Compare the Top DevSecOps Software Tools in 2021

DevSecOps is a somewhat new term that's short for Development, Security, and Operations. DevSecOps is built upon the same methodology as DevOps, but incorporates security and secure development workflows. Think of DevSecOps as, you guessed it, DevOps plus security, but more specifically, IT security and cybersecurity. DevSecOps is built on the principle that development and IT operations should include security considerations at all times. There are a wide variety of DevSecOps software and tools, some of which accomplish just the Dev, just the Sec, or just the Ops portion of the equation, and others which are built specifically to encompass the entire DevSecOps principles. Here's a list of the best DevSecOps tools:

  • 1
    Kiuwan Code Security
    Security Solutions For Your DevOps Process. Automatically scan your code to identify and remediate vulnerabilities. Compliant with the most stringent security standards, such as OWASP and CWE, Kiuwan Code Security covers all important languages and integrates with leading DevOps tools. Effective static application security testing and source code analysis, with affordable solutions for teams of all sizes. Kiuwan includes a variety of essential functionality in a single platform that can be integrated directly into your internal development infrastructure. Fast Vulnerability Detection: Easy and instant setup. Start scanning and get results in just minutes. DevOps Approach To Code Security: Integrate Kiuwan with your Ci/CD/DevOps pipeline to automate your security process. Flexible Licensing Options: Plenty of options, one time scans or continuous scanning. Kiuwan also offers a Saas or On-Premise model.
    Leader badge
    View Software
    Visit Website
  • 2
    Sonrai Security

    Sonrai Security

    Sonraí Security

    Identity and Data Protection for AWS, Azure, Google Cloud, and Kubernetes. Sonrai’s public cloud security platform provides a complete risk model of all identity and data relationships, including activity and movement across cloud accounts, cloud providers, and 3rd party data stores. Uncover all identity and data relationships between administrators, roles, compute instances, serverless functions, and containers across multi-cloud accounts and 3rd-party data stores. Inside the platform, our critical resource monitor continuously monitors your critical data sitting inside object stores (e.g. AWS S3, Azure Blob) and database services (e.g. CosmosDB, Dynamo DB, RDS). Privacy and compliance controls are monitored across multiple cloud providers and 3rd party data stores. Resolutions are coordinated with relevant DevSecOps teams.
    View Software
    Visit Website
  • 3
    WhiteSource

    WhiteSource

    WhiteSource

    The leading solution for agile open source security and license compliance management, WhiteSource integrates with the DevOps pipeline to detect vulnerable open source libraries in real-time. It provides remediation paths and policy automation to speed up time-to-fix. It also prioritizes vulnerability alerts based on usage analysis. We support over 200 programming languages and offer the widest vulnerability database aggregating information from dozens of peer-reviewed, respected sources.
    Starting Price: $6000+/year
    View Software
    Visit Website
  • 4
    Netsparker

    Netsparker

    Netsparker

    Netsparker web application security scanner automatically detects SQL Injection, Cross-site Scripting (XSS) and other vulnerabilities in all types of web applications, regardless of the technology they are built with. Netsparker is easy to use and employs a unique and dead accurate proof-based scanning technology that automatically verifies the identified vulnerabilities; so you do not have to manually verify them. Netsparker is available as desktop software and as an online scanning service and is trusted by world renowned companies such as Samsung, NASA, Microsoft, ING bank, Skype and Ernst & Young.
    Leader badge
    Starting Price: $4,995 per year
    View Software
    Visit Website
  • 5
    Datadog

    Datadog

    Datadog

    Datadog is the monitoring, security and analytics platform for developers, IT operations teams, security engineers and business users in the cloud age. Our SaaS platform integrates and automates infrastructure monitoring, application performance monitoring and log management to provide unified, real-time observability of our customers' entire technology stack. Datadog is used by organizations of all sizes and across a wide range of industries to enable digital transformation and cloud migration, drive collaboration among development, operations, security and business teams, accelerate time to market for applications, reduce time to problem resolution, secure applications and infrastructure, understand user behavior and track key business metrics.
    Starting Price: $15.00/host/month
  • 6
    Sumo Logic

    Sumo Logic

    Sumo Logic

    Sumo Logic offers a cloud solution for log management and metrics monitoring for IT and security teams of organizations of all sizes. Faster troubleshooting with integrated logs, metrics and traces. One platform. Many use cases. Increase your troubleshooting effectiveness. Sumo Logic helps you reduce downtime and move from reactive to proactive monitoring with cloud-based modern analytics powered by machine learning. Quickly detect Indicators of Compromise (IoCs), accelerate investigation, and ensure compliance using Sumo Logic Security Analytics. Enable data-driven business decisions and predict and analyze customer behavior using Sumo Logic’s real-time analytics platform. The Sumo Logic platform helps you make data-driven decisions and reduce the time to investigate security and operational issues so you can free up resources for more important activities.
    Starting Price: $270.00 per month
  • 7
    Splunk Enterprise
    Go from data to business outcomes faster than ever before with Splunk. Splunk Enterprise makes it simple to collect, analyze and act upon the untapped value of the big data generated by your technology infrastructure, security systems and business applications—giving you the insights to drive operational performance and business results. Collect and index log and machine data from any source. Combine your machine data with data in your relational databases, data warehouses and Hadoop and NoSQL data stores. Multi-site clustering and automatic load balancing scale to support hundreds of terabytes of data per day, optimize response times and provide continuous availability. The Splunk platform makes it easy to customize Splunk Enterprise to meet the needs of any project. Developers can build custom Splunk applications or integrate Splunk data into other applications. Apps from Splunk, our partners and our community enhance and extend the power of the Splunk platform.
  • 8
    Probely

    Probely

    Probely

    Probely is a web vulnerability scanner for agile teams. It provides continuous scanning of web applications and lets you efficiently manage the lifecycle of the vulnerabilities found, in a sleek and intuitive web interface. It also provides simple instructions on how to fix the vulnerabilities (including snippets of code), and by using its full-featured API, it can be integrated into development processes (SDLC) and continuous integration pipelines (CI/CD), to automate security testing. Probely empowers developers to be more independent, solving the security teams' scaling problem, that is usually undersized when compared to development teams, by providing developers with a tool that makes them more independent when it comes to security testing, allowing security teams to focus on more important and critical activities. Probely covers OWASP TOP10 and thousands more and can be used to check specific PCI-DSS, ISO27001, HIPAA, and GDPR requirements.
    Starting Price: $49.00/month
  • 9
    Signal Sciences

    Signal Sciences

    Signal Sciences

    The leading hybrid and multi-cloud platform that provides next-gen WAF, API Security, RASP, Advanced Rate Limiting, Bot Protection, and DDoS purpose built to eliminate the challenges of legacy WAF. Legacy WAFs weren’t designed for today’s web apps that are distributed across cloud, on-premise or hybrid environments. Our next-gen web application firewall (NGWAF) and runtime application self protection (RASP) increase security and maintain reliability without sacrificing velocity, all at the lowest total cost of ownership (TCO).
  • 10
    Rencore Code (SPCAF)
    Rencore Code (SPCAF) is the only solution on the market that analyzes and assures SharePoint, Microsoft 365 and Teams code quality by checking violations against over 1100 policies and checks regarding security, performance, best practices, maintainability, and supportability.
    Starting Price: $70 per user per month
  • 11
    YAG-Suite

    YAG-Suite

    YAGAAN

    The YAG-Suite is a french made innovative tool which brings SAST one step beyond. Based on static analysis and machine learning, YAGAAN offers customers more than a source code scanner : it offers a smart suite of tools to support application security audits as well as security and privacy by design DevSecOps processes. Beyond classic vulnerability detection, the YAG-Suite's focuses the team attention on the problems that really matter in their business context, it supports developers in their understanding of the vulnerability causes and impacts. Its contextual remediation support them in fixing efficiently the problems while improving their secure coding skills. Additionally, YAG-Suite's unprecedented 'code mining' support security investigations of an unknown application with mapping all relevant code features and security mechanisms and offers querying capabilities to search for 0-days or non automatically detectable risks. PHP, Java and soon C, C++ and Python
    Starting Price: From €500/token or €150/mo
  • 12
    Coralogix

    Coralogix

    Coralogix

    Coralogix is the leading stateful streaming platform providing modern engineering teams with real-time insights and long-term trend analysis with no reliance on storage or indexing. Ingest data from any source for a centralized platform to manage, monitor, and alert on your applications. As data is ingested, Coralogix instantly narrows millions of events down to common patterns for deeper insights and faster troubleshooting. Machine learning algorithms continuously observe data patterns and flows between system components and trigger dynamic alerts so you know when a pattern deviates from the norm without static thresholds or the need for pre-configurations. Connect any data, in any format, and view your insights anywhere including our purpose-built UI, Kibana, Grafana, SQL clients, Tableau, or using our CLI and full API support. Coralogix has successfully completed relevant security and privacy compliances by BDO including GDPR, SOC 2, PCI, HIPAA, and ISO 27001/27701.
  • 13
    Appdome

    Appdome

    Appdome

    Appdome changes the way people build mobile apps. Appdome’s industry defining no-code mobile solutions platform uses a patented, artificial-intelligence coding technology to power a self-serve, user-friendly service that anyone can use to build new security, authentication, access, enterprise mobility, mobile threat, analytics and more into any Android and iOS app instantly. There are over 25,000 unique combinations of mobile features, kits, vendors, standards, SDKs and APIs available on Appdome. Over 200+ leading financial, healthcare, government, and m-commerce providers use Appdome to consistently deliver richer and safer mobile experiences to millions of mobile end users, eliminating complex development and accelerating mobile app lifecycles.
  • 14
    CodeScan

    CodeScan

    CodeScan

    Code Quality and Security for Salesforce Developers. Made exclusively for the Salesforce platform, CodeScan’s code analysis solutions provide you with total visibility into your code health. The most comprehensive static code analysis solution supporting Salesforce languages and metadata. Self hosted. Check your code for security and quality with the most extensive database for the salesforce platform. Cloud. Get all the benefits of our self hosted service without the need of servers or internal infrastructure. Editor plugins. Plug in codescan to your favorite editor and get real-time feedback while you code. Define code standards. Maintain the quality of your code according to best practices. Control code quality. Enforce your coding standards and minimize code complexity throughout the development process. Reduce technical debt. Track your technical debt to improve your code quality and efficiency. Increase development productivity.
    Starting Price: $250 per month
  • 15
    ReSharper

    ReSharper

    JetBrains

    The Visual Studio Extension for .NET Developers. On-the-fly code quality analysis is available in C#, VB.NET, XAML, ASP.NET, ASP.NET MVC, JavaScript, TypeScript, CSS, HTML, and XML. You'll know right away if your code needs to be improved. Not only does ReSharper warn you when there's a problem in your code but it provides hundreds of quick-fixes to solve problems automatically. In almost every case, you can select the best quick-fix from a variety of options. Automated solution-wide code refactorings help you safely change your code base. Whether you need to revitalize legacy code or put your project structure in order, you can rely on ReSharper. You can instantly navigate and search through the whole solution. Jump to any file, type, or type member, or navigate from a specific symbol to its usages, base and derived symbols, or implementations.
    Starting Price: $12.90 per user per month
  • 16
    LogicMonitor

    LogicMonitor

    LogicMonitor

    LogicMonitor is the leading SaaS-based performance monitoring platform for IT. Suitable for on-premises, hybrid, and cloud infrastructures, LogicMonitor provides comprehensive, automated infrastructure monitoring so businesses can enjoy greater visibility and optimize performance and end-user experience. It features powerful real-time dashboards, network device configurations, full data center visibility, network scanning, and flexible alerting and reporting.
  • 17
    Sqreen

    Sqreen

    Sqreen

    Security built into every app. Everywhere. Application security platform that helps teams protect applications, increase visibility and secure code. Protect applications by preventing data breaches, stopping account takeovers and blocking business logic attacks. Increase visibility by monitoring incidents in real time, streamlining incident response management and automating your application inventory. Secure code by finding critical threats, fixing vulnerabilities and integrating security into the SDLC. Protect, observe and test your applications through a single platform and apply a holistic security approach. Analyze application execution logic in real-time to deliver more robust security without compromising performance. Sandboxed microagents dynamically adapt to evolving applications and threats without requiring maintenance.
    Starting Price: $499 per month
  • 18
    Dynatrace

    Dynatrace

    Dynatrace

    The Dynatrace software intelligence platform. Transform faster with unparalleled observability, automation, and intelligence in one platform. Leave the bag of tools behind, with one platform to automate your dynamic multicloud and align multiple teams. Spark collaboration between biz, dev, and ops with the broadest set of purpose-built use cases in one place. Harness and unify even the most complex dynamic multiclouds, with out-of-the box support for all major cloud platforms and technologies. Get a broader view of your environment. One that includes metrics, logs, and traces, as well as a full topological model with distributed tracing, code-level detail, entity relationships, and even user experience and behavioral data – all in context. Weave Dynatrace’s open API into your existing ecosystem to drive automation in everything from development and releases to cloud ops and business processes.
    Starting Price: $11 per month
  • 19
    LogRhythm NextGen SIEM
    We know your job isn’t easy. That’s why we combine log management, machine learning, SOAR, UEBA, and NDR to give you broad visibility across your environment so you can quickly uncover threats and minimize risk. But a mature SOC doesn’t just stop threats. With LogRhythm, you’ll easily baseline your security operations program and track your gains — so you can easily report your successes to your board. Defending your enterprise comes with great responsibility — that’s why we built our NextGen SIEM Platform with you in mind. With intuitive, high-performance analytics and a seamless incident response workflow, protecting your business just got easier. With the LogRhythm XDR Stack, your team has an integrated set of capabilities that deliver on the fundamental mission of your SOC — threat monitoring, threat hunting, threat investigation, and incident response — at a low total cost of ownership.
  • 20
    Atomicorp Enterprise OSSEC
    Atomic Enterprise OSSEC is the commercially enhanced version of the OSSEC Intrusion Detection System brought to you by the sponsors of the OSSEC project. OSSEC is the world’s most popular open source host-based intrusion detection system (HIDS) used by tens of thousands of organizations. Atomicorp extends OSSEC with a management console (OSSEC GUI), advanced file integrity management (FIM), PCI compliance auditing and reporting, expert support and more. - Intrusion Detection - File Integrity Monitoring - Log Management - Active Response - OSSEC GUI and Management - OSSEC Compliance Reporting - PCI, GDPR, HIPAA, and NIST compliance - Expert OSSEC Support Get expert support for OSSEC servers and agents as well as help developing OSSEC rules. More info on Atomic Enterprise OSSEC is available at: https://www.atomicorp.com/atomic-enterprise-ossec/
  • 21
    JFrog Xray
    DevSecOps Next Generation – Securing Your Binaries. Identify security vulnerabilities and license violations early in the development process and block builds with security issues from deployment. Automated and continuous governance and auditing of software artifacts and dependencies throughout the software development lifecycle from code to production. Additional functionalities include: - Deep recursive scanning of components drilling down to analyze all artifacts and dependencies and creating a graph of relationships between software components. - On-Prem, Cloud, Hybrid, or Multi-Cloud Solution - Impact analysis of how an issue in one component affects all dependent components with a display chain of impacts in a component dependency graph. - JFrog’s vulnerabilities database, continuously updated with new component vulnerability data, includes VulnDB, the industry’s most comprehensive security vulnerability database.
  • 22
    Wallarm FAST

    Wallarm FAST

    Wallarm

    Automate Security testing in CI/CD. Identify vulnerabilities in apps and APIs with dynamic security testing as fast as your DevOps runs. Automated continuous security enables high-velocity CI/CD. Integrated testing for every code build. Security is guardrails. Unified CI workflows for DevSecOps. Developer friendly. FAST automatically transforms existing functional tests into security tests in CI/CD. A FAST proxy (Docker container) is used to capture requests as baselines. It then creates and runs a multitude of security checks for every build. Use OWASP Top 10 defaults or specify your own testing policies, like types of parameters to test, payloads, or fuzzer settings. Report vulnerabilities and anomalies to the CI pipeline and ticketing system.
    Starting Price: $25,000 per year
  • 23
    SD Elements

    SD Elements

    Security Compass

    Helping enterprises reduce software time to market while improving product security and compliance proactively. Digital transformations make it absolutely necessary for organizations to release software faster while regulatory requirements mandate it to be secure and protect privacy. Doing both isn’t easy, and most organizations compromise between speed and safety. Don’t you want a product that enables you to go fast while staying safe in application development? SD Elements is the world’s first Balanced Development Automation (BDA) platform that enables organizations to innovate fast, stay ahead of the competition, and deliver secure products. Speed up the application development process through the automation of proactive security processes before the code is written, leading to a faster time to market. Significantly reduce security risks in software development and deployment by “shifting security left� and eliminating more than 92 percent of vulnerabilities.
  • 24
    PWSLab

    PWSLab

    PWSLab

    A single secured DevOps solution built for both Web and Mobile technologies. Git-based Source Control, Security and Compliance, Automated builds and testing, Continuous Delivery to infrastructure, Monitoring and more.
    Starting Price: $8 per user/month
  • 25
    Appknox

    Appknox

    Appknox

    Push world-class mobile apps faster into the market without compromising on security Build and deploy world-class mobile apps for your organizations at scale and leave your mobile app security to us. Highest Rated Security solution on Gartner We rejoice when the Appknox system secures our client’s app against all vulnerabilities. At Appknox we’re dedicated to delivering Mobile Application Security to help businesses achieve their objectives today and in the near Future. Static Application Security Testing (SAST). With 36 different test cases, Appknox SAST can detect almost every vulnerability that’s lurking around by analyzing your source code. Our tests cover security compliances like OWASP Top 10, PCI-DSS, HIPAA and other commonly used security threat parameters. Dynamic Application Security Testing (DAST). Detect advanced vulnerabilities while your application is running.
  • 26
    Cloud Security Cockpit
    Control your risk. Protect your sensitive data from risky misconfigurations that lead to breaches and non-compliance. Cloud Security Cockpit® puts elegantly simple controls in place to manage Salesforce security with the same rigors you use for other tier 1, mission-critical cloud platforms. Field by field? User by user? No way. Cloud Security Cockpit® helps you properly implement controls for Salesforce, lightning fast. This is your most powerful tool for DevSecOps. It breaks down the wall between security operations and application development, keeping those functions moving forward together, aggressively. You won’t have to pause or disrupt operations or development cycles, and on-going management and compliance reporting only takes a few clicks. Get instant value from whatever security controls you already have in place. Give your team the tools to set up security controls right the first time, aligning with your corporate security posture.
  • 27
    Gauntlt

    Gauntlt

    Gauntlt

    Gauntlt provides hooks to a variety of security tools and puts them within reach of security, dev and ops teams to collaborate to build rugged software. It is built to facilitate testing and communication between groups and create actionable tests that can be hooked into your deploy and testing processes. Gauntlt attacks are written in a easy-to-read language. Easily hooks into your org's testing tools and processes. Security tool adapters come with gauntlt. Uses unix standard error and standard out to pass status. There are two ways to get started with gauntlt. You can use the gem install method which will require you to download and setup the security tools (don't worry gauntlt walks you through it) or you can use the Gauntlt Starter Kit which is a vagrant script that will bootstrap the tools for you automagically. Security testing is usually done on the auditors' schedule and that testing output isn't always actionable.
  • 28
    Fortify WebInspect

    Fortify WebInspect

    Micro Focus

    Find and fix exploitable web application vulnerabilities with automated dynamic application security testing. Detect exploitable vulnerabilities in web applications and APIs using fast, integrated, and automated dynamic analysis. Support for the latest web technologies and pre-configured policies for major compliance regulations. Powerful scanning integrations that enable API and single-page application testing at scale. Automation and workflow integrations help to meet the needs of DevOps. Monitor trends and use dynamic analysis to take action on vulnerabilities. Drive fast and highly focused results with custom scan policies and incremental analysis support. Build an AppSec program around a solution, not a point product. Leverage the single Fortify taxonomy for SAST, DAST, IAST, and RASP. WebInspect provides the industry’s most mature dynamic web application testing solution, with the breadth of coverage needed to support both legacy and modern application types.
  • 29
    IMMUNIO

    IMMUNIO

    IMMUNIO

    IMMUNIO is a software company based in Canada and offers a software product called IMMUNIO. Pricing starts at $199.00/month. IMMUNIO offers training via live online and webinars. IMMUNIO is IT security software, and includes features such as Third-Party tools integration, training resources, vulnerability detection, and vulnerability remediation. IMMUNIO offers business hours support and online support. IMMUNIO offers a free version and free trial. IMMUNIO is available as SaaS software. Some alternative products to IMMUNIO include PerimeterX, Acunetix, and Infocyte.
    Starting Price: $199.00/month
  • 30
    Threat Stack

    Threat Stack

    Threat Stack

    Threat Stack is the leader in cloud security & compliance for infrastructure and applications, helping companies securely leverage the business benefits of the cloud with proactive risk identification and real-time threat detection across cloud workloads. The Threat Stack Cloud Security Platform® delivers full stack security observability across the cloud management console, host, container, orchestration, managed containers, and serverless layers. Threat Stack provides the flexibility to consume telemetry within existing security workflows — or manages it with you through the Threat Stack Cloud SecOps ProgramSM so you can respond to security incidents and improve your organization’s cloud security posture over time.
    Starting Price: $9.00/month
  • 31
    Sysdig

    Sysdig

    Sysdig

    Run Confidently with Secure Devops. Security for containers, Kubernetes, and cloud services. Scan for vulnerabilities and misconfigurations. Get visibility across the stack to confidently run apps in production. Use a detailed audit trail to speed incident response, troubleshooting and audits. We built the Sysdig platform on an open source stack to accelerate innovation and drive standardization. Falco was founded by Sysdig, donated to the CNCF, and is the open standard for runtime threat detection. The sysdig open source project delivers deep container visibility through Linux syscalls and is the standard for container forensics. Scanning images for vulnerabilities is handled by the Anchore engine. Sysdig Monitor leverages Prometheus for PromQL compatible and scalable monitoring.
  • 32
    Black Duck

    Black Duck

    Synopsys

    For over 15 years, security, development, and legal teams around the globe have relied on Black Duck to help them manage the risks that come with the use of open source. Built on the Black Duck KnowledgeBase™—the most comprehensive database of open source component, vulnerability, and license information—Black Duck software composition analysis solutions and open source audits give you the insight you need to track the open source in your code, mitigate security and license compliance risks, and automatically enforce open source policies using your existing DevOps tools and processes. Black Duck provides a comprehensive software composition analysis (SCA) solution for managing security, quality, and license compliance risk that comes from the use of open source and third-party code in applications and containers. Black Duck gives you unmatched visibility into third-party code, enabling you to control it across your software supply chain and throughout the application life cycle.
  • 33
    LogDNA

    LogDNA

    LogDNA

    Instantly centralize, monitor, and analyze logs in real-time from any platform, at any volume. We seamlessly combine log aggregation, custom parsing, smart alerting, role based access controls, and real-time search, graphs, and log analysis in one suite of tools. Our cloud based SaaS solution sets up within two minutes to collect logs from AWS, Docker, Heroku, Elastic and more. Running Kubernetes? Start logging in two kubectl commands. Simple, pay-per-GB pricing without paywalls, overage charges, or fixed data buckets. Simply pay for the data you use on a month-to-month basis. We are SOC2, GDPR, PCI, and HIPAA compliant and are Privacy Shield certified. Our military grade encryption ensures your logs are secure in transit and storage. We empower developers with user-friendly, modernized features and natural search queries. With no special training required, we save you even more time and money.
  • 34
    Google Cloud Build
    Fully serverless platform: Cloud Build scales up and scales down in response to load with no need to pre-provision servers or pay in advance for additional capacity. Pay only for what you use. Flexibility: With custom build steps and pre-created extensions to third party apps, enterprises can easily tie their legacy or home-grown tools as a part of their build process. Security and compliance: Guard against security threats in your software supply chain with vulnerability scanning. Automatically block deployment of vulnerable images based on policies set by DevSecOps.
  • 35
    Micro Focus Fortify
    Automated application security helps developers and AppSec pros eliminate vulnerabilities and build secure software. Fortify offers end-to-end application security solutions with the flexibility of testing on-premises and on-demand to scale and cover the entire software development lifecycle. Focus on what matters most with low false positive rates. Find vulnerabilities directly in the developer’s IDE with real-time security analysis or save time with machine learning-powered auditing. Start an application security initiative in a day. Get a team of experts who deliver optimization, results review, and false positive removal as part of our global 24/7 support. Choose on-premises, as a service, or hybrid. CI/CD integration makes security scans a part of the build/release process, which enables full automation and workflow support. Defect management integrations provide transparent remediation for security issues.
  • 36
    Contrast Assess

    Contrast Assess

    Contrast Security

    A new kind of security designed for the way software is created. Resolve security issues minutes after installation by integrating security into your toolchain. Because Contrast agents monitor code and report from inside the application, developers can finally find and fix vulnerabilities without requiring security experts. That frees up security teams to focus on providing governance. Contrast Assess deploys an intelligent agent that instruments the application with smart sensors. The code is analyzed in real time from within the application. Instrumentation minimizes the false positives that slow down developers and security teams. Resolve security issues minutes after installation by integrating security into your toolchain. Contrast Assess integrates seamlessly into the software life cycle and into the tool sets that development and operations teams are already using, including native integration with ChatOps, ticketing systems and CI/CD tools, and a RESTful API.
  • 37
    JProfiler

    JProfiler

    ej-technologies GmbH

    When you profile, you need the most powerful tool you can get. At the same time, you do not want to spend time learning how to use the tool. JProfiler is just that: simple and powerful at the same time. Configuring sessions is straight-forward, third party integrations make getting started a breeze and profiling data is presented in a natural way. On all levels, JProfiler has been carefully designed to help you get started with solving your problems. Database calls are the top reasons for performance problems in business applications. JProfiler's JDBC and JPA/Hibernate probes as well as the NoSQL probes for MongoDB, Cassandra and HBase show the reasons for slow database access and how slow statements are called by your code. From the JDBC timeline view that shows you all JDBC connections with their activities, through the hot spots view that shows you slow statements to various telemetry views and a list of single events.
  • 38
    Venafi

    Venafi

    Venafi

    Protect All Your Machine Identities. Are you protecting the TLS keys and certificates, SSH keys, code signing keys, and user certificates being used across your extended enterprise? Find out how you can secure this avalanche of new and constantly changing machine identities. Stay ahead of outages and accelerate DevOps security. The Trust Protection Platform powers enterprise solutions that give you the visibility, intelligence and automation to protect machine identities throughout your organization. Plus, you can extend your protection through an ecosystem of hundreds of out-of-the-box integrated third-party applications and certificate authorities (CAs). Discover and provision certificates and keys using multiple methods. Apply and enforce security best practices for certificates. Integrate workflow management processes with management of certificate lifecycles. Combine certificate automation with orchestration of keys generated by Hardware Security Modules (HSMs).
  • 39
    OWASP Zed Attack Proxy (ZAP)
    Zed Attack Proxy (ZAP) is a free, open-source penetration testing tool being maintained under the umbrella of the Open Web Application Security Project (OWASP). ZAP is designed specifically for testing web applications and is both flexible and extensible. At its core, ZAP is what is known as a “man-in-the-middle proxy.� It stands between the tester’s browser and the web application so that it can intercept and inspect messages sent between browser and web application, modify the contents if needed, and then forward those packets on to the destination. It can be used as a stand-alone application, and as a daemon process. ZAP provides functionality for a range of skill levels – from developers, to testers new to security testing, to security testing specialists. ZAP has versions for each major OS and Docker, so you are not tied to a single OS. Additional functionality is freely available from a variety of add-ons in the ZAP Marketplace, accessible from within the ZAP client.
  • 40
    Evident.io

    Evident.io

    Evident.io

    Evident.io is a United States software company and offers a software title called Evident.io. Evident.io offers training via documentation, live online, and in person sessions. Evident.io offers a free trial. Evident.io is IT security software, and includes features such as IP protection and vulnerability scanning. With regards to system requirements, Evident.io is available as SaaS software. Costs start at $199.00/month. Evident.io includes 24/7 live support and online support. Some alternative products to Evident.io include vArmour, Sonrai Security, and Blesk.
    Starting Price: $199.00/month
  • 41
    Qualys Cloud Platform
    Qualys Cloud Platform. The revolutionary architecture that powers Qualys’ IT, security, and compliance cloud apps. Qualys Cloud Platform gives you a continuous, always-on assessment of your global IT, security, and compliance posture, with 2-second visibility across all your IT assets, wherever they reside. And with automated, built-in threat prioritization, patching and other response capabilities, it’s a complete, end-to-end security solution. On premises, at endpoints, on mobile, in containers or in the cloud, Qualys Cloud Platform sensors are always on, giving you continuous 2-second visibility of all your IT assets. Remotely deployable, centrally managed and self-updating, the sensors come as physical or virtual appliances, or lightweight agents. Qualys Cloud Platform provides an end-to-end solution, allowing you to avoid the cost and complexities that come with managing multiple security vendors.
    Starting Price: $500.00/month
  • 42
    Tripwire

    Tripwire

    Tripwire

    Cybersecurity for Enterprise and Industrial Organizations. Protect against cyberattacks with the industry’s best foundational security controls. Detect threats, identify vulnerabilities and harden configurations in real time with Tripwire. Thousands of organizations trust Tripwire Enterprise to serve as the core of their cybersecurity programs. Join them and regain complete control over your IT environment with sophisticated FIM and SCM. Shortens the time it takes to catch and limit damage from threats, anomalies, and suspicious changes. Gives you deep, unparalleled visibility into your security system state and know your security posture at all times. Closes the gap between IT and security by integrating with both teams' existing toolsets. Out-of-the-box platforms and policies enforce regulatory compliance standards.
  • 43
    Checkmarx

    Checkmarx

    Checkmarx

    The Checkmarx Software Security Platform provides a centralized foundation for operating your suite of software security solutions for Static Application Security Testing (SAST), Interactive Application Security Testing (IAST), Software Composition Analysis (SCA), and application security training and skills development. Built to address every organization’s needs, the Checkmarx Software Security Platform provides the full scope of options: including private cloud and on-premises solutions. Allowing a range of implementation options ensures customers can start securing their code immediately, rather than going through long processes of adapting their infrastructure to a single implementation method. The Checkmarx Software Security Platform transforms the standard for secure application development, providing one powerful resource with industry-leading capabilities.
  • 44
    CyberArk Conjur
    A seamless open source interface to securely authenticate, control and audit non-human access across tools, applications, containers and cloud environments via robust secrets management. Secrets grant access to applications, tools, critical infrastructure and other sensitive data. Conjur secures this access by tightly controlling secrets with granular Role-Based Access Control (RBAC). When an application requests access to a resource, Conjur authenticates the application, performs an authorization check against the security policy and then securely distributes the secret. Security policy as code is the foundation of Conjur. Security rules are written in .yml files, checked into source control, and loaded onto the Conjur server. Security policy is treated like any other source control asset, adding transparency and collaboration to the organization’s security requirements.
  • 45
    Aqua

    Aqua

    Aqua Security Software

    Full lifecycle security for container-based and serverless applications, from your CI/CD pipeline to runtime production environments. Aqua runs on-prem or in the cloud, at any scale.
  • 46
    Lacework

    Lacework

    Lacework

    Founded in 2015, Lacework is a software organization based in the United States that offers a piece of software called Lacework. Lacework offers 24/7 live support. Lacework features training via documentation, live online, webinars, and in person sessions. The Lacework software suite is SaaS software. Lacework is cloud security software, and includes features such as application security, behavioral analytics, incident management, intrusion detection system, threat intelligence, and vulnerability management. Lacework offers a free trial. Some competitor software products to Lacework include Wiz, C3M Cloud Control, and RedLock.
  • 47
    Veracode

    Veracode

    Veracode

    Veracode offers a holistic, scalable way to manage security risk across your entire application portfolio. We are the only solution that can provide visibility into application status across all testing types, including SAST, DAST, SCA, and manual penetration testing, in one centralized view.
  • 48
    SonarQube

    SonarQube

    SonarSource

    SonarSource builds world-class products for Code Quality and Security. Our open-source and commercial code analyzer - SonarQube - support 27 programming languages, empowering dev teams of all sizes to solve coding issues within their existing workflows.
  • 49
    AppScan

    AppScan

    HCL Technologies

    Application Security Testing with HCL AppScan. Adopt a scalable security testing strategy to pinpoint and remediate application vulnerabilities in every phase of the development lifecycle, to minimize exposure to attack. HCL AppScan delivers best-in-class security testing tools to ensure your business, and your customers, are not vulnerable to attack. Rapidly identify, understand and remediate security vulnerabilities. Detect application vulnerabilities before they become a problem, remediate them when they are still cheap to fix, and ensure compliance with regulations. Cloud-based application security testing suite to perform static, dynamic and interactive testing on web, mobile and open source software. Large-scale, multi-user, multi-app dynamic application security (DAST) to identify, understand and remediate vulnerabilities, and achieve regulatory compliance.
  • 50
    Avatao

    Avatao

    Avatao

    Avatao’s security training goes beyond simple tutorials and videos offering an interactive job-relevant learning experience to developer teams, security champions, pentesters, security analysts and DevOps teams. With 600+ challenges and tutorials in 10+ languages, the platform covers a wide range of security topics across the entire security stack from OWASP Top 10 to DevSecOps and Cryptography. The platform immerses developers in high-profile cases and provides them with real, in-depth experience with challenging security breaches. Engineers will actually learn to hack and patch the bugs themselves. This way Avatao equips software engineering teams with a security mindset that increases their capability to reduce risks and react to known vulnerabilities faster. This in turn increases the security capability of a company to ship high-quality products.
  • 51
    Praetorian

    Praetorian

    Praetorian

    Praetorian Chariot is a full-stack CI/CD security workhorse that takes the burden off engineering teams, signaling only when it matters. Through in situ workflows, tech-stack tailored recommendations, and subject matter expertise just a Slack channel away, we're aiming to make security dead simple. We are committed to removing security friction for all stakeholders, without compromising quality. The downside of DevSecOps products is that they are riddled with false positives. We want to give you back time by minimizing the amount of unnecessary triage and code changes on vulnerabilities reports that are not real or not important. We are committed to only signaling when it matters. We recognize that customers are operating across multiple development and deployment environments. Unlike solutions offered by certain platform companies, we appreciate that our customers do not like vendor lock-in and want the freedom to choose best of breed.
  • 52
    Snort

    Snort

    Cisco

    Snort is the foremost Open Source Intrusion Prevention System (IPS) in the world. Snort IPS uses a series of rules that help define malicious network activity and uses those rules to find packets that match against them and generates alerts for users. Snort can be deployed inline to stop these packets, as well. Snort has three primary uses: As a packet sniffer like tcpdump, as a packet logger — which is useful for network traffic debugging, or it can be used as a full-blown network intrusion prevention system. Snort can be downloaded and configured for personal and business use alike. Once downloaded and configured, Snort rules are distributed in two sets: The “Community Ruleset� and the “Snort Subscriber Ruleset.� The Snort Subscriber Ruleset is developed, tested, and approved by Cisco Talos. Subscribers to the Snort Subscriber Ruleset will receive the ruleset in real-time as they are released to Cisco customers.
  • 53
    Trend Micro Deep Security
    Trend Micro is a software business in the United States that publishes a software suite called Trend Micro Deep Security. The Trend Micro Deep Security product is SaaS software. Trend Micro Deep Security includes business hours and online support. Trend Micro Deep Security is cloud security software, and includes features such as antivirus, application security, behavioral analytics, intrusion detection system, and vulnerability management. Alternative competitor software options to Trend Micro Deep Security include CloudPassage Halo, Wiz, and Sonrai Security.
  • 54
    Coverity Static Code Analysis
    Synopsys is a software company based in the United States and offers a software product called Coverity Static Code Analysis. Coverity Static Code Analysis is application development software, and includes features such as code assistance, software development, data modeling, deployment management, collaboration tools, access Controls/Permissions, source control, Reporting/Analytics, code refactoring, compatibility testing, and No-Code. Some alternative products to Coverity Static Code Analysis include codebeat, GitLab, and GitHub.