s continuous controls monitoring platform sits above the tools and controls within your organisation. It provides automated, trusted insight into the security and risk posture of the organisation. We create an inventory of all entities across your organisation (devices, apps, people, accounts, databases). The inventory highlights assets missing from different sources and where security controls are missing from assets. The platform equips you with metrics and measures to understand your security and compliance status at any level. The platform ingests data from any source in the cloud or on-premises, across security, IT and business domains through out-of-the-box data connectors. It uses entity resolution to clean, normalise, aggregate, de-duplicate and correlate this data, creating a continuous feed of unified asset and controls insights across devices, applications, people, databases and accounts.
  • 42
    Enso

    Enso

    Enso Security

    Enso is transforming application security by empowering organizations to build, manage and scale their AppSec programs. Its Application Security Posture Management (ASPM) platform easily deploys into an organization’s environment to create an actionable, unified inventory of all application assets, their owners, security posture and associated risk. With Enso Security, AppSec teams gain the capacity to manage the tools, people and processes involved in application security, enabling them to build a simplified, agile and scalable application security program without interfering with development. Enso has been recognized with numerous awards including the 2022 Excellence Awards, Globee Awards, and Forbes Top 20 Cybersecurity Startups to Watch.
  • 43
    Cortex

    Cortex

    Cortex

    Cortex Internal Developer Portal makes it easy for engineering organizations to gain visibility into their services and deliver high quality software. Scorecards enable teams to drive what matters most to them – including service quality, production readiness standards, and migrations. Cortex’s service catalog integrates with the most popular engineering tools, giving teams an easy way to understand everything about their architecture. Teams enable organizations to drive a sense of ownership and pride as they improve service quality. Scaffolder lets developers scaffold a new service in less than five minutes using custom templates crafted by your team.
  • 44
    Kondukto

    Kondukto

    Kondukto

    The Kondukto platform’s flexible design allows you to create custom workflows for responding to risks quickly and efficiently. Take advantage of more than 25 built-in open-source tools ready to run SAST, DAST, SCA, and Container Image scans within minutes without a need for installation, maintenance, or updates. Protect your corporate memory from changes in employees, scanners, or DevOps tools. All security data, statistics, and activities in one place for you to own. Avoid vendor lock or loss of historical data when you need to change an AppSec tool. Verify fixes automatically to ensure better collaboration and less distraction. Boost efficiency by eliminating redundant conversations between AppSec and development teams.
    Starting Price: $12,000 per annually
  • 45
    BMC AMI Data for Db2

    BMC AMI Data for Db2

    BMC Software

    BMC AMI Data for Db2® Reduce data management costs by up to 65% or more. Leverage automation for world-class data management enabling 24x7 availability, greater resiliency, and the agility needed to provide a transcendent customer experience. Transform the management of your Db2 databases. Increase availability, improve performance, and ensure secure recovery of your critical data assets. Ensure highest availability so your business can run at peak performance to best serve your customers and provide them with the flawless, superior experience they deserve. See measurable results: 10% improvement in application performance; 6% reduction in MIPS consumption; and for files previously unable to be reorganized, a 90% boost in query response time. Avoid cumbersome reorganizations and costly CPU upgrades by making the most of your existing resources. Quickly diagnose performance problems and track them to their source.
  • 46
    CYBEATS

    CYBEATS

    CYBEATS

    Cybeats delivers an integrated security platform designed to secure and protect high-valued connected devices. Cybeats unique approach eliminates device downtime due to cyber-attacks and allows device manufacturers to develop and maintain secure and protected devices in a timely and cost-efficient manner. Identify security vulnerabilities throughout the development process so security is built into the connected device, not after deployment. Real-time trusted device profiles protect against abnormal device behavior and allow for immediate response and no downtime. Ensure deployed devices continue to be secure and protected, including secure firmware update and managed provisioning. Cybeats sentinel and device profile allows for immediate response to an attack without the need to quarantine and remove the device from the operation.
  • 47
    Apache Maven

    Apache Maven

    The Apache Software Foundation

    Apache Maven is a software project management and comprehension tool. Based on the concept of a project object model (POM), Maven can manage a project's build, reporting and documentation from a central piece of information. If you think that Maven could help your project, you can find out more information in the "About Maven" section of the navigation. This includes an in-depth description of what Maven is and a list of some of its main features. If the problem has not been reported before, the recommended way to get help is to subscribe to the Maven Users Mailing list. Many other users and Maven developers will answer your questions there, and the answer will be archived for others in the future.
  • 48
    AWS CodeStar
    AWS CodeStar enables you to quickly develop, build, and deploy applications on AWS. AWS CodeStar provides a unified user interface, enabling you to easily manage your software development activities in one place. With AWS CodeStar, you can set up your entire continuous delivery toolchain in minutes, allowing you to start releasing code faster. AWS CodeStar makes it easy for your whole team to work together securely, allowing you to easily manage access and add owners, contributors, and viewers to your projects. Each AWS CodeStar project comes with a project management dashboard, including an integrated issue tracking capability powered by Atlassian Jira Software. With the AWS CodeStar project dashboard, you can easily track progress across your entire software development process, from your backlog of work items to teams’ recent code deployments. There is no additional charge for using AWS CodeStar. You only pay for the AWS resources that you provision.
  • 49
    PlexTrac

    PlexTrac

    PlexTrac

    Our mission at PlexTrac is to improve the posture of every security team. Whether you work for a SMB, are a service provider, an individual researcher, or are a part of a large security team, there's something for you here. PlexTrac Core offers all of our most popular modules, including Reports, Writeups, Asset Management, Custom Templating and more. It's perfect for smaller security teams and individual researchers. PlexTrac also has many add-on modules that boost the power of PlexTrac. These modules make PlexTrac the ultimate platform for larger security teams. Add-on modules include Assessments, Analytics, Runbooks, and more! PlexTrac provides cybersecurity teams unparalleled power when it comes to reporting security vulnerabilities and other risk-related findings. Our parsing engine allows teams to import findings from their favorite vulnerability scanners, including Nessus, Burp Suite, and Nexpose.
  • 50
    CodePatrol

    CodePatrol

    Claranet

    Automated code reviews driven by security. CodePatrol performs powerful SAST scans on your project source code and identifies security flaws early. Powered by Claranet and Checkmarx. CodePatrol provides support for a wide variety of languages and scans your code with multiple SAST engines for better results. Stay up-to-date with the latest code flaws in your project using automated alerting and user-defined filter rules. CodePatrol uses industry-leading SAST software provided by Checkmarx and expertise from Claranet Cyber Security to identify the latest threat vectors. Multiple code scanning engines are frequently triggered on your code base and perform in-depth analysis on your project. You may access CodePatrol anytime and retrieve the aggregated scan results in order to fix your project security flaws.
  • Previous
  • You're on page 1
  • 2
  • Next