Best IT Security Software for AWS CodeBuild

Find and compare the best IT Security software for AWS CodeBuild in 2025

Use the comparison tool below to compare the top IT Security software for AWS CodeBuild on the market. You can filter results by user reviews, pricing, features, platform, region, support options, integrations, and more.

  • 1
    NeoLoad Reviews
    See Software
    Learn More
    Software for continuous performance testing to automate API load and application testing. For complex applications, you can design code-free performance tests. Script performance tests in automated pipelines for API test. You can design, maintain, and run performance tests in code. Then analyze the results within continuous integration pipelines with pre-packaged plugins for CI/CD tools or the NeoLoad API. You can quickly create test scripts for large, complex applications with a graphical user interface. This allows you to skip the tedious task of manually coding new or updated tests. SLAs can be defined based on the built-in monitoring metrics. To determine the app's performance, put pressure on it and compare SLAs with server-level statistics. Automate pass/fail triggers using SLAs. Contributes to root cause analysis. Automatic test script updates make it easier to update test scripts. For easy maintenance, update only the affected part of the test and re-use any remaining.
  • 2
    SOOS Reviews

    SOOS

    SOOS

    $0 per month
    ​SOOS is the easy-to-setup software supply chain security solution. Maintain your SBOM and manage SBOMs from your vendors. Continuously monitor, find, and fix vulnerabilities and license issues. With the fastest time to implementation in the industry, you can empower your entire team with SCA and DAST–no scan limits.​
  • 3
    AWS Secrets Manager Reviews

    AWS Secrets Manager

    Amazon

    $0.40 per month
    AWS Secrets Manager protects secrets that allow you to access your services, applications, and IT resources. This service allows you to easily manage, retrieve, and rotate database credentials, API keys, as well as other secrets, throughout their lifecycle. Secrets Manager APIs can be called by users and applications to retrieve secrets. This eliminates the need to hardcode sensitive data in plain text. Secrets Manager provides secret rotation with integrated integration for Amazon RDS and Amazon Redshift. The service can also be extended to other types secrets, such as API keys and OAuth tokens. Secrets Manager allows you to manage access to secrets with fine-grained permissions. You can also audit secret rotation centrally for resources in AWS Cloud, third party services, and on-premises. AWS Secrets Manager allows you to safely rotate secrets without the need for code deployments.
  • 4
    RapidFort Reviews

    RapidFort

    RapidFort

    $5,000 per month
    Automated elimination of inactive software components. This allows you to deploy smaller, more secure, and faster workloads. RapidFort dramatically reduces vulnerability and patches management queues, so developers can concentrate on building. RapidFort eliminates unused container components. This improves production workload security. It also saves developers from having to patch and maintain unused code. RapidFort profiles containers in order to identify which components are required to run them. Your containers can be used in any environment, whether it is dev, test, prod, or production. You can use any container deployment, such as Kubernetes and Docker Compose or Amazon EKS. RapidFort will then identify which packages you need to keep and allow you to delete any unused packages. The majority of improvements are between 60% and 90%. RapidFort allows you to create and customize remediation profiles. This allows you to choose what to keep or remove.
  • 5
    Seeker Reviews
    Seeker® is an interactive application security testing (IAST) solution that delivers deep visibility into the security posture of web applications. It identifies and analyzes vulnerabilities against industry standards such as OWASP Top 10, PCI DSS, GDPR, CAPEC, and CWE/SANS Top 25, ensuring compliance and robust protection. Seeker tracks sensitive data usage, verifying it is handled securely and not stored improperly in logs or databases without encryption. Seamlessly integrating into DevOps CI/CD workflows, it enables continuous security testing without disrupting development processes. Unlike traditional IAST solutions, Seeker not only identifies vulnerabilities but also verifies their exploitability, providing developers with a prioritized list of actionable issues. By leveraging patented methods, it processes large volumes of HTTP(S) requests with precision, reducing false positives to near zero. Additionally, Seeker enhances team collaboration with detailed reporting and remediation guidance, ensuring security is addressed effectively across the software development lifecycle.
  • Previous
  • You're on page 1
  • Next