Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Description

Sonatype Repository Firewall is designed to safeguard your software development pipeline from malicious open-source packages by utilizing AI-driven detection to intercept potential threats. By monitoring and analyzing over 60 signals from public repositories, the platform ensures that only secure components enter your SDLC. It provides customizable risk profiles and policies that allow automatic blocking of risky packages before they are integrated. With Sonatype Repository Firewall, organizations can maintain high standards of security and compliance, while enhancing DevSecOps collaboration and preventing supply chain attacks.

Description

The Code Registry is an innovative platform that harnesses AI for code intelligence and analysis, providing companies and non-technical users with complete insight into their software codebase, regardless of their coding experience. By linking your code repository—such as GitHub, GitLab, Bitbucket, or Azure DevOps—or by uploading a compressed archive, the platform establishes a secure "IP Vault" and conducts an extensive automated evaluation of the entire codebase. This analysis generates various reports and dashboards that include a code-complexity score to assess the intricacy and maintainability of the code, an open-source component evaluation that identifies dependencies, licensing issues, and outdated or vulnerable libraries, as well as a security assessment that pinpoints potential vulnerabilities, insecure configurations, or risky dependencies. Additionally, it provides a “cost-to-replicate” valuation, which estimates the resources and effort required to recreate or substitute the software entirely. Ultimately, the platform equips users with the necessary tools to enhance their understanding of code quality and security, thereby fostering more informed decision-making in software development.

API Access

Has API

API Access

Has API

Screenshots View All

Screenshots View All

Integrations

Azure DevOps
Bitbucket
Dropbox
Git
GitHub
GitLab
Google Drive
Maverix
Microsoft OneDrive

Integrations

Azure DevOps
Bitbucket
Dropbox
Git
GitHub
GitLab
Google Drive
Maverix
Microsoft OneDrive

Pricing Details

No price information available.
Free Trial
Free Version

Pricing Details

$2 per month
Free Trial
Free Version

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Vendor Details

Company Name

Sonatype

Founded

2008

Country

United States

Website

www.sonatype.com/products/sonatype-repository-firewall

Vendor Details

Company Name

The Code Registry

Founded

2023

Country

United States

Website

thecoderegistry.com

Product Features

Application Security

Analytics / Reporting
Open Source Component Monitoring
Source Code Analysis
Third-Party Tools Integration
Training Resources
Vulnerability Detection
Vulnerability Remediation

Product Features

Static Application Security Testing (SAST)

Application Security
Dashboard
Debugging
Deployment Management
IDE
Multi-Language Scanning
Real-Time Analytics
Source Code Scanning
Vulnerability Scanning

Static Code Analysis

Analytics / Reporting
Code Standardization / Validation
Multiple Programming Language Support
Provides Recommendations
Standard Security/Industry Libraries
Vulnerability Management

Vulnerability Scanners

Asset Discovery
Black Box Scanning
Compliance Monitoring
Continuous Monitoring
Defect Tracking
Interactive Scanning
Logging and Reporting
Network Mapping
Perimeter Scanning
Risk Analysis
Threat Intelligence
Web Inspection

Alternatives

Alternatives