Average Ratings 0 Ratings
Average Ratings 0 Ratings
Description
The SEA Manager, or software environment analyzer, is an exceptionally robust tool for software analysis that provides a comprehensive overview of all applications within your organization and their interconnections. As a fundamental component of numerous services offered by Neperia Group, SEA Manager opens up a multitude of opportunities for clients to understand, manage, and enhance their software assets. When integrated with Neperia’s KPS Portal, a software insight platform, SEA Manager empowers businesses with unparalleled oversight of every software element essential to their operations. This tool operates entirely autonomously, delivering rapid, thorough, and impartial information to its users. The insights gained from its analysis significantly mitigate the time, expenses, and risks associated with projects like knowledge rebuilding, migration, porting, and re-engineering. Regardless of the complexity of your software systems, Neperia’s SEA Manager provides a wealth of benefits. It also produces both functional and technical documentation in MS Office formats, featuring graphic visualizations tailored to the specific requirements of each client. Overall, SEA Manager stands out as an indispensable resource for companies aiming to optimize their software management strategies.
Description
The YAG Suite is a French-made innovative tool that takes SAST to the next level. YAGAAN is a combination of static analysis and machine-learning. It offers customers more than a sourcecode scanner. It also offers a smart suite to support application security audits and security and privacy through DevSecOps design processes. The YAG-Suite supports developers in understanding the vulnerability causes and consequences. It goes beyond traditional vulnerability detection. Its contextual remediation helps them to quickly fix the problem and improve their secure coding skills. YAG-Suite's unique 'code mining' allows for security investigations of unknown applications. It maps all relevant security mechanisms and provides querying capabilities to search out 0-days and other non-automatically detectable risks. PHP, Java and Python are currently supported. Next languages in roadmap are JS, C and C++.
API Access
Has API
API Access
Has API
Integrations
.NET
Android
Ansible
Apple iOS
Eclipse IDE
Fujitsu Biometrics-as-a-Service
GitHub
GitLab
IBM Db2
Java
Integrations
.NET
Android
Ansible
Apple iOS
Eclipse IDE
Fujitsu Biometrics-as-a-Service
GitHub
GitLab
IBM Db2
Java
Pricing Details
No price information available.
Free Trial
Free Version
Pricing Details
From €500/token or €150/mo
Free Trial
Free Version
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Vendor Details
Company Name
Neperia
Country
Italy
Website
www.neperiagroup.com
Vendor Details
Company Name
YAGAAN
Founded
2017
Country
France
Website
yagaan.com
Product Features
Static Code Analysis
Analytics / Reporting
Code Standardization / Validation
Multiple Programming Language Support
Provides Recommendations
Standard Security/Industry Libraries
Vulnerability Management
Product Features
Static Application Security Testing (SAST)
Application Security
Dashboard
Debugging
Deployment Management
IDE
Multi-Language Scanning
Real-Time Analytics
Source Code Scanning
Vulnerability Scanning
Static Code Analysis
Analytics / Reporting
Code Standardization / Validation
Multiple Programming Language Support
Provides Recommendations
Standard Security/Industry Libraries
Vulnerability Management
Vulnerability Scanners
Asset Discovery
Black Box Scanning
Compliance Monitoring
Continuous Monitoring
Defect Tracking
Interactive Scanning
Logging and Reporting
Network Mapping
Perimeter Scanning
Risk Analysis
Threat Intelligence
Web Inspection