Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Description

Delphix is the industry leader for DataOps. It provides an intelligent data platform that accelerates digital change for leading companies around world. The Delphix DataOps Platform supports many systems, including mainframes, Oracle databases, ERP apps, and Kubernetes container. Delphix supports a wide range of data operations that enable modern CI/CD workflows. It also automates data compliance with privacy regulations such as GDPR, CCPA and the New York Privacy Act. Delphix also helps companies to sync data between private and public clouds, accelerating cloud migrations and customer experience transformations, as well as the adoption of disruptive AI technologies.

Description

SecureStack can detect common security issues in your CI/CD pipeline and prevent them from getting into your applications. SecureStack automatically embeds security with every git push. Our technology is designed to check every aspect of your application security. We look for missing security controls and correct encryption. We also test the effectiveness of your WAF. All this was done in less than 60 seconds. You can see what hackers can see when they look at your applications. Compare your development, staging, and production environments to quickly identify critical differences and find solutions to high-priority issues. We help you to decompose your web app so you can see all the resources used behind the scenes.

API Access

Has API

API Access

Has API

Screenshots View All

Screenshots View All

Integrations

Amazon Web Services (AWS)
Google Cloud Platform
Microsoft Azure
.NET
Amazon RDS
Azure DevOps Projects
Azure Marketplace
Clonetab
Commvault Cloud
Digital.ai Release
GenRocket
GitLab
Jira
Jtest
MySQL
New Relic
Oracle Cloud Infrastructure
Puppet Enterprise
Python
ServiceNow

Integrations

Amazon Web Services (AWS)
Google Cloud Platform
Microsoft Azure
.NET
Amazon RDS
Azure DevOps Projects
Azure Marketplace
Clonetab
Commvault Cloud
Digital.ai Release
GenRocket
GitLab
Jira
Jtest
MySQL
New Relic
Oracle Cloud Infrastructure
Puppet Enterprise
Python
ServiceNow

Pricing Details

No price information available.
Free Trial
Free Version

Pricing Details

$500/mo
Free Trial
Free Version

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Vendor Details

Company Name

Perforce

Founded

1995

Country

United States

Website

www.perforce.com/products/delphix

Vendor Details

Company Name

SecureStack

Founded

2017

Country

Australia

Website

securestack.com

Product Features

Application Lifecycle Management

Administrator Level Control
Defect Tracking
Iteration Planning
Project Management
Release Management
Requirements Review
Task Management
Test Case Tracking
User Level Management
Version Control

Continuous Integration

Build Log
Change Management
Configuration Management
Continuous Delivery
Continuous Deployment
Debugging
Permission Management
Quality Assurance Management
Testing Management

Data Fabric

Data Access Management
Data Analytics
Data Collaboration
Data Lineage Tools
Data Networking / Connecting
Metadata Functionality
No Data Redundancy
Persistent Data Management

Data Governance

Access Control
Data Discovery
Data Mapping
Data Profiling
Deletion Management
Email Management
Policy Management
Process Management
Roles Management
Storage Management

Data Management

Customer Data
Data Analysis
Data Capture
Data Integration
Data Migration
Data Quality Control
Data Security
Information Governance
Master Data Management
Match & Merge

Data Privacy Management

Access Control
CCPA Compliance
Consent Management
Data Mapping
GDPR Compliance
Incident Management
PIA / DPIA
Policy Management
Risk Management
Sensitive Data Identification

Database

Backup and Recovery
Creation / Development
Data Migration
Data Replication
Data Search
Data Security
Database Conversion
Mobile Access
Monitoring
NOSQL
Performance Analysis
Queries
Relational Interface
Virtualization

DevOps

Approval Workflow
Dashboard
KPIs
Policy Management
Portfolio Management
Prioritization
Release Management
Timeline Management
Troubleshooting Reports

GDPR Compliance

Access Control
Consent Management
Data Mapping
Incident Management
PIA / DPIA
Policy Management
Risk Management
Sensitive Data Identification

Master Data Management

Data Governance
Data Masking
Data Source Integrations
Hierarchy Management
Match & Merge
Metadata Management
Multi-Domain
Process Management
Relationship Mapping
Visualization

Virtualization

Archiving & Retention
Capacity Monitoring
Data Mobility
Desktop Virtualization
Disaster Recovery
Namespace Management
Performance Management
Version Control
Virtual Machine Monitoring

Product Features

Application Development

Access Controls/Permissions
Code Assistance
Code Refactoring
Collaboration Tools
Compatibility Testing
Data Modeling
Debugging
Deployment Management
Graphical User Interface
Mobile Development
No-Code
Reporting/Analytics
Software Development
Source Control
Testing Management
Version Control
Web App Development

Application Lifecycle Management

Administrator Level Control
Defect Tracking
Iteration Planning
Project Management
Release Management
Requirements Review
Task Management
Test Case Tracking
User Level Management
Version Control

Application Security

Analytics / Reporting
Open Source Component Monitoring
Source Code Analysis
Third-Party Tools Integration
Training Resources
Vulnerability Detection
Vulnerability Remediation

Cybersecurity

AI / Machine Learning
Behavioral Analytics
Endpoint Management
IOC Verification
Incident Management
Tokenization
Vulnerability Scanning
Whitelisting / Blacklisting

DevOps

Approval Workflow
Dashboard
KPIs
Policy Management
Portfolio Management
Prioritization
Release Management
Timeline Management
Troubleshooting Reports

Static Application Security Testing (SAST)

Application Security
Dashboard
Debugging
Deployment Management
IDE
Multi-Language Scanning
Real-Time Analytics
Source Code Scanning
Vulnerability Scanning

Alternatives

Alternatives

Seeker Reviews

Seeker

Black Duck
IRI Voracity Reviews

IRI Voracity

IRI, The CoSort Company