Best IT Security Software for DefectDojo

Find and compare the best IT Security software for DefectDojo in 2025

Use the comparison tool below to compare the top IT Security software for DefectDojo on the market. You can filter results by user reviews, pricing, features, platform, region, support options, integrations, and more.

  • 1
    Probely Reviews

    Probely

    Probely

    $49.00/month
    1 Rating
    Probely is a web security scanner for agile teams. It allows continuous scanning of web applications. It also lets you manage the lifecycle of vulnerabilities found in a clean and intuitive web interface. It also contains simple instructions for fixing the vulnerabilities (including snippets code). Using its full-featured API it can be integrated into development pipelines (SDLC) or continuous integration pipelines, to automate security testing. Probely empowers developers to become more independent. This solves the security team's scaling problem that is often undersized compared to development teams. It provides developers with a tool to make security testing more efficient, which allows security teams to concentrate on more important activities. Probely covers OWASP TOP10, thousands more, and can be used for checking specific PCI-DSS and ISO27001 requirements.
  • 2
    Crashtest Security Reviews

    Crashtest Security

    Crashtest Security

    €35 per month
    5 Ratings
    Crashtest Security, a SaaS-based security vulnerability scanner, allows agile development teams to ensure continuous security even before reaching Production. Our state-of the-art dynamic application security test (DAST), integrates seamlessly into your development environment and protects multipage and JavaScript applications, as well microservices and APIs. Crashtest Security Suite can be set up in minutes. You will also have advanced crawling options and the ability to automate your security. Crashtest Security can help you keep your code and customers safe by allowing you to see vulnerabilities in the OWASP Top 10.
  • 3
    Deepinfo Reviews

    Deepinfo

    Deepinfo

    $20,000 per year
    Deepinfo has the most comprehensive Internet data. We are passionate about cybersecurity and proud to make the Internet safer. We provide relevant data and comprehensive threat intelligence solutions to empower cybersecurity professionals to build a more secure organization. Deepinfo Attack Surface Platform empowers organizations to identify, classify and monitor sensitive data across all digital assets in real-time.
  • 4
    Semgrep Reviews

    Semgrep

    r2c

    $40 per month
    Modern security teams "pave the way" for developers by enforcing code guardrails at every commit. Semgrep from r2c can eliminate vulnerabilities across an entire organization. Lightweight static analysis can scale your security team. Semgrep, an open-source static analysis tool, is fast and easy to use. It excels at expressing code standards without complex queries and surfacing bugs early in development. No need to navigate through abstract syntax trees or wrestle with regexes. Precise rules are as real as the code you're looking for. You can start immediately with over 900+ rules and SaaS Infrastructure to quickly get results in your editor, at commit time, or in CI. You can quickly and intuitively create custom rules to express your code standards when standard rules from the shelf are not enough. Rules look exactly like the code that you are searching. Rules for Go, for example, look like Go. You can find function calls, class and method definitions without having to learn abstract syntax trees or deal with regexes.
  • 5
    Trivy Reviews

    Trivy

    Aqua Security

    Free
    Trivy offers a comprehensive security scanner. Trivy uses scanners to look for security problems and pinpoints the areas where they can be found. Trivy supports all the popular programming languages, platforms, and operating systems. Trivy can be purchased through the most popular distribution channels. Trivy is compatible with many popular platforms. Trivy integrates with many popular tools and apps, so you can easily add safety to your workflow. Find vulnerabilities, misconfigurations and secrets in code repositories and clouds, as well as Kubernetes and containers.
  • Previous
  • You're on page 1
  • Next