Best IT Security Software for Go

Find and compare the best IT Security software for Go in 2024

Use the comparison tool below to compare the top IT Security software for Go on the market. You can filter results by user reviews, pricing, features, platform, region, support options, integrations, and more.

  • 1
    New Relic Reviews
    Top Pick
    See Software
    Learn More
    Enhance IT Security with New Relic: Protect your enterprise with advanced threat detection and resilient defenses. Strengthen your security posture using New Relic’s powerful observability platform, crafted to give software engineers full visibility and control across the security landscape. Our solution provides real-time monitoring and sophisticated threat detection, allowing you to proactively detect and mitigate vulnerabilities before they affect your business. Integrate security insights seamlessly with your overall IT operations to ensure compliance, reduce risks, and safeguard vital assets. Boost your incident response, streamline security management, and align your security approach with organizational goals. With New Relic, reinforce your enterprise against emerging threats and foster a culture of proactive security and resilience.
  • 2
    IBM NS1 Connect Reviews
    See Software
    Learn More
    IBM NS1 Connect offers premium, authoritative DNS & advanced traffic steering to deliver the high-performance, reliable, secure network connectivity that businesses need to meet increasingly sophisticated customer expectations through our: Global anycast network: Providing massive capacity & scale needed to keep users reliably connected across the world. API-first Architecture: Easily integrate & automate all NS1 Connect function. HTTPS Redirects: Manage every element of your HTTPS redirects from one platform. GSLB and RUM-based traffic steering: Balance loads at a global scale & reduce latency with near-real-time device performance data DDoS Attack Protection: Ensuring sufficient capacity to absorb traffic spikes & controls in place to guard against automated “junk” queries. NS1 Connect offers add-on options to suite your business needs including: DNS Insights: Providing the data you need to quickly identify & deal with misconfigurations impacting application performance. Dedicated DNS: Stay up & running with a native secondary DNS resolution infrastructure for seamless continuity of operations. DNS Traffic Steering: Optimize connections to applications, services & content based on geography, RUM data, load and more.
  • 3
    Files.com Reviews
    Top Pick
    See Software
    Learn More
    6,000+ companies trust Files.com to automate and secure business critical transfers. We obsess about security, compliance, reliability, and performance so your critical business processes just work every time. Easily manage any transfer flow without writing scripts or code, and onboard workloads and partners effortlessly. We support standard file transfer protocols (FTP, SFTP, AS2) for working with external partners and also provide native apps for high performance internal transfers. As a fully Cloud-Native SaaS, there are no servers for you to buy or maintain, there is no installation required, and high availability and redundancy are built in and free. Our InfoSec Program is audited annually by Kirkpatrick Price, a leading information security CPA firm. Our audit covers the scope of the entire Files.com business (not just datacenter operations) and names Files.com specifically. Beware of smaller competitors who try to pass off someone else’s audit as their own. Technical capabilities include encryption at-rest and in-transit, four types of two-factor authentication, nine enterprise identity (SSO) integrations, configurable password and session policies, and a perfect “A+” score from Qualys SSL Labs.
  • 4
    Debricked Reviews
    Debricked's tool allows for greater use of Open Source while minimizing the risks. This makes it possible to maintain a high development pace while remaining secure. The service uses state-of-the-art machine learning to ensure that data quality is excellent and can be instantly updated. Debricked is a unique Open Source Management tool that combines high precision (over 90% in supported language) with flawless UX and scalable automation. Debricked has just released Open Source Select, a brand new feature that allows open source projects to be compared, evaluated, and monitored to ensure quality and community health.
  • 5
    SonarQube Reviews
    SonarSource creates world-class products to ensure Code Quality and Security. SonarQube, our open-source and commercial code analysis tool - SonarQube -- supports 27 programming languages. This allows dev teams of all sizes to resolve coding issues in their existing workflows.
  • 6
    Mend.io Reviews

    Mend.io

    Mend.io

    $12,000 per year
    1 Rating
    Mend.io’s enterprise suite of app security tools, trusted by leading companies such as IBM, Google and Capital One, is designed to help build and manage an mature, proactive AppSec programme. Mend.io is aware of the AppSec needs of both developers and security teams. Mend.io, unlike other AppSec tools that force everyone to use a unified tool, helps them work together by giving them different, but complementary tools - enabling each team to stop chasing vulnerability and start proactively management application risk.
  • 7
    Backslash Security Reviews
    Ensure the security and integrity of your code. Identify externally accessible data flows and vulnerabilities to effectively mitigate risk. By identifying the real attack paths that lead to reachable code we allow you to fix only code and open source software that are in use and reachable. Avoid overloading development teams with irrelevant vulnerability. Prioritize risk-mitigation efforts more effectively to ensure a focused and efficient approach to security. Reduce the noise CSPM and CNAPP create by removing non-reachable packages. Analyze your software components and dependencies to identify any known vulnerabilities or outdated library that could pose a risk. Backslash analyses both direct and transitive package, ensuring coverage of 100%. It is more effective than existing tools that only focus on direct packages.
  • 8
    Sematext Cloud Reviews
    Top Pick
    Sematext Cloud provides all-in-one observability solutions for modern software-based businesses. It provides key insights into both front-end and back-end performance. Sematext includes infrastructure, synthetic monitoring, transaction tracking, log management, and real user & synthetic monitoring. Sematext provides full-stack visibility for businesses by quickly and easily exposing key performance issues through a single Cloud solution or On-Premise.
  • 9
    Kiuwan Code Security Reviews
    Top Pick
    Security Solutions for Your DevOps Process Automate scanning your code to find and fix vulnerabilities. Kiuwan Code Security is compliant with the strictest security standards, such OWASP or CWE. It integrates with top DevOps tools and covers all important languages. Static application security testing and source analysis are both effective, and affordable solutions for all sizes of teams. Kiuwan provides a wide range of essential functionality that can be integrated into your internal development infrastructure. Quick vulnerability detection: Simple and quick setup. You can scan your area and receive results in minutes. DevOps Approach to Code Security: Integrate Kiuwan into your Ci/CD/DevOps Pipeline to automate your security process. Flexible Licensing Options. There are many options. One-time scans and continuous scanning. Kiuwan also offers On-Premise or Saas models.
  • 10
    Snyk Reviews
    Snyk is the leader in developer security. We empower the world’s developers to build secure applications and equip security teams to meet the demands of the digital world. Our developer-first approach ensures organizations can secure all of the critical components of their applications from code to cloud, leading to increased developer productivity, revenue growth, customer satisfaction, cost savings and an overall improved security posture. Snyk is a developer security platform that automatically integrates with a developer’s workflow and is purpose-built for security teams to collaborate with their development teams.
  • 11
    Contrast Security Reviews
    Modern software development must be as fast as the business. The modern AppSec toolbox lacks integration, which creates complexity that slows down software development life cycles. Contrast reduces the complexity that hinders today's development teams. Legacy AppSec uses a single-size-fits all approach to vulnerability detection and remediation that is inefficient, costly, and expensive. Contrast automatically applies the most efficient analysis and remediation technique, greatly improving efficiency and effectiveness. Separate AppSec tools can create silos that hinder the collection of actionable intelligence across an application attack surface. Contrast provides centralized observability, which is crucial for managing risks and capitalizing upon operational efficiencies. This is both for security and development teams. Contrast Scan is a pipeline native product that delivers the speed, accuracy and integration required for modern software development.
  • 12
    SOOS Reviews

    SOOS

    SOOS

    $0 per month
    ​SOOS is the easy-to-setup software supply chain security solution. Maintain your SBOM and manage SBOMs from your vendors. Continuously monitor, find, and fix vulnerabilities and license issues. With the fastest time to implementation in the industry, you can empower your entire team with SCA and DAST–no scan limits.​
  • 13
    Treblle Reviews

    Treblle

    Treblle

    $99 per month
    Introducing Treblle: An agile Software Development Kit (SDK) crafted explicitly for expediting REST-based API development. This cutting-edge toolkit offers unparalleled insights into the intricate metadata of every API request, complemented by real-time monitoring of API traffic. Harness the potency of robust analytics and embrace comprehensive API governance functionalities. Unveil the realm of automated API documentation, empowering your venture with unparalleled efficiency. Treblle transcends the ordinary, introducing automated API security audits for every individual request. The art of streamlining workflows is now within your grasp, while bolstering your defenses through 18+ languages and frameworks, ensuring seamless integration for your enterprise. Elevate your teams' prowess in constructing, shipping, and upholding APIs, all accomplished with unprecedented swiftness.
  • 14
    Vault Vision Reviews

    Vault Vision

    Vault Vision

    $25/month for 10k users
    User auth for web and mobile apps with industry-leading security and passwordless login convenience for end users. Vault Vision's low-code user authentication platform allows applications to securely manage user auth and login management. Our platform helps application owners increase user login engagement with passwordless application logins powered by mobile passkeys, two factor auth (2FA), multi-factor auth (MFA), face id auth, fingerprint auth, USB key auth, pin based auth, SSO with email, OIDC logins for Apple, Google and Microsoft, and more.
  • 15
    Descope Reviews

    Descope

    Descope

    $0.05 per user per month
    Descope is a CIAM platform meant for developers and IT teams. Customers can easily create frictionless and secure user journey flows for each user interaction using our no-code workflow builder and SDKs. Descope allows developers to spend more time working on core app projects by abstracting the details of authentication methods, session management, and risk management. Our platform makes it easy to manage users, tenants, RBAC, SCIM provisioning, and identity federation without any hassle. Customers use Descope to enhance user experience with passwordless authentication, improve security with risk-based MFA, and centralize user identities across all business-facing apps.
  • 16
    CodeSandbox Reviews

    CodeSandbox

    CodeSandbox

    $12 per month
    CodeSandbox aims to make it easier for you to express your ideas with code, and to validate them. It also removes the hassles of setting up development tooling and sharing your project. Join us to help build the future of web coding. Over 4M developers use the platform each month. This includes organizations like Shopify and Atlassian. Since its launch, creators have created over 35M apps. It's used in thousands of open-source projects like React, Vue and Babel. You can invite your friends, colleagues, or team to join you or simply view your creation by using a URL. Use any of 1M+ packages for building real, powerful applications quickly and efficiently. Import and run repos directly from GitHub or choose from hundreds of templates to start in seconds. Boxy, CodeSandbox's AI-powered coding assistant, is now available to all Pro subscriptions.
  • 17
    Akto Reviews
    Akto is an open source, instant API security platform that takes only 60 secs to get started. Akto is used by security teams to maintain a continuous inventory of APIs, test APIs for vulnerabilities and find runtime issues. Akto offers tests for all OWASP top 10 and HackerOne Top 10 categories including BOLA, authentication, SSRF, XSS, security configurations, etc. Akto's powerful testing engine runs variety of business logic tests by reading traffic data to understand API traffic pattern leading to reduced false positives. Akto can integrate with multiple traffic sources - Burpsuite, AWS, postman, GCP, gateways, etc.
  • 18
    Hacker AI Reviews
    Hacker AI is an artificial Intelligence system that scans source code for security vulnerabilities that could be exploited or hacked by hackers. Organizations can identify these vulnerabilities and take steps to fix them or prevent security breaches. Hacker AI was created by a French company located in Toulouse, which uses a GPT-3 method. Please zip your project source code and upload it. You will receive the vulnerability report via email within 10 minutes. Hacker AI is still in beta and the results it produces are not useful without guidance from a cybersecurity expert with code analysis background. We don't sell or use your source code for malicious purposes. It is strictly used to detect vulnerabilities. You can request a non-disclosure agreement from us if necessary. A private instance can also be requested.
  • 19
    Aserto Reviews
    We make it simple for developers to secure their cloud apps. Adapt your authorization model so that it supports the principle of least privilige with fine-grained accessibility. Authorization decisions are based on the users, groups, domain models, resource hierarchy and relationships between them. Locally make authorization decisions using real-time information in milliseconds with 100% availability. Locally enforce using real-time information. Manage policies from one location. Define and manage all policies for your applications from a central location. Spend less time on access control and more time delivering core features. Allowing policy and code to develop independently will streamline the interaction between engineering and security. Create a secure supply chain for software that supports your policies. Store and version code for your policies in a git repository, just like you would any other code. Just like any other application artifact, you can build, tag, sign and immutable images of your policies.
  • 20
    Logto Reviews

    Logto

    Silverhand

    $0
    Logto is a modern Auth0 replacement designed for SaaS and apps. It is a great choice for growing companies and individuals. Comprehensive Identity Solution Logto SDKs enable easy authentication. Supports multiple sign-in methods, including social and passwordless. Customize UI components to match brand. The infrastructure is ready-to-use, so there's no need to do any extra setup. Provides a ready-to-use management API It offers flexible connectors to customize and scale, and is customized for SAML, OAuth and OIDC protocols. Enterprise-ready, with role-based Access Control (RBAC), Organizations (multi-tenant applications), User Management, Audit Logs, Single Sign-On (SSO), Multi-factor Authentication (MFA), and Single Sign-On (SSO).
  • 21
    Qwiet AI Reviews
    The Fastest Code Analysis. 40X faster scan speeds so developers don't have to wait long for results after submitting a pull request. The Most Accurate Result. Qwiet AI is the only AI with the highest OWASP benchmark score. This is more than triple the commercial average, and more than twice the second highest score. Developer-Centric Security Processes. 96% of developers say that disconnected security and developer workflows hinder their productivity. Implementing developer-centric AppSec workflows decreases mean-time-to-remediation (MTTR), typically by 5X - enhancing both security and developer productivity. Automated Business Logic Flaws in Dev. Identify vulnerabilities unique to your codebase before they reach production. Achieve compliance. Maintain and demonstrate compliance with privacy and security regulations such as SOC 2 PCI-DSS GDPR and CCPA.
  • 22
    GuardRails Reviews

    GuardRails

    GuardRails

    $35 per user per month
    Modern development teams are empowered to identify, fix, and prevent vulnerabilities in source code, open-source libraries, secret management, cloud configuration, and other areas. Modern development teams are empowered to identify, fix, and prevent security flaws in their applications. Continuous security scanning speeds up feature shipping and reduces cycle time. Our expert system reduces false alarms and only informs you about security issues that are relevant. Software that is consistently scanned across all product lines will be more secure. GuardRails integrates seamlessly with modern Version Control Systems such as GitLab and Github. GuardRails automatically selects the appropriate security engines to run based upon the languages found in a repository. Each rule is carefully curated to determine whether it has a high level security impact issue. This results in less noise. A system has been developed that detects false positives and is constantly improved to make it more accurate.
  • 23
    ActiveState Reviews

    ActiveState

    ActiveState

    $167 per month
    The ActiveState Platform protects your software supply chain. The only software supply chain that automates, secures, and automates the importing, building, and consuming of open source. Available now for Python, Perl and Tcl. Our secure supply chain includes modern package management that is 100% compatible with the packages that you use, highly-automated and includes key enterprise features. Automated builds using source code, including linked C library libraries. You can automatically build/rebuild secure environments by flagging vulnerabilities per-package and per version. A complete Bill of Materials (BOM), including provenance, licensing and all dependencies, transient OS & shared dependencies. Virtual environments are built-in to simplify multi-project development, testing, and debugging. Web UI, API, & CLI for Windows/Linux. Soon, macOS support will be available. You will spend less time worrying about packages, dependencies and vulnerabilities and more time coding.
  • 24
    Phylum Reviews
    Phylum defends applications at the perimeter of the open-source ecosystem and the tools used to build software. Its automated analysis engine scans third-party code as soon as it’s published into the open-source ecosystem to vet software packages, identify risks, inform users and block attacks. Think of Phylum like a firewall for open-source code. Phylum can be deployed in front of artifact repository managers, integrate directly with package managers or be deployed in CI/CD pipelines. Phylum users benefit from its powerful, automated analysis engine that reports proprietary findings instead of relying on manually curated lists. Phylum uses SAST, heuristics, machine learning and artificial intelligence to detect and report zero-day findings. Users know more risks, sooner and earlier in the development lifecycle for the strongest software supply chain defense. The Phylum policy library allows users to toggle on the blocking of critical vulnerabilities, attacks like typosquats, obfuscated code and dependency confusion, copyleft licenses, and more. Additionally, the flexibility of OPA enables customers to develop incredibly flexible and granular policies that fit their unique needs.
  • 25
    RapidFort Reviews

    RapidFort

    RapidFort

    $5,000 per month
    Automated elimination of inactive software components. This allows you to deploy smaller, more secure, and faster workloads. RapidFort dramatically reduces vulnerability and patches management queues, so developers can concentrate on building. RapidFort eliminates unused container components. This improves production workload security. It also saves developers from having to patch and maintain unused code. RapidFort profiles containers in order to identify which components are required to run them. Your containers can be used in any environment, whether it is dev, test, prod, or production. You can use any container deployment, such as Kubernetes and Docker Compose or Amazon EKS. RapidFort will then identify which packages you need to keep and allow you to delete any unused packages. The majority of improvements are between 60% and 90%. RapidFort allows you to create and customize remediation profiles. This allows you to choose what to keep or remove.
  • Previous
  • You're on page 1
  • 2
  • Next