Best DepsHub Alternatives in 2025
Find the top alternatives to DepsHub currently available. Compare ratings, reviews, pricing, and features of DepsHub alternatives in 2025. Slashdot lists the best DepsHub alternatives on the market that offer competing products that are similar to DepsHub. Sort through DepsHub alternatives below to make the best choice for your needs
-
1
JFrog Xray
JFrog
DevSecOps Next Generation - Securing Your Binaries. Identify security flaws and license violations early in development and block builds that have security issues before deployment. Automated and continuous auditing and governance of software artifacts throughout the software development cycle, from code to production. Additional functionalities include: - Deep recursive scanning components, drilling down to analyze all artifacts/dependencies and creating a graph showing the relationships between software components. - On-Prem or Cloud, Hybrid, Multi-Cloud Solution - An impact analysis of how one issue in a component affects all dependent parts with a display chain displaying the impacts in a component dependency diagram. - JFrog's vulnerability database is continuously updated with new component vulnerabilities data. VulnDB is the industry's most comprehensive security database. -
2
Revenera SCA
Revenera
Take control of your open-source software management. Your organization can manage open source software (OSS), and third-party components. FlexNet Code Insight assists development, legal, and security teams to reduce open-source security risk and ensure license compliance using an end-to-end solution. FlexNet Code Insight provides a single integrated solution to open source license compliance. Identify vulnerabilities and mitigate them while you are developing your products and throughout their lifecycle. You can manage open source license compliance, automate your processes, and create an OSS strategy that balances risk management and business benefits. Integrate with CI/CD, SCM tools, and build tools. Or create your own integrations with the FlexNet CodeInsight REST API framework. This will make code scanning simple and efficient. -
3
Mend Renovate
Mend.io
FreeAutomating dependency updates in software projects can save time and reduce risk. You can customize the settings to suit any workflow. Renovate is constantly running to detect the most recent versions. Multiple file types and languages are supported to detect dependencies wherever they are used. Each update includes a copy of the changelog and commit history. To avoid regression errors, you can run your existing suites of tests on every update. -
4
Bytesafe
Bitfront
€1100 per monthAutomated best practices will increase your open source security posture. This workflow combines security and development teams into one seamless process. The cloud-native security platform reduces risks and protects revenue without slowing down developers. The dependency firewall blocks malicious open source before it reaches developers and infrastructure. This protects data, assets and company reputation. Our policy engine analyzes threat signals, such as known vulnerabilities, license information and customer-defined rules. It is vital to have an understanding of the open-source components used in applications in order to avoid exploitable vulnerabilities. Dashboard reporting and Software Composition Analysis (SCA), provide stakeholders with a comprehensive overview of the current situation. Find out when new open-source licences are added to the codebase. Automated tracking of license compliance issues and restriction of unlicensed packages. -
5
COANA
COANA
$20 per user per monthTraditional SCA tools don't distinguish between exploitable and non-exploitable vulnerabilities. Up to 95% vulnerabilities that developers remediate 'are irrelevant, and can be safely overlooked. Coana uses reachability analysis to reduce false positives to up to 95%. Developers only have to fix the few remaining vulnerabilities that are relevant. You can save time and money by focusing on the few remaining vulnerabilities that pose a threat. You can pinpoint the exact locations of your code that are affected by reachable vulnerability. Find out which dependency updates you need to fix reachable vulnerabilities. Identify vulnerabilities that are reachable in both direct and indirectly dependencies. -
6
Moderne
Moderne
Reduce static code analysis time from 1000s to just minutes. Security vulnerabilities can be fixed across hundreds of repositories in a matter of minutes. Moderne automates code-remediation tasks, allowing developers to deliver more business value every day. Automate safe, sweeping codebase changes that improve quality, security, cost, and code quality. Manage dependencies in your software supply chain - keeping software up-to-date continuously. Eliminate code smells automatically, without the scanning noise of SAST or SCA tools. You will always work in high-quality code. It's the last shift for security. Modern applications naturally accumulate technical debt. They are made up of many codebases and software ecosystems, which include custom, third-party and open-source code. Maintaining your code has become more complicated due to software complexity. -
7
SWE-Kit
Composio
$49 per monthSweKit lets you build PR agents that review code, suggest improvement, enforce coding standard, identify potential issues and automate merge approvals. This streamlines the review process while improving code quality. Automate the creation of new features, debugging complex issues, creating and running tests, optimizing code for performance, maintainingability, and ensuring best practices across codebases, accelerating development. Use advanced code indexing and intelligent file navigation to explore and interact with huge codebases. Ask questions, track dependencies, uncover logic flow, and gain instant insight, enabling seamless communications with complex code structures. Keep your documentation up-to-date with your code. Update Mintlify documentation automatically whenever code changes are made. This ensures that your documentation is accurate, current, and ready for you and your team. -
8
Endor Labs
Endor Labs
Supply chain security and developer productivity are both based on simplified dependency lifecycle management. Endor Labs aids security and development teams by safely maximising software reuse. With a better selection process, you can reduce the number of dependencies and eliminate unused dependencies. To protect against software supply chain attacks, identify the most critical vulnerabilities and use dozens leading indicators of risk. You can get out of dependency hell quicker by identifying and fixing bugs and security issues in the dependency chain. Dev and security teams will see an increase in productivity. Endor Labs allows organizations to focus on delivering value-adding code by maximising software reuse and minimizing false positives. You can see every repos in your dependency network. Who uses what and who is dependent on whom? -
9
MyGet
MyGet
$15 per monthSecure Universal Package Manager. Continuously audit and govern all packages throughout your DevOps lifecycle. MyGet is trusted by thousands of teams around the world for their package management and governance. Cloud package management, strong security controls, and easy continuous integration build services will help you accelerate your software team. MyGet, a Universal Package Manager, integrates with your existing source codes ecosystem and allows for end-to-end package administration. Centralized package management provides consistency and governance for your DevOps workflow. MyGet's real-time software license detection monitors your teams' package usage and detects dependencies between all your packages. Your teams will only use approved packages. You can also report vulnerabilities and obsolete packages early in your software development and release cycles. -
10
Docusnap
itelio
Docusnap allows you to inventory your network infrastructure, hardware, software, as well as common applications servers. Docusnap allows you to easily create network maps, evaluation reports, operation manuals, and contingency plans. Docusnap will show you who has access and if your software is properly licensed. It also allows you to identify IT dependencies. Docusnap records information about the network infrastructure, hardware, software, and common application servers. Docusnap will generate maps and reports about your network. Make contingency plans and operate manuals. Find out who has access to what data and if your software is properly licensed. Identify IT dependencies. Itelio is all about the team! Our highly motivated and skilled employees are the key to our company's success. itelio GmbH has accumulated the expertise of approximately 90 experts from different countries. -
11
CAST SBOM Manager
CAST
FreeCAST SBOM Manager allows users to create, customize, maintain Software Bill of Materials (SBOMs) with the highest level of customization. It automatically identifies open source and 3rd party components, as well as associated risks (security vulnerabilities, license risks, obsolete components), directly from the source code. You can also create and maintain SBOM metadata over time, including proprietary components, custom licenses and vulnerabilities. -
12
Ostorlab
Ostorlab
$365 per monthOstorlab helps you discover your organization's weaknesses. It goes beyond subdomains, crawling, public registries and analytics, to provide an overall view of your external posture. Gain valuable insights in a few clicks to strengthen security and protect yourself against potential threats. Ostorlab automates the security assessment process and identifies privacy concerns. Ostorlab empowers developers and security teams to quickly identify and fix vulnerabilities. Ostorlab's feature of continuous scanning allows you to enjoy hands-free security. Automated scans are triggered on new releases to save you time and ensure continuous protection. Ostorlab allows you to easily access intercepted traffic and source code. Save hours of manual tooling by grouping outputs and seeing what attackers see. -
13
Aptitude
Debian
FreeAptitude is a Ncurses- and command-line-based front-end to many Apt libraries. These libraries are also used by Apt (the default Debian package manager). Aptitude is text-based, and can be run from a terminal. A flexible syntax to match packages in a mutt-like fashion. You can mark packages as "automatically installed" and "manually installed" to allow packages to be removed when they are no longer needed (feature also available in Apt since a few Debian releases). Preview of actions to be performed with different colors marking different actions. Interactively retrieve and display all available Debian packages' changelogs. Score-based dependency solver that is more suitable to interactive dependency resolution with additional hints such as "I don’t want this part of the answer but keep that other part for your next attempt." Apt's dependency solver, on the other hand, is optimized for quick solutions. -
14
ActiveState
ActiveState
$167 per monthThe ActiveState Platform protects your software supply chain. The only software supply chain that automates, secures, and automates the importing, building, and consuming of open source. Available now for Python, Perl and Tcl. Our secure supply chain includes modern package management that is 100% compatible with the packages that you use, highly-automated and includes key enterprise features. Automated builds using source code, including linked C library libraries. You can automatically build/rebuild secure environments by flagging vulnerabilities per-package and per version. A complete Bill of Materials (BOM), including provenance, licensing and all dependencies, transient OS & shared dependencies. Virtual environments are built-in to simplify multi-project development, testing, and debugging. Web UI, API, & CLI for Windows/Linux. Soon, macOS support will be available. You will spend less time worrying about packages, dependencies and vulnerabilities and more time coding. -
15
Legit Security
Legit Security
Legit Security protects software supply chains from attack by automatically discovering and securing development pipelines for gaps and leaks, the SDLC infrastructure and systems within those pipelines, and the people and their security hygiene as they operate within it. Legit Security allows you to stay safe while releasing software fast. Automated detection of security problems, remediation of threats and assurance of compliance for every software release. Comprehensive, visual SDLC inventory that is constantly updated. Reveal vulnerable SDLC infrastructure and systems. Centralized visibility of the configuration, coverage, and location of your security tools and scanners. Insecure build actions can be caught before they can embed vulnerabilities downstream. Before being pushed into SDLC, centralized, early prevention for sensitive data leaks and secrets. Validate the safe use of plug-ins and images that could compromise release integrity. To improve security posture and encourage behavior, track security trends across product lines and teams. Legit Security Scores gives you a quick overview of your security posture. You can integrate your alert and ticketing tools, or use ours. -
16
Red Sift ASM
Red Sift
Red Sift ASM, formerly Hardenize, is a managed service which combines automated internet asset detection with continuous network and cybersecurity monitoring. Internet Asset Discovery Our custom search engine uses multiple sources of information to help you find websites. Background searches automatically add new properties to your inventory that you own. Host and network monitoring We monitor your entire perimeter network continuously with data that is updated daily. We scan domains, hostnames and IP addresses. Certificate Inventory and Expiration Management We monitor your certificates, and alert you if they are about to expire. We also monitor the certificates for third-party services to help you avoid problems caused by dependencies or services that you do not control directly. -
17
Nexus Lifecycle
Sonatype
Ensure that your entire software supply chain is protected. Developers can use a Chrome browser extension to see if an open-source component is vulnerable when they select from public repositories. Developers can integrate to the most popular IDEs to quickly select the best components based upon real-time intelligence, and then move to an approved version in one click. Nexus Lifecycle integrates Eclipse, IntelliJ and Visual Studio. Nexus Lifecycle integrates to GitHub, GitLab and Atlassian Bitbucket in order to automatically generate pull request for components that violate open-source policies. Developers can see which versions they should use to fix violations. No more guessing which version to upgrade to. Because Nexus Intelligence is the only automated dependency management solution that can eliminate noise, developers can trust that the PRs are accurate. -
18
Timesys Vigiles
Timesys Corporation
The timesys Vigiles vulnerability management suite, a best-in class Software Composition Analysis (sca), and vulnerability management solution for embedded systems built on top the linux operating system, is the timesys Vigiles. Vigiles will show you your vulnerability for every product and each software release and provide engineering guidance on how to fix them. Your customers will be able to receive software updates earlier and remain secure throughout the entire lifecycle. Automates monitoring thousands of vulnerabilities and provides unique vulnerability detection for specific product components. This includes alerts of new vulnerabilities, summaries and status of severity and status, as well as on-demand reports for projects. All the features of the Free version's vulnerability monitor are available, along with powerful vulnerability analysis, triage and collaboration tools. This will allow your team to quickly prioritize, assess, and mitigate security problems. -
19
ThreatMapper
Deepfence
Open source, multi-cloud platform to scan, map, and rank vulnerabilities in containers, images hosts, repositories, and running containers. ThreatMapper detects threats to your applications in production across clouds, Kubernetes and serverless. You cannot secure what you can't see. ThreatMapper automatically discovers your production infrastructure. It can identify and interrogate cloud instances, Kubernetes nodes and serverless resources. This allows you to discover the applications and containers, and map their topology in real time. ThreatMapper allows you to visualize and discover the external and internal attack surfaces for your applications and infrastructure. Bad actors can gain access to your infrastructure by exploiting vulnerabilities in common dependencies. ThreatMapper scans hosts and containers for known vulnerable dependencies. It also takes threat feeds from more than 50 sources. -
20
Augment Code
Augment Code
$60 per developer per monthAugment brings your team's collective expertise--codebases, documentation, and dependencies --to your fingertips through chat, code completions and suggested edits. Augment helps you to stay on track, get more done and remain in the flow. Augment is lightning fast and highly secured. It works in your favorite IDEs, and Slack. Suggestions reflect APIs and coding pattern in your company's software so that your team can use them on your actual work. Fast inference, 3x faster than competitors, built on the latest techniques, including custom GPU Kernels, keeps developers in flow. Our custom AI models tuned to code avoid hallucinations, and improve code quality as well as productivity. Improve the use of internal best practice from your senior engineers. Codebase awareness is important for daily tasks, new developer training, code review and more. Our architecture is designed for tenant isolation and built to protect your IP. It's already SOC-2 Type 1 certified and pen-test verified. -
21
WP Guardian
WP Guardian
$5 per monthKeep your WordPress fleet protected and up-to date. Use proactive security to keep track of and control both your sites and servers in one place. Keep up with WordPress threats by monitoring vulnerabilities continuously and implementing effective mitigation strategies. Take control of the security status for all WordPress websites. Scan servers connected and identify & notify vulnerabilities to keep infrastructure secure. Automatic and manual updates, virtual patches, continuous vulnerability monitoring. Designed to secure control panels other than cPanel or Plesk. Perform checks before, after, and during updates to ensure a smooth, safe, and secure updating process. Block malicious requests and mitigate vulnerabilities, without modifying the website code or affecting performance. Protect WordPress sites and servers without installing any updates. Adopt the ultimate solution for actively blocking the exploitation of identified threat. -
22
Backslash Security
Backslash
1 RatingEnsure the security and integrity of your code. Identify externally accessible data flows and vulnerabilities to effectively mitigate risk. By identifying the real attack paths that lead to reachable code we allow you to fix only code and open source software that are in use and reachable. Avoid overloading development teams with irrelevant vulnerability. Prioritize risk-mitigation efforts more effectively to ensure a focused and efficient approach to security. Reduce the noise CSPM and CNAPP create by removing non-reachable packages. Analyze your software components and dependencies to identify any known vulnerabilities or outdated library that could pose a risk. Backslash analyses both direct and transitive package, ensuring coverage of 100%. It is more effective than existing tools that only focus on direct packages. -
23
Visual Expert
Novalys
$495 per yearVisual Expert is a static code analyzer for Oracle PL/SQL, SQL Server T-SQL and PowerBuilder. It identifies code dependencies to let you modify the code without breaking your application. It also scans your code to detect security flaws, quality, performance and maintenability issues. Identify breaking changes with impact analysis. Scan the code to find security vulnerabilities, bugs and maintenance issues. Integrate continuous code inspection in a CI workflow. Understand the inner workings and document your code with call graphs, code diagrams, CRUD matrices, and object dependency matrices (ODMs). Automatically generate source code documentation in HTML format. Navigate your code with hyperlinks. Compare two pieces of code, databases or entire applications. Improve maintainability. Clean up code. Comply with development standards. Analyze and improve database code performance: Find slow objects and SQL queries, optimize a slow object, a call chain, a slow SQL query, display a query execution plan. -
24
Aikido Security
Aikido Security
FreeAikido Security was designed with developers in mind. We scan your source codes and cloud to tell you which vulnerabilities need to be fixed. Triaging is made faster by reducing false positives, and making CVEs more readable. Aikido simplifies the process of keeping your product secure, and gives you more time to do what's best for you: write code. -
25
Seal Security
Seal Security
FreeSeal Security redefines open source vulnerability management and patch management. Integration directly into your SDLC and workflows. Standalone security updates for immediate resolution of critical issues. Predictable remediation, optimal resource allocation and centralized control with reduced R&D dependence. Streamline the open source vulnerability remediation process without introducing any risk of breaking changes. Seal Security will help you to stop being alert fatigued and begin patching. Pass any product security scan with confidence. Seal Security offers immediate remediation of open source vulnerabilities. By meeting the SLAs of your customers and offering a product that is free from vulnerabilities, you can build customer trust and strengthen your market position. Seal Security integrates seamlessly with various coding systems, patch management tools, and open-source platforms via powerful APIs and a CLI. -
26
Apache Ivy
Apache Software Foundation
FreeApache Ivy™, a popular dependency manager, focuses on simplicity and flexibility. Learn more about the unique enterprise features of Ivy, what others have to say about it, as well as how it can help improve your build system. Ivy is a tool to manage (recording and tracking, resolving, reporting) project dependencies. Ivy is process-agnostic, and does not require any specific structure or methodology. It is flexible and reconfigurable, so it can be used to adapt to many different build and dependency management processes. Ivy can be used as a standalone tool but it is also compatible with Apache Ant. It provides a variety of powerful Ant tasks, including dependency resolution, reporting and publication. Ivy is a powerful tool with many useful features. The most popular and widely used are its flexibility, integration to Ant and strong transitive dependency management engine. Ivy is open-source and released under a very permissive Apache License. -
27
DNF
DOCS
FreeDNF is a software package administrator that installs, updates and removes Fedora packages. It is the successor of YUM (Yellow-Dog Upgrader Modified). DNF makes it easy for you to maintain packages. It automatically checks for dependencies and determines the actions needed to install packages. This eliminates the need for you to manually install or update the package and its dependencies using the rpm command. Fedora now uses DNF as the default software package manager. Removing dependencies, which are no longer needed by current programs, of packages that have been installed. It checks for updates but does not download nor install the packages. Basic information about the package, including version, release, description, and name. -
28
GitHub Advanced Security for Azure DevOps
Microsoft
$2 per GiBGitHub Advanced Security for Azure DevOps provides a native application security testing service for the developer workflow. It allows developer, security and operations (DevSecOps), teams to prioritize innovation while enhancing developer security without sacrificing their productivity. Secret scanning helps you detect and prevent leaks of secret information from your application development process. Benefit from a partner program with more than 100 service provider and scan for more than 200 types of tokens. Azure DevOps' UI allows you to quickly and easily adopt secret scanning without additional tooling. Dependency scanning can help you protect your software supply chain. It will identify any open-source components that are vulnerable. Get clear instructions on how to update component reference so you can fix problems in minutes. -
29
Simple Malware Protector
Simplestar Software
$3.03 per monthSimple Malware Protection will quickly identify and eliminate any vulnerabilities and threats on your computer. It monitors your computer to protect you against future infections. Simple Malware Protector is constantly updated to protect you against new threats and vulnerabilities. Simple Malware Protection can be scheduled to run at startup, or at any other time during the day. This gives you complete control over your protection. You can choose to have Simple Malware Protector run at startup or any other time that suits your needs. Simple Malware Protection will scan your computer and identify security vulnerabilities and threats. These threats can be removed quickly and safely by Simple Malware Protection. Protect your computer against malware, spyware, or other security threats. Restore maximum security to your computer. -
30
Socket
Socket
$8 per user per monthSecure your supply chain. Ship with confidence. Socket fights vulnerabilities and provides visibility, defense-in-depth, and proactive supply chain protection for JavaScript and Python dependencies. Find and compare millions of open source packages. Socket is not a traditional vulnerability scanner. Socket proactively detects and blocks 70+ signals of supply chain risk in open source code, for comprehensive protection. Prevent compromised or hijacked packages from infiltrating your supply chain by monitoring changes to package.json and more in real-time. Socket is built by a team of prolific open source maintainers whose software is downloaded over 1 billion times per month. We understand how to build tools that developers love. But don't take our word for it. -
31
Website security is made easy by automatically detecting and fixing threats. Protect your website, reputation, visitors, and website from cyberthreats automatically Comprehensive website security software protects you website from malicious cyber threats. This includes protection for your website code and web applications. You will receive website scans daily, automated malware removal and vulnerability/CMS patches. There will also be a web application firewall that blocks harmful traffic from reaching your site. Our website security scan instantly scans your website for malware, viruses, and other cyber threats. It also alerts you to any issues. Your website will be protected from malicious content by automatically detecting it and removing it. Our vulnerability scanner allows you to quickly check for vulnerabilities in your CMS before they are exploited.
-
32
Packagist
Packagist
Packagist is the main repository for composers. It aggregates public PHP package installable with Composer. Your project's root directory should contain a file called composer.json, which contains your project dependencies. Packagist is Composer's default package repository. It allows you to find packages and allows Composer to know where the code is. Composer can be used to manage dependencies for your library or project. First, choose a package name. This is an important step because it cannot be changed and should be unique enough so that there are no conflicts in the future. A package name is composed of a vendor name and project name, joined by a/. To prevent conflicts in naming, the vendor name is necessary. The composer.json file should be located at the top of your package’s git/svn/ directory. It is how you describe your package to composer and packagist. The VCS repository contains tags that you create to automatically fetch new versions of your package. -
33
Squire AI
Squire AI
$20 per monthSquire will write the pull request descriptions. Keep your team on the same page with a clear description. Squire's agentic workflow allows a team to review your PR in the context of your entire codebase. It can catch many issues, such as systemic breaking changes or security concerns. We improve code quality, and get your PR in production. Squire is an agent that works with you to review PRs and learn your preferences for code reviews. Squire adapts to your style by learning how your team reviews code. It does this through explicit configurations and learning from the interactions of your team. Map and synchronize responsibility and ownership across your entire engineering stack. Maintain compliance by applying rules to your engineering components. -
34
Headway
Headway App
$29 per monthYou should share every update you can with your users. We promise they will love you for it. You can personalize your changelog to match the company branding and host it at your own domain. We are happy to assist you in setting it up. Connect Slack to Twitter so your customers and team are up-to-date on the latest developments in your product. If you need, your entire team can post to the changelog. It is always better to see the face and work of people than changelogs. Privacy is essential. You can make your changelog public or private. You can also disallow search engines from crawling it. You can customize the categories you use to make every product fit into a single glove. You can upload images and embed multimedia easily. You can embed subtle widget badge animations in your product so that users don't miss important updates. -
35
Mbed Studio
Mbed Studio
Mbed Studio is a free IDE that allows you to create, compile, and debug Mbed OS applications and libraries. Mbed OS allows you to create your applications by switching between predefined build profiles for release, debugging, and development. You'll find code authoring much easier with API auto-completion. Additionally, you can inspect hardware-dependent settings like pin mappings based upon your platform. Mbed OS releases new features, code size enhancements, and fixes. Mbed Studio will notify you about any updates. You can also update other drivers and libraries such as those found on mbed.com. You can manage IoT products throughout their entire lifecycle. Mbed accounts give you access to the free tier for device management services at Pelion, which allows you to connect to and manage up 100 devices. -
36
Arctic Data Canadian Payroll
Arctic Data Canadian Payroll
$99.95 one-time paymentSince 1982, Arctic Data Corporation has provided payroll software to Canadian businesses. Canadian Payroll Software is available for WINDOWS XP/Vista/7/8/10. It can be used in conjunction with Arctic Data's Multiuser accounting system, or as a standalone application. ADC's Canadian payroll system can help you streamline your small and medium business payroll. It allows you to print cheques, make direct bank deposits, generate T4s, and record of employment (ROEs). The system can manage up to 99 companies. Payroll updates cost $99.95 per update. Every year, the government releases tax changes for January 1. An additional update for July 1 is sometimes released. You may want to purchase the update depending on the changes. The system can accommodate up to 32,000 employees, depending on disk space. The system can create customer reports using the data you have entered. -
37
Last9
Last9
Visualize your microservices from your CDN to your databases, with external dependencies. Automately measure baselines and receive recommendations for SLIs or SLOs. Measure and understand the impact across microservices. Every change creates ripples in your connected system. Login API was affected by a security group's change? Last9 makes it easy for you to find the 'last change' that caused an incident. Last9 is a modern reliability platform. It leverages your existing observation tricks and allows you to build and enforce mental model on top of your data. This will help you cover infrastructure, service, product metrics with minimal effort. We love reliability and make it fun and embarrassingly simple to run systems at scale. Last9 uses the knowledge graph to automatically generate maps of all known infrastructure and service components. -
38
Dependency Track SaaS
YourSky.blue
USD 10.08 per user per monthDependency Track Saas provided by YourSky.blue is the managed cloud solution for Software Composition Analysis (SCA), based on the popular open-source Dependency-Track developed by OWASP®. It allows users to monitor all the chain of software components through powerful dashboards and configurable alerts. Always up to date with the latest security bulletins, it periodically scans already uploaded SBOMs for new security issues, out-of-date versions or licenses at risk. YourSky.blue Dependency Track SaaS is one of the most powerful and essential tools to manage software assets conveniently. The SaaS product also provides the highest security standards such as multi factor authentication, configurable application permissions, portfolio segmentation, Single-Sign-On to facilitate integration with any enterprise identity provider. -
39
Check Point IPS
Check Point IPS
Intrusion Prevention Systems detect and prevent attempts to exploit vulnerabilities in vulnerable systems or applications. They protect you from the latest breaking threat. Our Next Generation Firewall automatically updates the Check Point IPS protections. Your organization is protected regardless of whether the vulnerability was discovered years ago or just a few seconds ago. Check Point IPS provides thousands of behavioral and signature preemptive protections. Our acceleration technologies allow you to safely enable IPS. Your staff will save valuable time with a low false positive rate. IPS can be enabled on any Check Point security gateway to reduce total cost of ownership. Enterprises can get cloud-level expansion and resilience on their premises with this on-demand hyperscale threat prevention service. Users can access corporate networks and resources remotely from anywhere they are. -
40
Snapcraft
Snapcraft
FreeThis is the code repository of snapd, which is the background service that manages snaps and maintains them. Snaps are app packages that automatically update for desktop, cloud, IoT, and IoT. Snaps are easy to install, secure, cross platform, and dependency-free. They are being used every day on millions of Linux systems. Snapd, in addition to its many management and service functions, provides snapd, the snap command. It is used to install and delete snaps, interact with the wider snap ecosystem and implement the confinement policies that isolate snaps, and governs the interfaces that allow snaps access to specific system resources outside their confinement. The Snap Store has a wide range of products that you can download, such as Spotify and Visual Studio Code. You can also create your own snaps by following our snap documentation creation process. -
41
VulnDB
VulnDB
Riskb-based security publishes vulnerability reports that give a quick overview of vulnerability trends. These reports use charts and graphs to summarize recent vulnerabilities. VulnDB provides the most current and comprehensive vulnerability intelligence and allows for actionable information. It is available via a SaaS portal or RESTful API, which can be integrated into GRC tools and ticketing systems. VulnDB allows organizations search for and be alerted about the latest vulnerabilities in end-user software as well as 3rd Party Libraries and dependencies. VulnDB subscriptions provide organizations with easy-to-understand ratings and metrics on vendors and products. This helps them understand how each contributes towards their risk profile and cost of ownership. Vulnerability source information, extensive links, Proof of Concept code, and solutions -
42
Jaisocx
Jaisocx
$0Since 2024 Jaisocx has supported PHP over HTTP/3. It switches between HTTP/1.1, H2 and H3 depending on the negotiation with HTTP client. Charset detection is a unique feature that detects the text content and displays it correctly, such as in German or French alphabets. It has a built-in engine for securing the endpoints using Basic Auth and JSON Web Token. c) Proxy Endpoints. d) The framework-like solution to publish SQL query results in JSON format is also available out of the box and requires minimal configuration. This software is well-documented on the same company website. f) The software is free. g) It has the Docker Hub repository. h) And Github.com repository that contains some basic samples of Laravel, Symfony, and WordPress apps using Docker Compose. -
43
JFrog Platform
JFrog
$98 per monthFully automated DevOps platform to distribute trusted software releases, from code to production. DevOps projects can be onboarded with users, resources, and permissions to speed up deployment frequency. Fearlessly update by proactive identification of open-source vulnerabilities and violations of license compliance. Your enterprise can achieve zero downtime in its DevOps pipeline by using High Availability and active/active Clustering. You can manage your DevOps environment using out-of-the box ecosystem and native integrations. Enterprise ready with a choice of cloud, multi-cloud, hybrid, and on-prem deployments that scale with you. You can ensure speed, reliability, and security for IoT software updates. Device management at scale. You can create new DevOps project in minutes. And you can easily onboard resources, team members and storage quotas to code faster. -
44
VAddy
VAddy
$55 per monthVAddy makes it easy for developers to become security experts. You can quickly identify vulnerabilities and fix them before they become embedded in your code. VAddy automatically runs as part your existing CI process. VAddy runs after every code update and alerts you if a commit contains vulnerabilities. We have all been in projects where a vulnerability discovered just before release caused the project to be canceled. Ensure that you are always performing high-quality security analyses throughout your development process to avoid any last-minute surprises. VAddy allows you visualize the frequency of security flaws caused by each member of your team or code module. You can quickly identify security problems and increase education to help developers or other team members with poor security knowledge. Our security experts constantly update our diagnostic engine with the latest threats. This allows your team to quickly develop secure applications without needing any domain knowledge. -
45
Zimbra
Synacor
VariesZimbra 9: Collaboration Superheroes! Users can seamlessly switch between desktop, tablet, and mobile browsers while enjoying consistent email and collaboration experiences. It is extensible and offers best-in-class integrations with Slack and Dropbox. There are many more in development. Zimlet framework allows you to customize Zimbra according to your needs. Zimbra's reliable server infrastructure ensures that customers have the security, privacy, and data sovereignty they expect. Upgrade to Zimbra 9 is easy and requires no data migration. Zimbra 9's responsive, modern UI is built on Zimbra’s reliable server infrastructure. This ensures the security, privacy, and data sovereignty that you have come to expect from Zimbra. Zimbra 9 is flexible, extensible and unlike competitors that use closed platforms. Get out of Microsoft and Google and integrate with third-party collaboration services such as Dropbox, Zoom, and Slack. -
46
Vulert notifies you if a security issue is found in any of the open-source software you use. Vulert doesn't need any integration or installation, You can start only in 2 minutes. 1: Signup with email only 2: Just upload the list of open-source software you use in your application. That's it. Why Should you Use Vulert: You are alerted before the hackers start malicious activities. This makes sure that your website is always secured from unexpected hacks and always up for customers.
-
47
Phylum
Phylum
Phylum defends applications at the perimeter of the open-source ecosystem and the tools used to build software. Its automated analysis engine scans third-party code as soon as it’s published into the open-source ecosystem to vet software packages, identify risks, inform users and block attacks. Think of Phylum like a firewall for open-source code. Phylum can be deployed in front of artifact repository managers, integrate directly with package managers or be deployed in CI/CD pipelines. Phylum users benefit from its powerful, automated analysis engine that reports proprietary findings instead of relying on manually curated lists. Phylum uses SAST, heuristics, machine learning and artificial intelligence to detect and report zero-day findings. Users know more risks, sooner and earlier in the development lifecycle for the strongest software supply chain defense. The Phylum policy library allows users to toggle on the blocking of critical vulnerabilities, attacks like typosquats, obfuscated code and dependency confusion, copyleft licenses, and more. Additionally, the flexibility of OPA enables customers to develop incredibly flexible and granular policies that fit their unique needs. -
48
Faktum Invoicing
Faktum Software International
You can also set up your billing process according to the settings you prefer. We offer flexibility in setting up your billing process, including VAT and payment conditions. You can choose how your invoices will be sent. They can be printed by post or sent as PDFs by email, depending on the preferences of your customers. Professionally create invoices and quotations that look great. You can choose from a variety of pre-made invoice templates or customize your own invoice layout with your company logo. Professional invoices will help you present your company. Faktum makes it easy to get paid on time. It allows you to view your accounts and see which customers are late. It also has the ability to send reminders to ensure that payment is made when necessary. Faktum Invoicing offers free updates to the latest versions of the program, which gives you new features as well as bug fixes. You will be notified automatically when new updates become available. -
49
CodeSee
CodeSee
You can quickly identify cross-code dependencies, and navigate between files and directories. This tool will help you gain a better understanding of the codebase. It will also guide you in planning, reviewing, and onboarding. Software architecture diagrams that automatically update and sync with the codebase. You can use these features to understand how files and folders connect, and how a change fits into the larger architecture. CodeSee Maps are automatically generated when a code change is merged. This means that you don't have to manually refresh your Map. You can quickly see the most active areas in the codebase. You can also get information on each file and folder, including their age and number of lines of code. Tour Alerts can help you keep your Tours up-to-date by allowing you to create visual walkthroughs of your code using Tours. -
50
Messenger[ai]
Mindbody Business
$99 per monthThis is the new name for the best-in-class AI front-desk assistant that you can rely on to provide outstanding customer service. Now Messenger[ai] is integrated with Mindbody and has all the features that you love plus a new look and feel. You and your team can now move bookings and sales and give clients a great experience with your brand. You can answer questions and respond to missed calls. You can also communicate with clients via 2-way texting. All features that you love about Bowtie are still available. We will be releasing enhancements to Bowtie to enhance your client experience. You can still use your existing login. In the coming months, we will be releasing a Mindbody login option. All new features will be free to you. The new name will be added to your billing statement.