Best IT Security Software for Kotlin

Find and compare the best IT Security software for Kotlin in 2026

Use the comparison tool below to compare the top IT Security software for Kotlin on the market. You can filter results by user reviews, pricing, features, platform, region, support options, integrations, and more.

  • 1
    Aikido Security Reviews

    Aikido Security

    Aikido Security

    Free
    231 Ratings
    See Software
    Learn More
    Aikido is the all-in-one security platform for development teams to secure their complete stack, from code to cloud. Aikido centralizes all code and cloud security scanners in one place. Aikido offers a range of powerful scanners including static code analysis (SAST), dynamic application security testing (DAST), container image scanning, and infrastructure-as-code (IaC) scanning. Aikido integrates AI-powered auto-fixing features, reducing manual work by automatically generating pull requests to resolve vulnerabilities and security issues. It also provides customizable alerts, real-time vulnerability monitoring, and runtime protection, enabling teams to secure their applications and infrastructure seamlessly.
  • 2
    ZeroPath Reviews

    ZeroPath

    ZeroPath

    Free
    2 Ratings
    See Software
    Learn More
    ZeroPath (YC S24) is an AI-native application security platform that delivers comprehensive code protection beyond traditional SAST. Founded by security engineers from Tesla and Google, ZeroPath combines large language models with deep program analysis to deliver intelligent security testing that finds real vulnerabilities while dramatically reducing false positives. Unlike traditional SAST tools that rely on pattern matching, ZeroPath understands code context, business logic, and developer intent. This enables identification of sophisticated security issues including business logic flaws, broken authentication, authorization bypasses, and complex dependency vulnerabilities. Our comprehensive security suite covers the application security lifecycle: 1. AI-powered SAST 2. Software Composition Analysis with reachability analysis 3. Secrets detection and validation 4. Infrastructure as Code scanning 5. Automated PR reviews 6. Automated patch generation and more... ZeroPath integrates seamlessly with GitHub, GitLab, Bitbucket, Azure DevOps and many more. The platform handles codebases with millions of lines across Python, JavaScript, TypeScript, Java, Go, Ruby, Rust, PHP, Kotlin and more. Our research team has been successful in finding vulnerabilities like critical account takeover in better-auth (CVE-2025-61928, 300k+ weekly downloads), identifying 170+ verified bugs in curl, and discovering 0-days in production systems at Netflix, Hulu, and Salesforce. Trusted by 750+ companies and performing 200k+ code scans monthly.
  • 3
    Kiuwan Code Security Reviews
    Top Pick
    Security Solutions for Your DevOps Process Automate scanning your code to find and fix vulnerabilities. Kiuwan Code Security is compliant with the strictest security standards, such OWASP or CWE. It integrates with top DevOps tools and covers all important languages. Static application security testing and source analysis are both effective, and affordable solutions for all sizes of teams. Kiuwan provides a wide range of essential functionality that can be integrated into your internal development infrastructure. Quick vulnerability detection: Simple and quick setup. You can scan your area and receive results in minutes. DevOps Approach to Code Security: Integrate Kiuwan into your Ci/CD/DevOps Pipeline to automate your security process. Flexible Licensing Options. There are many options. One-time scans and continuous scanning. Kiuwan also offers On-Premise or Saas models.
  • 4
    DoveRunner Reviews

    DoveRunner

    DoveRunner

    $129/app/month
    1 Rating
    DoveRunner provides a unified security platform designed to safeguard mobile applications and digital content from emerging threats, fraud, and piracy. Its technology protects millions of daily user interactions by detecting attacks in real time, hardening app environments, and securing high-value content across OTT, streaming, fintech, gaming, and retail ecosystems. Organizations rely on DoveRunner to defend against malware, cloning, tampering, credential abuse, and unauthorized redistribution. The platform includes multi-DRM support, forensic watermarking, content packaging, SDK-based integrations, and on-premise deployment options for heightened compliance. For developers and product teams, DoveRunner’s APIs, dashboards, and analytics make integration simple and operational oversight effortless. Enterprise clients benefit from powerful anti-piracy tools that track illegal distribution, mitigate revenue loss, and protect intellectual property globally. With fast implementation, strong technical support, and proven performance under high traffic, DoveRunner brings predictability and calm to complex digital operations. By securing both the app layer and content pipeline, organizations gain the confidence to scale faster and deliver seamless experiences to their users.
  • 5
    LIAPP Reviews

    LIAPP

    Lockin

    $39.99 one-time payment
    Secure your application today with LIAPP, the most user-friendly and robust mobile app security solution available. With just one click, we handle all your security needs, allowing you to concentrate on other important aspects of your business. LIAPP simplifies the protection process, enabling you to thrive in the mobile service sector with its formidable defenses against hacking and user-friendly security reports. By eliminating the risk of wasting development resources, you can access comprehensive protective features simply by uploading a single app. Furthermore, it fosters the growth of your mobile service enterprise by offering source code safeguarding and advanced hacking protection. Additionally, it enhances operational efficiency by providing insights into user activity, including the total number of users, hacking incidents, and their types. The world places its trust in LIAPP, as our exceptional hacking defense has garnered recognition from numerous professional organizations globally. In fact, we have been highlighted as a leading Global Representative Vendor in a prominent industry report, underscoring our commitment to security excellence.
  • 6
    Descope Reviews

    Descope

    Descope

    $0.05 per user per month
    Descope is a CIAM platform meant for developers and IT teams. Customers can easily create frictionless and secure user journey flows for each user interaction using our no-code workflow builder and SDKs. Descope allows developers to spend more time working on core app projects by abstracting the details of authentication methods, session management, and risk management. Our platform makes it easy to manage users, tenants, RBAC, SCIM provisioning, and identity federation without any hassle. Customers use Descope to enhance user experience with passwordless authentication, improve security with risk-based MFA, and centralize user identities across all business-facing apps.
  • 7
    Betterscan.io Reviews

    Betterscan.io

    Betterscan.io

    €499 one-time payment
    Reduce Mean Time to Detection (MTTD) and Mean Time to Recovery (MTTR) with comprehensive coverage achievable within minutes of deployment. Employ a complete DevSecOps toolchain that spans all your environments, ensuring the implementation and gathering of evidence as part of an ongoing security strategy. This solution is unified and de-duplicated across all orchestrated layers, allowing you to add thousands of checks through a single line of code, enhanced by AI capabilities. Designed with a strong focus on security, it effectively sidesteps prevalent security errors and vulnerabilities, while being adept at understanding contemporary technologies. Every feature is accessible through a REST API, making it easily integrable with CI/CD systems, and it operates in a lightweight and rapid manner. You have the option to self-host for total code governance and transparency, or to utilize a source-available binary exclusively within your own CI/CD pipeline. Opting for a source-available solution grants you complete control and transparency over your security measures. The initial setup is straightforward, necessitating no software installation, and it supports a wide variety of programming languages. This tool is capable of detecting thousands of code and infrastructure-related issues, with the count continually rising. Users can review detected issues, categorize them as false positives, and collaborate effectively on resolutions, fostering a more secure development environment. Continuous updates ensure that the tool remains aligned with emerging security threats and technology advancements.
  • 8
    Kontra Reviews

    Kontra

    Security Compass

    $400 per year
    Kontra Hands-On Labs and e-Learning Courses provide a practical and scalable way to embed secure coding skills into development teams. The training combines 50+ short-form video lessons with over 300 interactive vulnerability labs that simulate real-world security failures. Developers don’t just hear about issues—they actively exploit vulnerabilities like Log4Shell and learn to fix them using code that matches their actual stacks. Covering 25+ technologies, each lab delivers a fast, focused experience with most exercises completed in under 10 minutes. This keeps developers engaged without disrupting their workflow. Completion rates are over 3x higher than traditional training models, helping AppSec leaders embed secure practices earlier in the SDLC. Training is role-based and aligned with major compliance frameworks including PCI-DSS, ISO 27001, and NIST. Optional ISC2 co-branded certifications are available, providing a path for developers to validate their secure coding competencies. Content is SCORM-compliant and can be delivered flexibly—either hosted or deployed directly into your own LMS. This ensures easy adoption whether you’re centralizing training or enabling business units to self-manage. L&D and AppSec leaders gain immediate visibility into training status with reporting on completions, coverage by framework, and readiness across teams. This supports both audit prep and internal program performance tracking. With developer-first content, flexible deployment, and measurable outcomes, Kontra + Courses helps security and engineering teams build software that’s secure by design—without slowing down delivery.
  • 9
    GitHub Advanced Security Reviews

    GitHub Advanced Security

    GitHub

    $49 per month per user
    GitHub Advanced Security empowers developers and security professionals to collaborate effectively in addressing security debt while preventing new vulnerabilities from entering code through features such as AI-driven remediation, static analysis, secret scanning, and software composition analysis. With Copilot Autofix, code scanning identifies vulnerabilities, offers contextual insights, and proposes solutions within pull requests as well as for past alerts, allowing teams to manage their application security debt more efficiently. Additionally, targeted security campaigns can produce autofixes for up to 1,000 alerts simultaneously, significantly lowering the susceptibility to application vulnerabilities and zero-day exploits. The secret scanning feature, equipped with push protection, safeguards over 200 types of tokens and patterns from a diverse array of more than 150 service providers, including hard-to-detect secrets like passwords and personally identifiable information. Backed by a community of over 100 million developers and security experts, GitHub Advanced Security delivers the necessary automation and insights to help teams release more secure software on time, ultimately fostering greater trust in the applications they build. This comprehensive approach not only enhances security but also streamlines workflows, making it easier for teams to prioritize and address potential threats.
  • 10
    TrustCaptcha Reviews

    TrustCaptcha

    TrustCaptcha

    €8/month
    TrustCaptcha offers a next-generation website protection service that prevents bots and spam without the friction of traditional CAPTCHA challenges. Operating invisibly in the background, TrustCaptcha activates as users type and completes verification before the form is submitted, reducing bounce rates and improving user engagement. The system relies on a sophisticated trust scoring algorithm paired with a lightweight proof-of-work protocol that increases the cost of spam attacks for bots while remaining imperceptible to genuine visitors. This innovative combination stops automated abuse effectively without disrupting the user journey. Fully customizable, TrustCaptcha lets you tailor language, design, and visibility settings and can even run completely hidden on your site. It complies fully with GDPR requirements, ensuring privacy and data protection. Integration is fast and straightforward, with support for major frameworks and clear documentation. Offering both fixed pricing and pay-per-use models, TrustCaptcha adapts to your needs, delivering reliable and seamless security.
  • 11
    Qwiet AI Reviews
    The Fastest Code Analysis. 40X faster scan speeds so developers don't have to wait long for results after submitting a pull request. The Most Accurate Result. Qwiet AI is the only AI with the highest OWASP benchmark score. This is more than triple the commercial average, and more than twice the second highest score. Developer-Centric Security Processes. 96% of developers say that disconnected security and developer workflows hinder their productivity. Implementing developer-centric AppSec workflows decreases mean-time-to-remediation (MTTR), typically by 5X - enhancing both security and developer productivity. Automated Business Logic Flaws in Dev. Identify vulnerabilities unique to your codebase before they reach production. Achieve compliance. Maintain and demonstrate compliance with privacy and security regulations such as SOC 2 PCI-DSS GDPR and CCPA.
  • 12
    DexProtector Reviews
    DexProtector offers immediate protection for applications on both iOS and Android platforms, safeguarding them from various static and dynamic threats. As a recognized leader in application and SDK security, it boasts over ten billion installations worldwide. The strategy employed by DexProtector for app defense is distinctive and effective. Its Runtime Application Self Protection (RASP) native engine operates at a deep system level within the application, allowing it to engage directly with operating system components. This integration enables it to manage crucial processes and protect the most sensitive elements of your applications and libraries. By layering multiple defenses, DexProtector constructs a robust barrier around your critical code and assets, significantly enhancing the resilience of your applications against real-time attacks. Integration into your CI/CD pipeline is instantaneous and requires no coding, making it incredibly user-friendly. In addition to securing your applications, it also protects the communication channels with servers, establishing a fortified layer between your application and the operating system. Ultimately, DexProtector effectively shields your applications from both static and dynamic threats, ensuring comprehensive security in an ever-evolving digital landscape.
  • 13
    bugScout Reviews
    bugScout is a platform designed to identify security weaknesses and assess the code quality of software applications. Established in 2010, its mission is to enhance global application security through thorough auditing and DevOps methodologies. The platform aims to foster a culture of secure development, thus safeguarding your organization’s data, resources, and reputation. Crafted by ethical hackers and distinguished security professionals, bugScout® adheres to international security protocols and stays ahead of emerging cyber threats to ensure the safety of clients’ applications. By merging security with quality, it boasts the lowest false positive rates available and delivers rapid analysis. As the lightest platform in its category, it offers seamless integration with SonarQube. Additionally, bugScout combines Static Application Security Testing (SAST) and Interactive Application Security Testing (IAST), enabling the most comprehensive and adaptable source code review for detecting application security vulnerabilities, ultimately ensuring a robust security posture for organizations. This innovative approach not only protects assets but also enhances overall development practices.
  • 14
    DashO Reviews
    Over 20 years of professional obfuscation. We invest in threat research and protection so that you don't have too. And we continually update our protection to stay ahead. You don't need an army of consultants to protect your app. Your first protected build for Android or Java can be made in a matter of minutes in any build environment. Our customers love our support and give it the highest rating. DashO can help you protect an app that is already in use and is facing new risks, or a brand new app that you are just starting to release. As apps become more important to businesses and hackers become more sophisticated, security threats for app developers are increasing. Intellectual property theft is only the beginning. Apps can also be used to steal trade secrets, user data, and identify other attack vectors.
  • 15
    Syhunt Hybrid Reviews
    Syhunt dynamically inputs data into web applications, examining the responses to assess potential vulnerabilities in the application code, thus automating web application security testing and helping to protect your organization's web infrastructure from various security threats. The Syhunt Hybrid interface adheres to straightforward GUI principles, emphasizing user-friendliness and automation, which allows for minimal to no user involvement before or during the scanning process, all while offering numerous customization options. Users can analyze past scanning sessions to identify newly discovered, unchanged, or eliminated vulnerabilities. Additionally, it creates a comprehensive comparison report that illustrates the progression of vulnerabilities over time by automatically juxtaposing data from previous scan sessions linked to a specific target, enabling organizations to better understand their security posture and make informed decisions regarding their web application defenses.
  • 16
    SecureFlag Reviews
    SecureFlag provides a practical training experience in authentic development settings, catering specifically to the unique training requirements of enterprises. Supporting over 45 technologies and addressing more than 150 types of vulnerabilities, each session takes place in a fully equipped development environment. Given that more than 70% of vulnerabilities emerge during the development phase, it is essential to prioritize the creation of secure software. SecureFlag has transformed the landscape of secure coding education significantly. With immersive hands-on labs, participants gain experience in virtual environments, utilizing familiar tools and platforms. This approach enables learners to actively identify and address common security challenges through practical engagement rather than passive observation. The labs operate in genuine, virtualized settings, ensuring that participants are accustomed to the tools they would typically employ in their professional roles. Additionally, fostering a spirit of friendly competition can enhance engagement within your organization’s developer community and encourage ongoing learning. Such interactive training not only builds skills but also strengthens team collaboration in tackling security issues.
  • 17
    Rainforest Reviews
    Enhance your cyber security measures with the Rainforest platform, which is designed to protect your innovations and instill confidence as you navigate the digital landscape securely. With rapid implementation and swift results, Rainforest offers a solution that is far less complex than traditional options, saving companies both time and resources. The platform allows for a seamless integration process, enabling your team to focus on resolving issues rather than getting bogged down in implementation. Utilizing advanced AI, our trained models provide insightful fix suggestions, making it easier for your team to tackle challenges effectively. With seven distinct application analyses that cover comprehensive application security, local code evaluations, and AI-driven recommendations, you can expect quick vulnerability detection and effective remediation for strong application defense. Furthermore, continuous cloud security posture management identifies misconfigurations and vulnerabilities in real-time, making it simple to enhance your cloud security effortlessly. Ultimately, Rainforest empowers organizations to operate securely and confidently in an increasingly complex digital environment.
  • 18
    Raven Reviews
    Raven is an innovative runtime application security platform that safeguards cloud-native applications by functioning internally during execution instead of depending on external security measures. By providing real-time insights into the actual operation of code, it can comprehend execution flows, libraries, and behaviors at the function level, which aids in identifying and averting malicious activities before they manifest. In contrast to conventional tools like WAF or EDR that observe from an external viewpoint, Raven integrates within the application itself, thus equipping it to thwart exploits, supply chain attacks, and zero-day vulnerabilities even in the absence of known threats or CVEs. It perpetually scrutinizes runtime activities, detects irregular patterns, or misuse of legitimate operations, and promptly intervenes to halt harmful executions. Furthermore, Raven aids security teams in prioritizing their efforts by sifting through countless irrelevant vulnerabilities, allowing them to concentrate solely on those that pose a genuine risk. This proactive approach not only enhances security but also streamlines the overall security management process, ensuring that resources are allocated effectively.
  • 19
    Checkmarx Reviews
    The Checkmarx Software Security Platform serves as a unified foundation for managing a comprehensive array of software security solutions, encompassing Static Application Security Testing (SAST), Interactive Application Security Testing (IAST), Software Composition Analysis (SCA), along with application security training and skill enhancement. Designed to meet the diverse requirements of organizations, this platform offers a wide range of deployment options, including private cloud and on-premises configurations. By providing multiple implementation methods, it allows clients to begin securing their code right away, eliminating the lengthy adjustments often needed for a singular approach. The Checkmarx Software Security Platform elevates the benchmark for secure application development, delivering a robust resource equipped with top-tier capabilities that set it apart in the industry. With its versatile features and user-friendly interface, the platform empowers organizations to enhance their security posture effectively and efficiently.
  • 20
    Codebashing Reviews
    Codebashing serves as Checkmarx’s innovative eLearning platform that enhances developers' abilities to address vulnerabilities and produce secure code. Building on the principle of experiential learning, Codebashing instructs developers on secure coding practices while honing their application security expertise in the most productive manner. Equip your developers with the essential skills needed to bolster security and mitigate risks from the outset. Transition developer security training into a continuous journey that seamlessly integrates into everyday tasks, ensuring that learning is ongoing, tailored, and directly meets the changing demands of developers. Custom-designed secure coding training pathways are meticulously created to provide developers with knowledge pertinent to their specific roles, ensuring that security instruction is both relevant and impactful. This tailored educational experience comprises 85 lessons that address every facet of the Software Development Life Cycle (SDLC), aiming to empower security-conscious developers to emerge as security advocates within your organization. Ultimately, Codebashing not only builds individual skills but also fosters a culture of security awareness throughout the development team.
  • Previous
  • You're on page 1
  • Next
MongoDB Logo MongoDB