What Integrates with Black Duck?

Find out what Black Duck integrations exist in 2025. Learn what software and services currently integrate with Black Duck, and sort them by reviews, cost, features, and more. Below is a list of products that Black Duck currently integrates with:

  • 1
    Jira Service Management Reviews

    Jira Service Management

    Atlassian

    $20 per user per month
    6 Ratings
    Jira Service Management (formerly Jira Service Desk), empowers Dev/Ops teams to work at high-velocity to respond to business changes quickly and provide great customer and employee service experiences. Tune Jira Service Management for your specific needs. Every team member, from IT to legal to HR, can set up a service desk quickly, and then adapt to scale. Provide great service experiences quickly - without the complexity and cost of traditional ITSM solutions. An open, collaborative platform allows you to track work across your enterprise. You can link issues across Jira, as well as ingest data from other software-development tools, to give your IT support and operations teams richer contextual information that allows them to quickly respond to incidents, requests, and changes. Manage risk and deliver more customer impact. You can accelerate critical development work, eliminate the need for manual labor, and deploy changes quickly with an audit trail for each change.
  • 2
    Java Reviews
    The Java™ Programming Language is designed as a versatile, concurrent, and strongly typed object-oriented language that utilizes a class-based structure. Typically, it is translated into bytecode that adheres to the specifications laid out in the Java Virtual Machine Specification. In this language, developers write source code in standard text files that conclude with the .java suffix. These source files are subsequently transformed into .class files through the use of the javac compiler. Unlike native processor code, a .class file comprises bytecodes, which serve as the machine language understood by the Java Virtual Machine (Java VM). To execute an application, the java launcher tool creates an instance of the Java Virtual Machine, allowing the compiled bytecode to run seamlessly. This process exemplifies the efficiency and portability that Java offers across various computing environments.
  • 3
    NorthStar Navigator Reviews

    NorthStar Navigator

    NorthStar.io, Inc.

    $8 per device
    NorthStar allows organizations to easily incorporate threat intelligence and business context to enable a risk-based approach to their vulnerability management program. The Platform automates the collection, normalization, consolidation and correlation of threat intelligence, asset, software, and vulnerability data. Combined with a transparent scoring model, NorthStar automates the tedious and manual process of prioritizing vulnerability remediation.
  • 4
    Vulcan Cyber Reviews

    Vulcan Cyber

    Vulcan Cyber

    $999 / month
    Vulcan Cyber is changing the way businesses reduce cyber risks through vulnerability remediation orchestration. We help IT security teams to go beyond remedial vulnerability management and help them drive vulnerability mitigation outcomes. Vulcan combines vulnerability and asset data with threat intelligence and customizable risk parameters, to provide risk-based vulnerability prioritization insight. We don't stop there. Vulcan remediation intelligence identifies the vulnerabilities that are important to your business and attaches the necessary fixes and remedies to mitigate them. Vulcan then orchestrates and measures the rest. This includes inputs into DevSecOps and patch management, configuration management and cloud security tools, teams, and functions. Vulcan Cyber has the unique ability to manage the entire vulnerability remediation process, from scan to fix.
  • 5
    ThreadFix Reviews

    ThreadFix

    Denim Group

    $2000 per month
    ThreadFix 3.0 offers an all-encompassing perspective on the risks associated with applications and their underlying infrastructure. Say goodbye to traditional spreadsheets and PDFs for good. Designed for everyone from Application Security Managers to CISOs, ThreadFix enhances team efficiency and delivers robust reporting capabilities for senior management. Discover the significant advantages of ThreadFix, recognized as the leading platform for managing application vulnerabilities. It enables the automatic consolidation, de-duplication, and correlation of vulnerabilities found in applications with the infrastructure assets that support them, utilizing data from both commercial and open-source scanning tools. Understanding the existing vulnerabilities is just the beginning; ThreadFix allows you to swiftly identify trends in vulnerabilities and make informed remediation choices based on a centralized data view. Once vulnerabilities are identified, addressing them promptly can be challenging, but with ThreadFix, you gain the tools necessary to streamline this critical process effectively. By leveraging its comprehensive features, organizations can enhance their overall security posture and respond proactively to emerging threats.
  • 6
    Logilica Reviews

    Logilica

    Logilica

    $33/user/month
    Logilica provides software engineering intelligence platform for modern development teams that need to move fast. Logilica provides end-to-end visibility across the software lifecycle to improve engineering effectiveness and deliver predictably. Engineering leaders love Logilica's out-of-the box insights coupled with their embedded analytics for custom metrics and reporting.
  • 7
    Phoenix Security Reviews

    Phoenix Security

    Phoenix Security

    $3,782.98 per month
    Phoenix Security bridges the communication gap between security teams, developers, and businesses, ensuring they all share a common understanding. We assist security experts in concentrating on the most critical vulnerabilities that impact cloud, infrastructure, and application security. By honing in on the top 10% of vulnerabilities that require immediate attention, we expedite risk reduction through prioritized and contextualized insights. Our automated threat intelligence enhances efficiency, facilitating quicker responses to potential threats. Furthermore, we aggregate, correlate, and contextualize data from various security tools, granting organizations unparalleled visibility into their security landscape. This approach dismantles the barriers that typically exist between application security, operational security, and business operations, fostering a more cohesive security strategy. Ultimately, our goal is to empower organizations to respond to risks more effectively and collaboratively.
  • 8
    Gradle Reviews
    Gradle, Inc. includes the Gradle Build Tool and Develocity (formerly Gradle Enterprise). These tools are used to speed up and debug builds, tests, and other tasks for Maven, Gradle, Bazel, and sbt. Gradle Build Tool is the most used tool to build open-source JVM projects on GitHub. It is downloaded on average more than 30 million times per month, and was included in TechCrunch's Top 20 Most Popular Open Source Projects. Many popular projects have moved from Maven to Gradle. Spring Boot is one of them. Develocity is the only platform that combines software build performance acceleration with analytics. It is used by the most prestigious software development companies around the world to reduce build times by half and give developers back one week of lost productivity time. Acceleration technologies speed up the software development and testing process. Data analytics (Failure Analytics Trends & Insights), make troubleshooting easier.
  • 9
    OpenText Static Application Security Testing Reviews
    OpenText Static Application Security Testing (SAST) provides precise identification and remediation of application security flaws directly within source code, helping organizations reduce risks early in development. The platform supports over 33 major programming languages and frameworks, enabling broad language coverage for diverse development environments. It integrates smoothly with widely used CI/CD pipelines and developer tools such as Jenkins, Atlassian Bamboo, Azure DevOps, and Microsoft Visual Studio, ensuring security fits naturally into existing workflows. AI-driven analysis prioritizes vulnerabilities and dramatically reduces false positives by customizing rules and scan depths, speeding up development cycles by up to 25%. OpenText SAST meets compliance benchmarks like OWASP 1.2b, offering developers detailed guidance to efficiently fix issues and improve code quality. Its flexible deployment options include multi-tenant SaaS, private cloud, and on-premises installations, allowing organizations to scale securely and according to their infrastructure needs. Backed by a dedicated Software Security Research team, the solution receives agile updates to stay current with emerging threats. Customers praise the tool for reducing manual code review efforts while increasing vulnerability detection accuracy.
  • 10
    C# Reviews

    C#

    Microsoft

    Free
    C#, often referred to as "C Sharp," is a contemporary programming language characterized by its object-oriented and type-safe nature. This language allows developers to create a wide array of secure and efficient applications that operate within the .NET framework. With foundations in the C language family, programmers familiar with C, C++, Java, and JavaScript will find C# to be quite accessible. This guide offers a comprehensive overview of the essential elements of C# up to version 8. As an object-oriented and component-oriented language, C# includes specific constructs that facilitate the development and utilization of software components. Over time, C# has evolved by incorporating features that cater to new workloads and progressive software design methodologies. At its essence, C# embodies object-oriented principles, enabling developers to define types along with their associated behaviors while fostering a rich ecosystem for application development. The language continues to adapt and grow, ensuring its relevance in the ever-changing landscape of technology.
  • 11
    Kondukto Reviews

    Kondukto

    Kondukto

    $12,000 per annually
    The versatile design of the Kondukto platform enables you to swiftly and effectively establish customized workflows for managing risks. You can leverage over 25 integrated open-source tools that are prepared to execute SAST, DAST, SCA, and Container Image scans in just minutes, all without requiring installation, upkeep, or updates. Safeguard your organizational knowledge against shifts in personnel, scanners, or DevOps tools. Centralize all security data, metrics, and activities in one location for your control. Prevent vendor lock-in and protect your historical data when transitioning to a different AppSec tool. Automatically validate fixes to foster better cooperation and minimize distractions. Enhance productivity by streamlining communications between AppSec and development teams, thus allowing them to focus on their core tasks. This holistic approach promotes a more agile response to evolving security challenges.
  • 12
    Coverity Static Analysis Reviews
    Coverity Static Analysis serves as an all-encompassing solution for code scanning, assisting both developers and security teams in producing superior software that meets security, functional safety, and various industry standards. It efficiently detects intricate defects within large codebases, pinpointing and addressing quality and security concerns that may arise across multiple files and libraries. Coverity ensures adherence to numerous standards such as OWASP Top 10, CWE Top 25, MISRA, and CERT C/C++/Java, and offers comprehensive reports that help in monitoring and prioritizing issues. By utilizing the Code Sight™ IDE plugin, developers benefit from immediate feedback, including insights on CWE and instructions for remediation, directly integrated into their development settings, which helps to weave security practices seamlessly into the software development lifecycle while maintaining developer productivity. This tool not only contributes to enhanced code integrity but also fosters a culture of continuous improvement in software security practices.
  • 13
    Digital.ai Release Reviews
    Digital.ai Release, previously known as XebiaLabs XL Release, serves as a specialized tool for release management within Continuous Delivery (CD) workflows. This platform empowers teams throughout an organization to design and oversee releases, streamline IT tasks through automation, and enhance release durations by scrutinizing and refining their processes. By facilitating automation and orchestration, it provides comprehensive visibility into release pipelines, even on an enterprise scale. Users can efficiently manage complex release pipelines while planning, automating, and analyzing every aspect of the software delivery process. It allows for the control and enhancement of software delivery efforts, ensuring that users are always informed about the status of both automated and manual tasks within the release pipeline. The tool helps identify potential bottlenecks, minimize errors, and mitigate the risks associated with release failures. Additionally, it offers the capability to monitor the entire release process, providing up-to-date status information across various tools and systems, from code development to production deployment. Users can also personalize dashboards to emphasize the most crucial data for each specific release, enhancing the overall management experience. This level of customization ensures that teams can focus on what matters most, leading to more efficient and successful releases.
  • 14
    Apache Maven Reviews

    Apache Maven

    The Apache Software Foundation

    Apache Maven serves as a comprehensive tool for managing and understanding software projects. It operates on the principle of a project object model (POM), which allows it to oversee various aspects of a project, including building, reporting, and documentation, all from a single source of truth. If you believe that Maven might be beneficial for your project, additional details can be found in the "About Maven" section located in the navigation menu. This section provides an extensive overview of Maven's functionality along with a summary of its key features. Should you encounter an issue that hasn't previously been addressed, the best approach for seeking assistance is to join the Maven Users Mailing list. Here, you will find a community of fellow users and Maven developers ready to respond to your queries, ensuring that the solutions are preserved for future reference. Engaging with this community not only helps you solve your immediate problems but also contributes to a collective knowledge base that benefits everyone involved.
  • 15
    Rezilion Reviews
    Rezilion’s Dynamic SBOM enables the automatic detection, prioritization, and remediation of software vulnerabilities, allowing teams to concentrate on what truly matters while swiftly eliminating risks. In a fast-paced environment, why compromise on security for the sake of speed when you can effectively achieve both? As a software attack surface management platform, Rezilion ensures that the software delivered to customers is automatically secured, ultimately providing teams with the time needed to innovate. Unlike other security solutions that often add to your remediation workload, Rezilion actively decreases your vulnerability backlogs. It operates across your entire stack, giving you insight into which software components are present in your environment, identifying those that are vulnerable, and pinpointing which ones are truly exploitable, enabling you to prioritize effectively and automate remediation processes. You can quickly compile an accurate inventory of all software components in your environment, and through runtime analysis, discern which vulnerabilities pose real threats and which do not, enhancing your overall security posture. With Rezilion, you can confidently focus on development while maintaining robust security measures.
  • 16
    Enso Reviews

    Enso

    Enso Security

    Through Application Security Posture Management (ASPM), Enso's platform easily deploys into an organization’s environment to create an actionable, unified inventory of all application assets, their owners, security posture and associated risk. With Enso Security, AppSec teams gain the capacity to manage the tools, people and processes involved in application security, enabling them to build an agile AppSec without interfering with development. Enso is used daily AppSec teams small and large across the globe. Get in touch for more information!
  • 17
    C++ Reviews
    C++ is known for its straightforward and lucid syntax. While a novice programmer might find C++ somewhat more obscure than other languages due to its frequent use of special symbols (like {}[]*&!|...), understanding these symbols can actually enhance clarity and structure, making it more organized than languages that depend heavily on verbose English syntax. Additionally, the input/output system of C++ has been streamlined compared to C, and the inclusion of the standard template library facilitates data handling and communication, making it as user-friendly as other programming languages without sacrificing functionality. This language embraces an object-oriented programming paradigm, viewing software components as individual objects with distinct properties and behaviors, which serves to enhance or even replace the traditional structured programming approach that primarily centered around procedures and parameters. Ultimately, this focus on objects allows for greater flexibility and scalability in software development.
  • 18
    Tromzo Reviews
    Tromzo creates a comprehensive understanding of environmental and organizational factors spanning from code to cloud, enabling you to swiftly address significant risks within the software supply chain. By focusing on the remediation of risks at each layer, from code to cloud, Tromzo constructs a prioritized risk assessment that encompasses the entire supply chain, providing essential context. This contextual information aids users in identifying which specific assets are vital for the business, safeguarding those critical components from potential risks, and streamlining the remediation process for the most pressing issues. With a detailed inventory of software assets, including code repositories, software dependencies, SBOMs, containers, and microservices, you gain insight into what you possess, who manages it, and which elements are crucial for your business's success. Additionally, by assessing the security posture of each team through metrics such as SLA compliance and MTTR, you can effectively promote risk remediation efforts and establish accountability throughout the organization. Ultimately, Tromzo empowers teams to prioritize their security measures, ensuring that the most important risks are addressed promptly and effectively.
  • 19
    Maverix Reviews
    Maverix seamlessly integrates into the current DevOps workflow, providing all necessary connections with software engineering and application security tools while overseeing the application security testing process from start to finish. It utilizes AI-driven automation to manage security issues, covering aspects such as detection, categorization, prioritization, filtering, synchronization, fix management, and support for mitigation strategies. The platform features a premier DevSecOps data repository that ensures comprehensive visibility into advancements in application security and team performance over time. Security challenges can be efficiently monitored, assessed, and prioritized through a unified interface designed for the security team, which also connects with third-party tools. Users can achieve complete transparency regarding application readiness for production and track improvements in application security over the long term, fostering a proactive security culture within the organization. This allows teams to address vulnerabilities promptly, ensuring a more resilient and secure application lifecycle.
  • 20
    Longbow Reviews
    Longbow streamlines the evaluation and correlation of challenges identified by Application Security Testing (AST) tools, effectively bridging the divide between security personnel and remediation teams while suggesting optimal actions to minimize risk with minimal investment. Positioned at the cutting edge of automating the assessment and prioritization of security vulnerabilities and remediations, Longbow extends its capabilities beyond AST tools to encompass VM, CNAPP tools, and beyond. Our platform is adept at pinpointing and addressing the fundamental sources of security vulnerabilities, delivering customized remediation options that can be promptly implemented. This functionality is essential in a landscape overwhelmed by various vendor solutions and an unclear roadmap for tackling security issues. By empowering security, application, and DevOps teams, our product enhances their ability to address risks efficiently on a larger scale. Furthermore, we integrate, normalize, and consolidate cross-service contexts across all your cloud security tools, ensuring a cohesive approach to security management. This holistic strategy not only enhances operational efficiency but also fosters a more resilient security posture.
  • 21
    Black Duck Mobile Application Security Testing Reviews
    Black Duck's Mobile Application Security Testing (MAST) service delivers on-demand evaluations tailored to tackle the specific security challenges associated with mobile applications. It facilitates an in-depth examination of client-side code, server-side code, and third-party libraries, effectively pinpointing vulnerabilities without needing access to the source code. By utilizing a combination of proprietary static and dynamic analysis tools, MAST offers two tiers of testing: the Standard level, which merges automated and manual evaluations to uncover vulnerabilities in application binaries, and the Comprehensive level, which incorporates additional manual testing to identify flaws in both mobile application binaries and their server-side components. This adaptable and exhaustive strategy empowers organizations to diminish the likelihood of security breaches while bolstering the integrity of their mobile application environments. Furthermore, the insights gained from these assessments enable organizations to implement necessary security measures proactively, ultimately fostering trust among users.
  • 22
    BlueFlag Security Reviews
    BlueFlag Security offers a comprehensive defense mechanism that safeguards developer identities and their associated tools throughout the software development lifecycle (SDLC). It's crucial to prevent uncontrolled identities—both human and machine—from becoming a vulnerability in your software supply chain. Such weaknesses can provide attackers with an entry point. With seamless integration of identity security throughout the SDLC, BlueFlag protects your code, tools, and underlying infrastructure. The platform automates the optimization of permissions for both developer and machine identities, strictly applying the principle of least privilege within the development environment. Furthermore, BlueFlag maintains robust identity hygiene by deactivating users who are off-boarded, managing personal access tokens efficiently, and limiting direct access to developer tools and repositories. By continuously monitoring behavior patterns across the CI/CD pipeline, BlueFlag ensures the prompt detection and prevention of insider threats and unauthorized privilege escalations, thus enhancing overall security. This proactive approach not only protects against external attacks but also fortifies the internal integrity of your development processes.
  • 23
    Bizzy Reviews
    In the contemporary landscape, swiftly identifying potential vulnerabilities, consolidating, enhancing, and ranking them, followed by prompt action, is essential for strengthening our defenses against cyber threats. Maintaining this process as an ongoing effort is equally important. The Bizzy platform bolsters cyber security resilience through its capabilities in prioritization, automation, Big Data analytics, machine learning, and effective vulnerability management, allowing for continuous, rapid, and accurate responses. To effectively combat cyber attacks, it is crucial to be swiftly informed about vulnerabilities, which underscores the significance of the ability to connect the dots and act decisively. This ongoing capability is vital, as it ensures that organizations can adapt and respond to emerging threats. With its focus on prioritization, automation, and comprehensive data analysis, the Bizzy platform enhances the effectiveness of actionable vulnerability management features, thereby significantly contributing to improved security resilience.
  • 24
    C Reviews
    C is a programming language that was developed in 1972 and continues to hold significant relevance and popularity in the software development landscape. As a versatile, general-purpose, imperative language, C is utilized for creating a diverse range of software applications, from operating systems and application software to code compilers and databases. Its enduring utility makes it a foundational tool in the realm of programming, influencing many modern languages and technologies. Additionally, the language's efficiency and performance capabilities contribute to its ongoing use in various fields of software engineering.
  • Previous
  • You're on page 1
  • Next