Page 2 - Top The Code Registry Alternatives

Zerocopter

Zerocopter

zerocopter.com

Zerocopter enables you to confidently leverage the skills of the world's most knowledgable ethical hackers to secure your applications.

Typo

Typo

typoapp.io

Typo is an AI-driven software delivery management platform that enables dev teams with real-time SDLC visibility, automated code reviews & DevEX insights to code better, deploy faster & stay aligned with business goals. It connects with the existing tool stack within 30 seconds & empowers with : - R...

Beagle Security

Beagle Security

beaglesecurity.com

Beagle Security helps you identify vulnerabilities in your web applications, APIs, GraphQL and remediate them with actionable insights before hackers harm you in any manner. With Beagle Security, you can integrate automated penetration testing into your CI/CD pipeline to identify security issues ear...

Intruder

Intruder

intruder.io

Intruder is an attack surface management platform that empowers organizations to discover, detect, and fix weaknesses on any vulnerable assets across their network. It provides actionable remediation advice on a continuous basis, by customizing the output of multiple industry-leading scanners using ...

Aurinko.io

Aurinko.io

aurinko.io

Aurinko powers core communications features, and offers out-of-the-box CRM sync logic, and ready-to-integrate Gmail and Outlook add-ons allowing business platforms (CRM, ATS, PM, PRM, LMS) to enable intelligent relationship management. *** CRM Sync Logic *** ENABLE INTELLIGENT RELATIONSHIP MANAGEMEN...

Codat

Codat

codat.io

Codat helps banks build deeper connections with business customers. We offer products that make it easy to access, synchronize and interpret data from customers’ financial software for specific use cases, such as onboarding suppliers to commercial card programs and underwriting business loans. Codat...

Aikido Security

Aikido Security

aikido.dev

Aikido Security is a developer-centric software security platform, providing advanced code scanning and cloud vulnerability assessments. Our platform prioritizes real threats, reduces false-positives and makes Common Vulnerabilities and Exposures (CVEs) easily understandable. With Aikido, ensuring t...

GuardRails

GuardRails

guardrails.io

GuardRails is an end-to-end security platform that makes AppSec easier for both security and development teams. We scan, detect, and provide real-time guidance to fix vulnerabilities early. Trusted by hundreds of teams around the world to build safer apps, GuardRails integrates seamlessly into the d...

SOOS

SOOS

soos.io

Application Security Posture Management Platform Your organization’s application security posture should be more than just a checklist. SOOS’s ASPM is a dynamic, comprehensive approach to safeguarding your application infrastructure from vulnerabilities across the Software Development Life Cycle (S...

Escape

Escape

escape.tech

Find and fix GraphQL security flaws at scale within your DevSecOps process. Leverage the new generation DAST & ASM for early, real-time Business Logic vulnerability detection and remediation in GraphQL, enhancing security from development to deployment.

Debricked

Debricked

debricked.com

Debricked's SCA-tool allows you to manage your open source in an easy, smart and efficient manner. Automatically find, fix and prevent vulnerabilities, avoid non compliant licenses and evaluate the health of your dependencies - all in one tool. Security - Your developers shouldn't have to be securit...

OverOps

OverOps

overops.com

OverOps issue root cause analysis at runtime instantly pinpoints why a critical issue broke your complex backend Java or .Net application in pre-prod and production. Eliminate the detective work of searching logs for the cause. Resolve issues in minutes.

Oversecured

Oversecured

oversecured.com

Enterprise vulnerability scanner for Android and iOS apps. It offers app owners and developers the ability to secure each new version of a mobile app by integrating Oversecured into the development process.

GlitchSecure

GlitchSecure

glitchsecure.com

GlitchSecure helps companies secure their products and infrastructure through real-time continuous security testing.

Trava Security

Trava Security

travasecurity.com

More than a GRC tool, we're your compliance experts. Simplifying processes, freeing your time and resources, fueling your business growth. Unlock the power of Vulnerability Management Software and vCISO Services to fortify your organization against cyber threats while safeguarding your digital asset...

ReconwithMe

ReconwithMe

reconwithme.com

An ISO 27001 Complaint tool ReconwithMe is an automated vulnerability scanning tool founded by security engineers who saw a need for positive change and innovation in the cybersecurity space. ReconWithMe helps scan vulnerabilities such as XSS, SQL injection, Missing headers, Clickjacking, API miscon...

Bytesafe

Bytesafe

bytesafe.dev

Bytesafe is a platform for end-to-end software supply chain security - a firewall for your dependencies. The platform consists of: - Dependency Firewall - Package Management - Software Composition Analysis - License Compliance

GitGuardian

GitGuardian

gitguardian.com

The new ways of building software create the necessity to support new vulnerabilities and new remediation workflows. These needs have emerged so abruptly that they have given rise to a young and highly fragmented DevSecOps tooling market. Solutions are specialized based on the type of vulnerabilitie...

CodeScan

CodeScan

codescan.io

CodeScan Shield addresses code quality, security, and compliance liabilities with two automated modules: CodeScan and OrgScan. CodeScan provides static code analysis for total visibility into code health from the moment it’s written through production. OrgScan governs organizational policies by enfo...

Data Theorem

Data Theorem

datatheorem.com

RamQuest’s solutions include our fully integrated closing, escrow accounting, imaging, transaction management, esigning, and digital marketplace solutions and are available on-premise or in a hosted environment

Bright Security

Bright Security

brightsec.com

Bright Security’s dev-centric DAST platform empowers both developers and AppSec professionals with enterprise-grade security testing capabilities for web applications, APIs, and GenAI and LLM applications. Bright knows how to deliver the right tests, at the right time in the SDLC, in developers and ...

Probely

Probely

probely.com

Probely is a web vulnerability scanner that enables customers to easily test the security of their Web Applications & APIs. Our goal is to narrow the gap between development, security, and operations by making security an intrinsic characteristic of web applications development life-cycle, and only ...

OnSecurity

OnSecurity

onsecurity.io

OnSecurity is a leading CREST-accredited penetration testing vendor based in the UK, dedicated to delivering high-impact, high-intelligence penetration testing services to businesses of all sizes. By simplifying the management and delivery of pentesting, we make it easier for organisations to enhanc...

Pentera

Pentera

pentera.io

Pentera is the category leader for Automated Security Validation, allowing every organization to test with ease the integrity of all cybersecurity layers, unfolding true, current security exposures at any moment, at any scale. Thousands of security professionals and service providers around the worl...

Defendify

Defendify

defendify.com

Founded in 2017, Defendify is pioneering All-In-One Cybersecurity® for organizations with growing security needs, backed by experts offering ongoing guidance and support. Delivering multiple layers of protection, Defendify provides an all-in-one, easy-to-use platform designed to strengthen cybersecu...

Cymulate

Cymulate

cymulate.com

Cymulate is a leading Security Validation Platform based on the industry's most comprehensive and user-friendly Breach and Attack Simulation technology. We empower security teams to continuously test and harden defenses in a dynamic threat landscape by taking the view of the attacker. Cymulate deplo...

Sysdig

Sysdig

sysdig.com

Sysdig Secure is our CNAPP platform that more than 700 enterprise customers use to address CNAPP, VM, CSPM, CIEM, container security and more - at enterprise scale. Our platform spans prevention, detection, and response so customers can confidently secure containers, Kubernetes, hosts/servers, and c...

Orca Security

Orca Security

orca.security

The Orca Cloud Security Platform identifies, prioritizes, and remediates risks and compliance issues in workloads, configurations, and identities across your cloud estate spanning AWS, Azure, Google Cloud, Kubernetes, Alibaba Cloud, and Oracle Cloud. Orca offers the industry’s most comprehensive clo...

Trag

Trag

usetrag.com

Trag is an AI-powered code review tool designed to optimize the code review process. Trag works by pre-reviewing the code and identifying issues before they are reviewed by a senior engineer, thus speeding up the review process and saving engineering time. Furthermore, unlike standard linting tools,...

Unified.to

Unified.to

unified.to

"One API to integrate the all" — We’re the Unified API developer platform for SaaS integrations. One customer integration request can take a software team months to build. With Unified.to, you can launch all the integrations your customers need in just hours. Unified.to is the only platform that giv...

© 2024 WebCatalog, Inc.

We use cookies to provide and improve our websites. By using our sites, you consent to cookies.