69 Integrations with Veracode

View a list of Veracode integrations and software that integrates with Veracode below. Compare the best Veracode integrations as well as features, ratings, user reviews, and pricing of software that integrates with Veracode. Here are the current Veracode integrations in 2026:

  • 1
    Cortex

    Cortex

    Cortex

    Cortex is the Engineering Operations Platform that enables organizations to continuously improve their operational maturity and reduce developer friction. With centralized visibility, clear ownership, automated Scorecards, and golden paths, we help engineering organizations operate as one. Our customers – from startups to Fortune 100 enterprises – create a culture of engineering excellence, reducing incidents by 30% and improving MTTR by 50%, all while making it easier for developers to focus on building. • Within minutes, determine who owns each service with Cortex’s AI service ownership model across thousands of repositories. • Standardize golden paths using Workflows, enabling teams to scaffold new services & provision infrastructure in minutes. • Consistently uphold best practices and standards across your organization with automated Scorecards and targeted Initiatives. • Make informed, impactful actions based on real-time insights.
    Leader badge
    View Software
    Visit Website
  • 2
    Exact Payments

    Exact Payments

    Exact Payments

    Exact Payments develops and delivers easy-to-integrate and highly scalable payments technology for SaaS companies to seamlessly embed payment flows into their software and activate a new, high-margin revenue stream. With Exact’s PayFac-as-a-Service solution, SaaS providers build frictionless buying journeys that enhance customer experience, improve retention, and increase the lifetime value of a customer by as much as 5x. Today, Exact processes nearly 1 billion transactions annually for prominent customers, including Chase, Ordway, Cineplex, Allianz, Levi’s, and Carfax. Exact is integrated with leading processors in the US and Canada, including Elavon, Fiserv, Global Payments/TSYS, Chase Canada, and Moneris. Our payment solutions are designed for performance and reliability, supporting over 10,000 merchant clients and delivering 99.99% uptime availability with transaction response times of less than 1 second.
    Leader badge
    Starting Price: Free
  • 3
    Docker

    Docker

    Docker

    Docker takes away repetitive, mundane configuration tasks and is used throughout the development lifecycle for fast, easy and portable application development, desktop and cloud. Docker’s comprehensive end-to-end platform includes UIs, CLIs, APIs and security that are engineered to work together across the entire application delivery lifecycle. Get a head start on your coding by leveraging Docker images to efficiently develop your own unique applications on Windows and Mac. Create your multi-container application using Docker Compose. Integrate with your favorite tools throughout your development pipeline, Docker works with all development tools you use including VS Code, CircleCI and GitHub. Package applications as portable container images to run in any environment consistently from on-premises Kubernetes to AWS ECS, Azure ACI, Google GKE and more. Leverage Docker Trusted Content, including Docker Official Images and images from Docker Verified Publishers.
    Starting Price: $7 per month
  • 4
    Jira

    Jira

    Atlassian

    Jira is the only project management tool you need to plan and track work across every team. Jira by Atlassian is the #1 software development tool for teams planning and building great products. Trusted by thousands of teams, Jira offers access to a wide range of tools for planning, tracking, and releasing world-class software, capturing and organizing issues, assigning work, and following team activity. It also integrates with leading developer tools for end-to-end traceability. From short projects, to large cross-functional programs, Jira helps break big ideas down into achievable steps. Organize work, create milestones, map dependencies and more. Link work to goals so everyone can see how their work contributes to company objectives and stay aligned to what’s important. Your next move, suggested by AI. Atlassian Intelligence takes your big ideas and automatically suggests the tasks to help get it done.
    Leader badge
    Starting Price: Free
  • 5
    GitHub

    GitHub

    GitHub

    GitHub is the world’s most secure, most scalable, and most loved developer platform. Join millions of developers and businesses building the software that powers the world. Build with the world’s most innovative communities, backed by our best tools, support, and services. If you manage multiple contributors , there’s a free option: GitHub Team for Open Source. We also run GitHub Sponsors, where we help fund your work. The Pack is back. We’ve partnered up to give students and teachers free access to the best developer tools—for the school year and beyond. Work for a government-recognized nonprofit, association, or 501(c)(3)? Get a discounted Organization account on us.
    Leader badge
    Starting Price: $7 per month
  • 6
    GitLab

    GitLab

    GitLab

    GitLab is a complete DevOps platform. With GitLab, you get a complete CI/CD toolchain out-of-the-box. One interface. One conversation. One permission model. GitLab is a complete DevOps platform, delivered as a single application, fundamentally changing the way Development, Security, and Ops teams collaborate. GitLab helps teams accelerate software delivery from weeks to minutes, reduce development costs, and reduce the risk of application vulnerabilities while increasing developer productivity. Source code management enables coordination, sharing and collaboration across the entire software development team. Track and merge branches, audit changes and enable concurrent work, to accelerate software delivery. Review code, discuss changes, share knowledge, and identify defects in code among distributed teams via asynchronous review and commenting. Automate, track and report code reviews.
    Leader badge
    Starting Price: $29 per user per month
  • 7
    Eclipse IDE

    Eclipse IDE

    Eclipse Foundation

    Eclipse IDE The Leading Open Platform for Professional Developers used in computer programming. Better Than Ever. The Eclipse IDE delivers what you need to rapidly innovate. Easier IDE configuration The Eclipse IDE Installer 2020-09 and several packages now include a Java Runtime Environment (JRE). Improved theming and styling. Improved Windows dark theme and GTK light theme. Moving to bleeding edge. Eclipse IDE now needs Java 11 as a minimum version to run on, but you can compile any version as usual. New experimental features. Support for aarch64. Linux support landed this version. Node.js is now embedded For all our LSP-based toolings, Node.js is now embedded to make things work out of the box Free and open source Free and open source; released under the terms of the Eclipse Public License 2.0. Powered by Participation. A vast ecosystem of plugins from an active community
  • 8
    Bitbucket

    Bitbucket

    Atlassian

    Bitbucket is more than just Git code management. Bitbucket gives teams one place to plan projects, collaborate on code, test, and deploy. Free for small teams under 5 and priced to scale with Standard ($3/user/mo) or Premium ($6/user/mo) plans. Keep your projects organized by creating Bitbucket branches right from Jira issues or Trello cards. Build, test and deploy with integrated CI/CD. Benefit from configuration as code and fast feedback loops. Approve code review more efficiently with pull requests. Create a merge checklist with designated approvers and hold discussions right in the source code with inline comments. Bitbucket Pipelines with Deployments lets you build, test and deploy with integrated CI/CD. Benefit from configuration as code and fast feedback loops. Know your code is secure in the Cloud with IP whitelisting and required 2-step verification. Restrict access to certain users, and control their actions with branch permissions and merge checks for quality code.
    Leader badge
    Starting Price: $15 per month
  • 9
    Okta

    Okta

    Okta

    One platform, infinite ways to connect to your employees and customers. Build auth into any app. Create secure, delightful experiences quickly by offloading customer identity management to Okta. Get security, scalability, reliability, and flexibility by combining Okta’s Customer Identity products to build the stack you need. Protect and enable your employees, contractors, and partners. Secure your employees—wherever they are—with Okta’s workforce identity solutions. Get the tools to secure and automate cloud journeys, with full support for hybrid environments along the way. Companies around the world trust Okta with their workforce identity.
  • 10
    Jenkins

    Jenkins

    Jenkins

    The leading open source automation server, Jenkins provides hundreds of plugins to support building, deploying and automating any project. As an extensible automation server, Jenkins can be used as a simple CI server or turned into the continuous delivery hub for any project. Jenkins is a self-contained Java-based program, ready to run out-of-the-box, with packages for Windows, Linux, macOS and other Unix-like operating systems. Jenkins can be easily set up and configured via its web interface, which includes on-the-fly error checks and built-in help. With hundreds of plugins in the Update Center, Jenkins integrates with practically every tool in the continuous integration and continuous delivery toolchain. Jenkins can be extended via its plugin architecture, providing nearly infinite possibilities for what Jenkins can do. Jenkins can easily distribute work across multiple machines, helping drive builds, tests and deployments across multiple platforms faster.
  • 11
    Bamboo

    Bamboo

    Atlassian

    Bamboo offers first-class support for the "delivery" aspect of continuous delivery. Deployment projects automate the tedium right out of releasing into each environment, while letting you control the flow with per-environment permissions.
    Starting Price: $10 for up to 10 jobs
  • 12
    Visual Studio

    Visual Studio

    Microsoft

    Microsoft Visual Studio is the industry-leading integrated development environment (IDE) for building modern applications across desktop, mobile, cloud, and web. It empowers developers to write, refactor, debug, test, and deploy software faster with intelligent assistance powered by GitHub Copilot and AI-driven workflows. With Agent Mode, developers can automate repetitive coding tasks, optimize performance, and receive contextual help directly in the IDE. The suite includes Visual Studio 2022, the comprehensive IDE for .NET and C++ development on Windows, and Visual Studio Code, the lightweight, cross-platform editor supporting JavaScript, Python, and dozens of other languages. Visual Studio integrates seamlessly with Azure, GitHub, and CI/CD pipelines, enabling teams to collaborate and ship code efficiently. Trusted by millions worldwide, Visual Studio provides the tools and intelligence developers need to build reliable, scalable, and secure applications from concept to release.
    Starting Price: $45/user/month
  • 13
    Nucleus

    Nucleus

    Nucleus

    Nucleus is redefining the vulnerability management software category as the single source of record for all assets, vulnerabilities, and associated data. We unlock the value you’re not getting from existing tools and place you squarely on the path to program maturity by unifying the people, processes, and technology involved in vulnerability management. With Nucleus, you receive unmatched visibility into your program and a suite of tools with functionality that simply can’t be replicated in any other way. Nucleus is the single shift-left tool that unifies development and security operations. It unlocks the value you’re not getting out of your existing tools and puts you on the path to unifying the people, processes, and technology involved in addressing vulnerabilities and code weaknesses. With Nucleus, you’ll get unmatched pipeline integration, tracking, triage, automation and reporting capabilities and a suite of tools with functionality.
    Starting Price: $10 per user per year
  • 14
    ServiceNow

    ServiceNow

    ServiceNow

    Digitize your workflows - they'll love you for it. Your company can be more productive and your people more engaged. ServiceNow makes work, work better for people. Transform old, manual ways of working into modern digital workflows, so employees and customers get what they need, when they need it—fast, simple, easy. ServiceNow delivers digital workflows that create great experiences and unlock productivity for employees and the enterprise. We simplify the complexity of work on a single, enterprise cloud platform. The Now Platform: The intelligent and intuitive cloud platform for work. Choose from our workflows or build your own apps. Built on the Now Platform, our product portfolio delivers the  IT,  Employee, and  Customer Workflows that matter with enterprise solutions to help drive every part of your digital transformation. Create the great experiences you want and unlock the productivity you need, now with native mobile capabilities for everyday work across the enterprise.
    Starting Price: $100 per month
  • 15
    F5 BIG-IP Advanced WAF
    Advanced Web Application Firewall (WAF) protect your apps with behavioral analytics, proactive bot defense, and application-layer encryption of sensitive data. Use the ROI Estimator from F5 and Forrester to find out how Advanced WAF can improve your security posture and save you money. The F5 F5 BIG-IP Advanced WAF provides a powerful set of security features that will keep your Web Applications safe from attack. Many WAFs offer a basic level of protection from attack at the higher layers of the OSI stack, but the F5 Advanced WAF takes things even further and offers some serious security features like Anti Bot Mobile SDK, Credential Stuffing threat feeds, Proactive Bot Defense, and Datasafe to name a few. Protect your apps, APIs, and data against the most prevalent attacks such as zero-day vulnerabilities, app-layer DoS attacks, threat campaigns, application takeover, and bots.
  • 16
    Bugzilla

    Bugzilla

    Bugzilla

    Bugzilla is server software designed to help you manage software development. Optimized database structure for increased performance and scalability. Excellent security to protect confidentiality. Advanced query tool that can remember your searches. Integrated email capabilities. Editable user profiles and comprehensive email preferences. Comprehensive permissions system. Proven under fire as Mozilla's bug tracking system. A large number of companies, organizations, and projects use Bugzilla. This page showcases a few particularly high-profile or otherwise interesting installations, and also contains a list of public Bugzillas. Includes bug fixes and performance improvements only. No new features or large scale performance improvements. No database schema changes. May contain documentation changes. No changes to templates that aren't part of bug fix, other than typos or grammatical fixes.
  • 17
    Azure DevOps Server
    Share code, track work, and ship software using integrated software delivery tools, hosted on premisis. Use all the Azure DevOps services or just the ones you need to complement your existing workflows. Previously known as Team Foundation Server (TFS), Azure DevOps Server is a set of collaborative software development tools, hosted on-premises. Azure DevOps Server integrates with your existing IDE or editor, enabling your cross-functional team to work effectively on projects of all sizes. Azure DevOps Server is source code management software, and includes features such as access Controls/Permissions, bug tracking, build automation, change management, code review, collaboration, continuous integration, and version control.
    Starting Price: $6 per user per month
  • 18
    CircleCI

    CircleCI

    CircleCI

    Automate your development process with CI hosted in the cloud or on a private server. Take control of your code and manage every source of change. CircleCI means change validation, at every step. Trust that you can release updates right when your customers need them, with the certainty they’ll work every time. The power to create without limits. Code in every language and across multiple execution environments. If you can write it, we can build, test, and deploy it. With flexible environments and thousands of pre-built integrations, your pipelines never limit the possibility of what you can deliver. We’re the only CI/CD platform that’s FedRAMP certified and SOC 2 Type II compliant. Built-in features like audit logs, OpenID Connect, third-party secrets management, and LDAP give you complete control of your code.
    Starting Price: $50 per month
  • 19
    Opsera

    Opsera

    Opsera

    You choose your tools, we take care of the rest. Put together the perfect CI/CD stack that fits your organization’s goals with zero vendor lock-in. ‍Eliminate manual scripts and stop building toolchain automation. Free your engineers to focus on your core business. Pipeline workflows follow a declarative model so you focus on what is required — not how it’s accomplished — including: software builds, security scans, unit testing, and deployments. With Blueprints, diagnose any failures from within Opsera using a console output of every step of your pipeline execution. Comprehensive software delivery analytics across your CI/CD process in a unified view — including Lead Time, Change Failure Rate, Deployment Frequency, and Time to Restore. ‍Contextualized logs for faster resolution and improved auditing and compliance.
    Starting Price: $3.60 per user , Min 300 devs
  • 20
    NorthStar Navigator

    NorthStar Navigator

    NorthStar.io, Inc.

    NorthStar is redefining Risk-Based Vulnerability Management with simple, contextual vulnerability prioritization for easier remediation. Common challenges NorthStar addresses are listed below: • Prioritize issues that should be addressed first in order to make the best use of limited resources. • Address lingering exposures that could impact critical business services, applications, and data stores. • Bridge the visibility gap and discrepancies that exist between vulnerability assessment and patch management. • Track reduction in risk over time and validate the most important issues are being addressed first. • Deliver a complete view of their environment – all assets, vulnerabilities and exposures. • Eliminate manual processes and unnecessary spreadsheet work.
    Starting Price: $8 per device
  • 21
    JupiterOne

    JupiterOne

    JupiterOne

    JupiterOne is a cyber asset analysis platform every modern security team needs to collect and transform asset data into actionable insights to secure their attack surface. JupiterOne was created to make security as simple as asking a question and getting the right answer back, with context, to make the right decision. With JupiterOne, organizations are able to see all asset data in a single place, improve confidence in choosing their priorities and optimize the deployment of their existing security infrastructure.
    Starting Price: $2000 per month
  • 22
    Vulcan Cyber

    Vulcan Cyber

    Vulcan Cyber

    At Vulcan Cyber we’re changing the way businesses reduce cyber risk through vulnerability remediation orchestration. We help IT security teams go beyond remedial vulnerability management to help them drive vulnerability remediation outcomes. The Vulcan platform consolidates vulnerability and asset data, with threat intelligence and customizable risk parameters to deliver risk-based vulnerability prioritization insights. But we don't stop there. Vulcan remediation intelligence takes the vulnerabilities that matter to your business and attaches the remedies and fixes needed to mitigate the threat. Then Vulcan orchestrates and measures the rest of the remediation process with integrations and inputs into application security, DevSecOps, patch management, configuration management, and cloud security tools, teams and functions. From scan to fix, Vulcan Cyber delivers the unique ability to orchestrate the entire vulnerability remediation process to GET FIX DONE at scale.
    Starting Price: $999 / month
  • 23
    ThreadFix

    ThreadFix

    Denim Group

    ThreadFix 3.0 provides a comprehensive view of your risk from applications and their supporting infrastructure. Skip the spreadsheets and PDFs forever. From Application Security Managers to CISOs, ThreadFix helps increase efficiency across teams and provides powerful reporting to upper management. Explore the powerful benefits of ThreadFix, the industry leading application vulnerability management platform. Automatically consolidate, de-duplicate, and correlate vulnerabilities in applications to the infrastructure assets that support them using results from commercial and open source application and network scanning tools. Knowing which vulnerabilities exist is important, but it’s just a start. With ThreadFix, you will quickly spot vulnerability trends and make smart remediation decisions based on data in a centralized view. When vulnerabilities are discovered, it can be tough to go back and fix them.
    Starting Price: $2000 per month
  • 24
    Visual Basic

    Visual Basic

    Microsoft

    Visual Basic is an object-oriented programming language developed by Microsoft. Using Visual Basic makes it fast and easy to create type-safe .NET apps. Visual Basic focuses on supplying more of the features of the Visual Basic Runtime (microsoft.visualbasic.dll) to .NET Core and is the first version of Visual Basic focused on .NET Core. Many portions of the Visual Basic Runtime depend on WinForms and these will be added in a later version of Visual Basic. .NET is a free, open-source development platform for building many kinds of apps. With .NET, your code and project files look and feel the same no matter which type of app you're building. You have access to the same runtime, API, and language capabilities with each app. A Visual Basic program is built up from standard building blocks. A solution comprises one or more projects. A project in turn can contain one or more assemblies. Each assembly is compiled from one or more source files.
    Starting Price: Free
  • 25
    Phoenix Security

    Phoenix Security

    Phoenix Security

    Phoenix Security enables security, developers, and businesses to all talk the same language. We help security professionals focus on the vulnerabilities that matter most across cloud, infrastructure, and application security. Laser focuses on the 10% of vulnerabilities that matter today, and reduces risk faster with prioritized contextualized vulnerabilities. Threat intelligence automatically in the risk improves efficiency enabling fast reaction. Threat intelligence automatically in the risk improves efficiency enabling fast reaction. Aggregate, correlate and contextualize multiple security tools and data sources, providing your business with unprecedented visibility. Break down the silos between application security, operational security, and the business.
    Starting Price: $3,782.98 per month
  • 26
    Zoho Directory
    Zoho Directory is a cloud-based identity and access management platform designed to streamline authentication, authorization, and user management for organizations. It offers Single Sign-On (SSO) capabilities, allowing employees to access multiple applications with a single set of credentials, thereby enhancing security and user convenience. The platform supports Multi-Factor Authentication (MFA), adding an extra layer of protection against unauthorized access. Device authentication ensures secure access to both applications and devices, enabling employees to use the same credentials across platforms. Zoho Directory also provides robust provisioning features, allowing IT administrators to create and manage user profiles across various applications directly from the platform, reducing the time spent on repetitive tasks. Integration with existing directories, such as Microsoft Active Directory and Azure AD, is facilitated through directory stores.
    Starting Price: $1.70/user/month
  • 27
    CodeShip

    CodeShip

    CloudBees

    Do you want everything set up for you instantly, or do you want to customize your environment and your workflow? CodeShip lets the developer pick the path that’s best for them, to maximize productivity and let teams evolve over time. From deployments to notifications to code coverage to security scanning and on-premise SCMs, CodeShip lets you integrate with any tool, service or cloud you need for your organization’s perfect workflow. Not only do we make CodeShip easy to use, we also provide fast and thorough developer support. When you need help or identify a problem, you want to talk to someone technical sooner rather than later, and that’s what you’ll get with CodeShip. You can get your builds and deployments working in less than 5 minutes with CodeShip’s turnkey environment and simple UI. From there, you can evolve into more sophisticated workflows and config-as-code as your projects grow.
    Starting Price: $49 per month
  • 28
    Travis CI

    Travis CI

    Travis CI

    The simplest way to test and deploy your projects in the cloud or on-prem. Easily sync your projects with Travis CI and you’ll be testing your code in minutes. Check out our features – now you can sign up for Travis CI using your Assembla, Bitbucket, GitHub or GitLab account to connect your repositories! Testing your open-source projects is always 100% free! Log in with your cloud repository, tell Travis CI to test a project, and then push. Could it be any simpler? Many databases and services are pre-installed and can be enabled in your build configuration. Make sure every Pull Request to your project is tested before it’s merged. Updating staging or production as soon as your tests pass has never been easier! Builds on Travis CI are configured mostly through the build configuration stored in the file .travis.yml in your repository. This allows your configuration to be version controlled and flexible.
    Starting Price: $63 per month
  • 29
    Active Directory
    Active Directory stores information about objects on the network and makes this information easy for administrators and users to find and use. Active Directory uses a structured data store as the basis for a logical, hierarchical organization of directory information. This data store, also known as the directory, contains information about Active Directory objects. These objects typically include shared resources such as servers, volumes, printers, and the network user and computer accounts. For more information about the Active Directory data store, see Directory data store. Security is integrated with Active Directory through logon authentication and access control to objects in the directory. With a single network logon, administrators can manage directory data and organization throughout their network, and authorized network users can access resources anywhere on the network. Policy-based administration eases the management of even the most complex network.
    Starting Price: $1 per user per month
  • 30
    Gradle

    Gradle

    Gradle

    Gradle Inc. is the company behind the leading software solution for improving developer productivity and happiness called Develocity (formerly Gradle Enterprise) and the popular open-source Gradle Build Tool, which is downloaded over 30 million times a month. Gradle is also pioneering the emerging practice of Developer Productivity Engineering (DPE). Elite development teams from companies like Airbnb, LinkedIn, Microsoft, Nasdaq, and Netflix, practice DPE to deliver quality software more rapidly at scale. They achieve this by leveraging Develocity’s innovative build and test performance acceleration technologies and analytics to proactively improve the reliability of the developer toolchain and make failure troubleshooting more efficient.
  • 31
    SD Elements

    SD Elements

    Security Compass

    SD Elements (SDE) helps AppSec teams keep up with rising development demands by defining the exact security requirements a project needs early, often cutting review time by 30–50%. As a Security by Design platform, it identifies risks during planning and architecture—when fixes are fastest—and turns them into clear, standards-mapped requirements developers can use. SDE evaluates architecture, data sensitivity, and regulatory needs to generate the right controls with concise implementation guidance. This allows small AppSec teams to support security across 100+ applications without adding headcount while ensuring consistent, standardized requirements across teams and products. The platform integrates with Jira, CI/CD pipelines, and other dev tools so security tasks align with delivery workflows. Directors gain visibility into requirement coverage, security posture, and audit readiness, making it easier to reduce risk, track progress, and report to leadership.
  • 32
    Imperva CDN
    Deploying your websites and applications around the globe can lead to more cyber attacks and fraud, unless you have effective security. The Imperva Content Delivery Network (CDN) brings content caching, load balancing, and failover built natively into a comprehensive Web Application and API Protection (WAAP) platform, so your applications are securely delivered across the globe. Let machine learning do the work for you. It efficiently caches your dynamically-generated pages, while ensuring content freshness. This significantly improves cache utilization and further reduces bandwidth usage. Take advantage of multiple content and networking optimization techniques to minimize page rendering time and improve user experience. Imperva’s global CDN uses advanced caching and optimization techniques to improve connection and response speeds while lowering bandwidth costs.
  • 33
    Imperva WAF
    Web application attacks prevent important transactions and steal sensitive data. Imperva Web Application Firewall (WAF) analyzes traffic to your applications to stop these attacks and ensure uninterrupted business operations. A noisy WAF forces you to choose between blocking legitimate traffic or manually containing attacks your WAF let through. Imperva Research Labs ensure accuracy to WAF customers as the threat landscape changes. Automatic policy creation and fast rule propagation empower your security teams to use third-party code without risk while working at the pace of DevOps. Imperva WAF is a key component of a comprehensive Web Application and API Protection (WAAP) stack that secures from edge to database, so the traffic you receive is only the traffic you want. We provide the best website protection in the industry – PCI-compliant, automated security that integrates analytics to go beyond OWASP Top 10 coverage, and reduces the risks created by third-party code.
  • 34
    Imperva DDoS Protection
    Imperva DDoS Protection secures all your assets at the edge for uninterrupted operation. Ensure business continuity with guaranteed uptime. When it comes to DDoS mitigation, the rule of thumb is: ‘moments to go down, hours to recover’. This is why, when defending against an attack, every second counts. Imperva gives you the peace of mind that attack traffic will be automatically blocked at the edge – without you having to scale up in bandwidth to pay for it. Imperva DDoS Protection for Websites is an always-on service that immediately mitigates any type or size of DDoS attack targeting web applications. Our DDoS protection for websites complements the Imperva cloud web application firewall (WAF), which blocks hacking attempts and attacks by malicious bots. A change to your DNS records ensures that all HTTP/S traffic to your domain(s) is routed through the Imperva network. Acting as a secure proxy, Imperva DDoS protection for websites masks your origin server IP.
  • 35
    Scuba Database Vulnerability Scanner
    Scuba Database Vulnerability Scanner. Download Scuba, a free tool that uncovers hidden security risks. Scan enterprise databases for vulnerabilities and misconfiguration. Know the risks to your databases. Get recommendations on how to mitigate identified issues. Available for Windows, Mac, Linux (x32), and Linux (x64), Scuba offers over 2,300 assessment tests for Oracle, Microsoft SQL, SAP Sybase, IBM DB2 and MySQL. Scuba is a free tool that scans leading enterprise databases for security vulnerabilities and configuration flaws, including patch levels, that allows you to uncover potential database security risks. It includes more than 2,300 assessment tests for Oracle, Microsoft SQL Server, SAP Sybase, IBM DB2 and MySQL. It’s possible to run a Scuba scan from any Windows, Mac or Linux client. Depending on your database size, users, groups and network connection, an average Scuba scan normally takes 2-3 minutes. No pre-installation or other dependencies are required.
  • 36
    AuthPoint

    AuthPoint

    WatchGuard

    Our unique multi-factor authentication (MFA) solution not only helps to reduce the likelihood of network disruptions and data breaches arising from lost or stolen credentials, but we deliver this important capability entirely from the Cloud for easy set-up and management. AuthPoint goes beyond traditional 2-Factor Authentication (2FA) by considering innovative ways to positively identify users, and our large ecosystem of 3rd party integrations means that you can use MFA to protect access. Ultimately, WatchGuard AuthPoint is the right solution at the right time to make MFA a reality for the businesses who desperately need it to block attacks. AuthPoint uses a push message, QR code, or one-time password (OTP) as an additional factor proving your identity, and our mobile device DNA matches the authorized user’s phone when granting access to systems and applications. Therefore, any attacker who clones a user’s device in an attempt to access a protected system would be blocked.
  • 37
    OpsLevel

    OpsLevel

    OpsLevel

    OpsLevel is the fastest, most flexible Internal Developer Portal, giving your teams complete visibility and control over services, teams, and tech stacks—all in one place. Unlike rigid, DIY solutions, OpsLevel automates catalog creation and maintenance so your developers can spend less time managing metadata and more time shipping great software. With built-in AI-powered insights, automation, and customizable workflows, OpsLevel helps engineering leaders enforce standards, drive migrations, and improve reliability—without friction. From onboarding to incident response, from self-service to security, OpsLevel brings everything together so your teams can move faster with confidence.
  • 38
    Legit Security

    Legit Security

    Legit Security

    Legit Security protects software supply chains from attack by automatically discovering and securing the pipelines, infrastructure, code and people so that businesses can stay safe while releasing software fast. Automatically discover security issues, remediate threats and ensure the integrity and compliance of software releases. Comprehensive, visual SDLC inventory that's continually updated. Reveal unknown, misconfigured and vulnerable SDLC systems and infrastructure. Centralized visibility over location, coverage and configuration of your existing security tools and scanners. Catch insecure build actions before they can embed vulnerabilities downstream. Centralized, early prevention of sensitive data leaks, secrets and PII, before being pushed into the SDLC. Track security trends across teams and product lines to improve security posture and incentivize behavior. Get security posture at-a-glance with Legit Security Scores, Integrate your own alert and ticketing tools or use ours.
  • 39
    C#

    C#

    Microsoft

    C# (also known as C Sharp, pronounced "See Sharp") is a modern, object-oriented, and type-safe programming language. C# enables developers to build many types of secure and robust applications that run in .NET. C# has its roots in the C family of languages and will be immediately familiar to C, C++, Java, and JavaScript programmers. This tour provides an overview of the major components of the language in C# 8 and earlier. C# is an object-oriented, component-oriented programming language. C# provides language constructs to directly support these concepts, making C# a natural language in which to create and use software components. Since its origin, C# has added features to support new workloads and emerging software design practices. At its core, C# is an object-oriented language. You define types and their behavior.
    Starting Price: Free
  • 40
    Kondukto

    Kondukto

    Kondukto

    The Kondukto platform’s flexible design allows you to create custom workflows for responding to risks quickly and efficiently. Take advantage of more than 25 built-in open-source tools ready to run SAST, DAST, SCA, and Container Image scans within minutes without a need for installation, maintenance, or updates. Protect your corporate memory from changes in employees, scanners, or DevOps tools. All security data, statistics, and activities in one place for you to own. Avoid vendor lock or loss of historical data when you need to change an AppSec tool. Verify fixes automatically to ensure better collaboration and less distraction. Boost efficiency by eliminating redundant conversations between AppSec and development teams.
    Starting Price: $12,000 per annually
  • 41
    Conviso Platform

    Conviso Platform

    Conviso Platform

    Gain a complete view of your application security. Increase security maturity in your secure development process, and reduce the risks associated with your products. Application Security Posture Management (ASPM) solutions play a crucial role in the ongoing management of application risks, addressing security issues from the development phase to deployment. Efficiently managing an AppSec program, dealing with a growing number of products, and lacking a comprehensive view of vulnerabilities are typically significant challenges for the development team. We enhance the evolution of maturity by supporting the implementation of AppSec programs, monitoring established and executed actions, KPIs, and much more. We enable security to be incorporated into the early stages of development by defining requirements, processes, and policies and optimizing resources and time invested in additional testing or validations.
    Starting Price: $20.99 per asset
  • 42
    Cisco Vulnerability Management
    A tidal wave of vulnerabilities, but you can’t fix them all. Rely on extensive threat intel and patented prioritization to cut costs, save time, and keep your teams efficiently focused on reducing the biggest risks to your business. This is Modern Risk-Based Vulnerability Management. We created Risk-Based Vulnerability Management software and now we’re defining the modern model. Show your security and IT teams which infrastructure vulnerabilities they should remediate, when. Our latest version reveals exploitability can be measured, and accurately measuring exploitability can help you minimize it. Cisco Vulnerability Management (formerly Kenna.VM) combines real-world threat and exploit intelligence and advanced data science to determine which vulnerabilities pose the highest risk and which you can deprioritize. Spoiler alert: Your mega-list of “critical vulnerabilities” will shrink faster than a woolen sweater-vest in a hot cycle.
  • 43
    Clarity by Broadcom
    Speed up your digital transformation with Clarity, the leading investment-planning solution for the enterprise. Instead of traditional project management, we help you transition to digital product management, where you manage value streams to counter market disruptions, maximize enterprise resources, and pivot with fluctuating customer demands. Make sure you are investing the company’s time and money in the right business initiatives. See how your investments are doing in real time. Base your prioritization on value-based decisions, not gut feelings. Strategic portfolio management allows you to continuously plan and prioritize work to fit both customer demands and business needs. To succeed, however, you need a solution that helps you manage the entire value stream – from concept to cash. Spin up projects in minutes and let teams work the way they want, while staying engaged with the business.
  • 44
    BMC AMI Data for Db2
    BMC AMI Data for Db2® Reduce data management costs by up to 65% or more. Leverage automation for world-class data management enabling 24x7 availability, greater resiliency, and the agility needed to provide a transcendent customer experience. Transform the management of your Db2 databases. Increase availability, improve performance, and ensure secure recovery of your critical data assets. Ensure highest availability so your business can run at peak performance to best serve your customers and provide them with the flawless, superior experience they deserve. See measurable results: 10% improvement in application performance; 6% reduction in MIPS consumption; and for files previously unable to be reorganized, a 90% boost in query response time. Avoid cumbersome reorganizations and costly CPU upgrades by making the most of your existing resources. Quickly diagnose performance problems and track them to their source.
  • 45
    Cybeats

    Cybeats

    Cybeats

    Cybeats Technologies delivers a powerful platform for Software Supply Chain Security that helps organizations manage, analyze, and share their Software Bills of Materials (SBOMs) with confidence. Its flagship product, SBOM Studio, enables companies to store, enrich, and continuously monitor SBOMs across thousands of applications. By simplifying vulnerability lifecycle management, Cybeats accelerates remediation while maintaining compliance with emerging global cybersecurity regulations. The platform supports open standards like SPDX and CycloneDX, ensuring interoperability and transparency across the ecosystem. Cybeats empowers security teams to detect, prioritize, and mitigate risks efficiently, saving hundreds of hours per project. Trusted by global technology leaders, Cybeats enhances product security, strengthens customer trust, and builds resilient software supply chains.
  • 46
    Apache Maven

    Apache Maven

    The Apache Software Foundation

    Apache Maven is a software project management and comprehension tool. Based on the concept of a project object model (POM), Maven can manage a project's build, reporting and documentation from a central piece of information. If you think that Maven could help your project, you can find out more information in the "About Maven" section of the navigation. This includes an in-depth description of what Maven is and a list of some of its main features. If the problem has not been reported before, the recommended way to get help is to subscribe to the Maven Users Mailing list. Many other users and Maven developers will answer your questions there, and the answer will be archived for others in the future.
  • 47
    AWS CodeStar
    AWS CodeStar enables you to quickly develop, build, and deploy applications on AWS. AWS CodeStar provides a unified user interface, enabling you to easily manage your software development activities in one place. With AWS CodeStar, you can set up your entire continuous delivery toolchain in minutes, allowing you to start releasing code faster. AWS CodeStar makes it easy for your whole team to work together securely, allowing you to easily manage access and add owners, contributors, and viewers to your projects. Each AWS CodeStar project comes with a project management dashboard, including an integrated issue tracking capability powered by Atlassian Jira Software. With the AWS CodeStar project dashboard, you can easily track progress across your entire software development process, from your backlog of work items to teams’ recent code deployments. There is no additional charge for using AWS CodeStar. You only pay for the AWS resources that you provision.
  • 48
    PlexTrac

    PlexTrac

    PlexTrac

    PlexTrac is the #1 AI-powered platform for pentest reporting and threat exposure management, helping cybersecurity teams efficiently address the most critical threats and vulnerabilities. By consolidating data, automating reporting, prioritizing risks, and streamlining remediation workflows, PlexTrac reduces organization’s overall threat exposure. We designed the PlexTrac platform to address the workflow pain points security practitioners face. PlexTrac helps them track signal through the noise and break down communication silos. Combining “plexus” and “track,” our name really says it all. PlexTrac exists to network and coordinate all people and parts of a security program and to better track progress toward maturity.
  • 49
    Digitate ignio
    Transform your operations across domains using AI and Automation towards an Autonomous Enterprise for improved resilience, assurance, and superior customer experience. Digitate’s ignio helps resolve your operational woes for an Agile, Resilient and Autonomous Enterprise. Businesses can adapt to changes efficiently, evolve digitally and unleash innovation to sustain and grow. With ignio, transform your IT and business operations’ from reactive to proactive, and take a leap forward to ‘Predict, Prescribe and Prevent.’ Learn how enterprises can elevate their business and IT operation strategy to make headway into an Autonomous Enterprise. Get started on your journey from Traditional to Automated to Autonomous Operations. Powered by AI and Machine Learning, Autonomous Operations allows enterprises to reduce manual efforts, adapt to business or IT changes efficiently with minimal cost and focus on innovation.
  • 50
    Apache Ant

    Apache Ant

    Apache Software Foundation

    Apache Ant is a Java library and command-line tool whose mission is to drive processes described in build files as targets and extension points dependent upon each other. The main known usage of Ant is the build of Java applications. Ant supplies a number of built-in tasks allowing to compile, assemble, test and run Java applications. Ant can also be used effectively to build non Java applications, for instance C or C++ applications. More generally, Ant can be used to pilot any type of process which can be described in terms of targets and tasks. Ant is written in Java. Users of Ant can develop their own "antlibs" containing Ant tasks and types, and are offered a large number of ready-made commercial or open-source "antlibs".Ant is extremely flexible and does not impose coding conventions or directory layouts to the Java projects which adopt it as a build tool.
  • Previous
  • You're on page 1
  • 2
  • Next