What Integrates with Kondukto?

Find out what Kondukto integrations exist in 2024. Learn what software and services currently integrate with Kondukto, and sort them by reviews, cost, features, and more. Below is a list of products that Kondukto currently integrates with:

  • 1
    GitGuardian Reviews
    Top Pick

    GitGuardian

    GitGuardian

    $0
    308 Ratings
    See Software
    Learn More
    GitGuardian is a global cybersecurity startup focusing on code security solutions for the DevOps generation. A leader in the market of secrets detection and remediation, its solutions are already used by hundred thousands developers in all industries. GitGuardian helps developers, cloud operation, security and compliance professionals secure software development, define and enforce policies consistently and globally across all their systems. GitGuardian solutions monitor public and private repositories in real-time, detect secrets and alert to allow investigation and quick remediation.
  • 2
    Parasoft Reviews

    Parasoft

    Parasoft

    $125/user/mo
    105 Ratings
    See Software
    Learn More
    Parasoft's mission is to provide automated testing solutions and expertise that empower organizations to expedite delivery of safe and reliable software. A powerful unified C and C++ test automation solution for static analysis, unit testing and structural code coverage, Parasoft C/C++test helps satisfy compliance with industry functional safety and security requirements for embedded software systems.
  • 3
    Jenkins Reviews
    Jenkins, the most popular open-source automation server, provides hundreds of plugins that can be used to build, deploy, and automate any project. Jenkins is an extensible automation server that can be used to create CI servers or become the continuous delivery hub for any project. Jenkins is a Java-based program that can be run straight out of the box. It includes packages for Windows, Linux and macOS, as well as other Unix-like operating system packages. Jenkins is easy to set up and configure via its web interface. It also includes built-in help and on-the-fly error checking. Jenkins can be integrated with almost every tool in the Continuous Integration and Continuous Delivery toolchain thanks to the hundreds of plugins available in the Update Center. Jenkins' plugin architecture allows for almost unlimited possibilities. Jenkins makes it easy to distribute work across multiple machines. This helps drive builds, tests, and deployments across multiple platforms more quickly.
  • 4
    SonarQube Reviews
    SonarSource creates world-class products to ensure Code Quality and Security. SonarQube, our open-source and commercial code analysis tool - SonarQube -- supports 27 programming languages. This allows dev teams of all sizes to resolve coding issues in their existing workflows.
  • 5
    Travis CI Reviews

    Travis CI

    Travis CI

    $63 per month
    1 Rating
    This is the easiest way to deploy and test your projects on-prem or in the cloud. You can easily sync your Travis CI projects and you'll be able to test your code in just minutes. Check out our features - you can now sign up for Travis CI with your Bitbucket or GitLab account. This will allow you to connect to your repositories. It's always free to test your open-source projects! Log in to your cloud repository and tell Travis CI that you want to test a project. Then push. It couldn't be simpler. Many services and databases are already pre-installed and can easily be enabled in your build configuration. Before merging Pull Requests to your project, make sure they are tested. It's easy to update production or staging as soon as your tests pass. Travis CI builds are set up mainly through the configuration file.travis.yml found in your repository. This allows you to make your configuration version-controlled and flexible.
  • 6
    Avatao Reviews
    Avatao's security training is more than just videos and tutorials. It offers an interactive, job-relevant learning experience for developers, security champions, pentesters and security analysts, as well as DevOps teams. The platform offers 750+ tutorials and challenges in 10+ languages and covers a wide range security topics from OWASP Top 10 to DevSecOps, Cryptography, and DevSecOps. The platform allows developers to be immersed in high-profile cases, and gives them real-world experience with security breaches. Engineers will be able to hack into and fix the bugs. Avatao provides software engineers with a security mindset that allows them to respond faster to known vulnerabilities and reduce risks. This increases a company's security capabilities and allows them to ship high-quality products.
  • 7
    Invicti Reviews
    Invicti (formerly Netsparker) dramatically reduces your risk of being attacked. Automated application security testing that scales like none other. Your team's security problems grow faster than your staff. Security testing automation should be integrated into every step in your SDLC. Automate security tasks to save your team hundreds of hours every month. Identify the critical vulnerabilities and then assign them to remediation. Whether you are running an AppSec, DevOps or DevSecOps program, help security and development teams to get ahead of their workloads. It's difficult to prove that you are doing everything possible to reduce your company's risk without full visibility into your apps, vulnerabilities and remediation efforts. You can find all web assets, even those that have been forgotten or stolen. Our unique dynamic + interactive (DAST+ IAST) scanning method allows you to scan the corners of your apps in a way that other tools cannot.
  • 8
    Google Reviews
    Top Pick
    Our mission is to organize all of the world's information so everyone can access it and use it. There are thousands, sometimes even millions, of websites that provide useful information every time you search. Google's search engine determines which results to show you before you type. It is guided by your commitment to provide the best information. Google organizes information about websites in its Search index even before you start searching. The index works in a similar way to a library but contains more information than all the libraries around the world. Google's Search algorithms scan through hundreds of millions of pages in our Search index in a fraction of seconds to find the most relevant and useful results for your search terms. Google offers many formats to help you quickly find what you are looking for. We are constantly improving the way we present information, whether it's in a map with directions or images and videos.
  • 9
    GitHub Reviews
    Top Pick

    GitHub

    GitHub

    $7 per month
    22 Ratings
    GitHub is the most trusted, secure, and scalable developer platform in the world. Join millions of developers and businesses who are creating the software that powers the world. Get the best tools, support and services to help you build with the most innovative communities in the world. There's a free option for managing multiple contributors: GitHub Team Open Source. We also have GitHub Sponsors that help you fund your work. The Pack is back. We have partnered to provide teachers and students free access to the most powerful developer tools for the school year. Work for a government-recognized nonprofit, association, or 501(c)(3)? Receive a discount Organization account through us.
  • 10
    Okta Reviews
    Top Pick
    One platform, infinite ways for you to connect with your customers and employees. Any app can be made authable. Okta can help you create secure and delightful experiences quickly. Okta's Customer ID products can be combined to create the stack you need. This will provide security, scalability and reliability. Protect and empower your employees, contractors, partners. Okta's workforce identification solutions will protect your employees no matter where they are. You will have the tools you need to automate cloud journeys and support hybrid environments. Okta is trusted by companies around the globe to protect their workforce identities.
  • 11
    GitLab Reviews
    Top Pick

    GitLab

    GitLab

    $29 per user per month
    14 Ratings
    GitLab is a complete DevOps platform. GitLab gives you a complete CI/CD toolchain right out of the box. One interface. One conversation. One permission model. GitLab is a complete DevOps platform, delivered in one application. It fundamentally changes the way Security, Development, and Ops teams collaborate. GitLab reduces development time and costs, reduces application vulnerabilities, and speeds up software delivery. It also increases developer productivity. Source code management allows for collaboration, sharing, and coordination across the entire software development team. To accelerate software delivery, track and merge branches, audit changes, and enable concurrent work. Code can be reviewed, discussed, shared knowledge, and identified defects among distributed teams through asynchronous review. Automate, track, and report code reviews.
  • 12
    Slack Reviews
    Top Pick

    Slack

    Slack

    $6.67 per user per month
    219 Ratings
    Slack, a cloud-based project collaboration software solution that facilitates communication between teams, is designed to seamlessly integrate with other organizations. Slack offers powerful tools and services all integrated into one platform. It provides private channels for interaction within smaller teams, direct channels for sending messages to colleagues, as well as public channels that allow members to start conversations across organizations. Slack is available on Mac, Windows and Android as well as iOS apps. It offers a variety of features including chat, file sharing and collaboration, real-time notifications and two-way audio/video, screen sharing, document imaging and activity tracking and logging.
  • 13
    Jira Software Reviews
    Top Pick
    Jira Software from Atlassian is the best software development tool for teams building great products and planning. Jira is trusted by thousands of teams and provides a wide range tools to plan, track, release and release world-class software. It also captures and organizes issues, assigns work, and follows team activity. It integrates with the most popular developer tools to provide end-to-end traceability.
  • 14
    Microsoft Teams Reviews
    Top Pick

    Microsoft Teams

    Microsoft

    $12.50 per user per month
    196 Ratings
    Teams of engaged people work together to solve today's complex business challenges. We have created an online guide to help you and your team learn the secrets of teamwork. There are no limits to what you can accomplish when you have a place where you can create and make decisions together as a team. Teams allows you to bring everything together in one shared workspace. You can chat, meet, share documents, and use business apps. Your team can get on the same page using group chat, online meetings and calling. Microsoft 365 (formerly Office 365), apps such as Word, Excel, PowerPoint and SharePoint allow you to collaborate on files. To keep your business moving forward, add in your favorite Microsoft apps as well as third-party services. Microsoft 365 provides end-to-end security and administrative control. Teams is for all types of groups. Start with the no-obligation, free version. As part of the best-in class suite of productivity tools, you can also get Team.
  • 15
    Mattermost Reviews

    Mattermost

    Mattermost

    $3.25 per user per month
    2 Ratings
    Mattermost is an open-source messaging platform that allows for secure team collaboration. You can create intuitive workflows and collaborate across large groups without worrying about data privacy or security. You can quickly get up and running with hundreds of pre-built integrations or create custom workflows that can scale to thousands of concurrent users. Mattermost connects people, tools and automation to improve collaboration. This is how many of the world's most privacy-conscious companies work. Mattermost is used by DevOps teams to facilitate collaboration at all stages of the DevOps process. Mattermost combines people, tools, and automations to enable your team to increase innovation and agility. Mattermost is an open-source Slack alternative. It is written in Golang, React and runs as one Linux binary with MySQL and PostgreSQL. Access the source code and enjoy the features you love (file sharing, real time group chat, and webhooks to name a few).
  • 16
    Nessus Reviews
    More than 30,000 organizations around the world trust Nessus as the most widely used security technology on the planet. It is also the gold standard in vulnerability assessment. Since the beginning, we have worked closely with the security community. Nessus is continuously optimized based on community feedback in order to provide the best vulnerability assessment solution available. Twenty years later, we are still focused on community collaboration and product innovations to provide the most complete and accurate vulnerability data. This will ensure that you don't miss critical issues that could expose your organization's vulnerabilities. Today, Nessus has been trusted by over 30,000 organizations around the world as the best vulnerability assessment tool and security technology.
  • 17
    Bitbucket Reviews
    Top Pick

    Bitbucket

    Atlassian

    $15 per month
    10 Ratings
    Bitbucket goes beyond Git code management. Bitbucket is a place for teams to plan projects, collaborate on code and test, and then deploy. For small teams of less than 5, Bitbucket is free. Premium plans ($6/user/mo), and Standard ($3/user/mo), are available at scale. You can organize your projects by creating Bitbucket branches from Jira issues and Trello cards. Integrated CI/CD allows you to build, test, and deploy. Configuration as code allows for fast feedback loops and benefits. Pull requests make it easier to approve code reviews. With inline comments, create a merge list with the designated approvers. Bitbucket Pipelines with CI/CD lets you build, test, and deploy with integrated CI/CD. You can benefit from configuration as code and quick feedback loops. With IP whitelisting, 2-step verification and IP whitelisting, you can be sure that your code is safe in the Cloud. You can restrict access to certain users and control their actions by granting branch permissions and merging checks to quality code.
  • 18
    Acunetix Reviews
    Acunetix is the market leader for automated web application security testing and is the preferred tool for many Fortune 500 customers. Acunetix can detect and report on a wide range of web application vulnerabilities. Acunetix's industry-leading crawler fully supports HTML5/JavaScript and Single-page applications. This allows auditing of complex, authenticated apps. Acunetix is the only technology that can automatically detect out of-band vulnerabilities. It is available online as well as on-premise. Acunetix includes integrated vulnerability management capabilities to help enterprises manage, prioritize and control all types of vulnerability threats. These features are based on business criticality. Acunetix is compatible with popular Issue Trackers, WAFs, and is available online on Windows, Linux, and Online
  • 19
    AppScan Reviews
    HCL AppScan for Application Security Testing. To minimize attack exposure, adopt a scalable security test strategy that can identify and fix application vulnerabilities at every stage of the development process. HCL AppScan provides the best security testing tools available to protect your business and customers from attack. Rapidly identify, understand, and fix security vulnerabilities. App vulnerability detection and remediation is key to avoiding problems. Cloud-based application security testing suite for performing static, dynamic, and interactive testing on web and mobile. Multi-user, multiapp dynamic application security (DAST), large-scale, multiuser, multi-app security for applications (DAST), to identify, understand, and remediate vulnerabilities and attain regulatory compliance.
  • 20
    Azure DevOps Server Reviews

    Azure DevOps Server

    Microsoft

    $6 per user per month
    2 Ratings
    Integrated software delivery tools hosted on premisis allow you to share code, track work and ship software. You can use all Azure DevOps services, or only the ones that you need to enhance your existing workflows. Azure DevOps Server, formerly known as Team Foundation Server (TFS), is a collection of software development tools that can be used together. It is hosted on-premises. Azure DevOps Server can integrate with your existing editor or IDE, allowing your cross-functional team members to work efficiently on projects of any size. Azure DevOps Server is source code management software, and includes features such as access Controls/Permissions, bug tracking, build automation, change management, code review, collaboration, continuous integration, and version control.
  • 21
    Bamboo Reviews

    Bamboo

    Atlassian

    $10 for up to 10 jobs
    2 Ratings
    Bamboo provides first-class support for continuous delivery. Bamboo's deployment projects take the tedious work out of releasing into each environment and allow you to control the flow using per-environment permissions.
  • 22
    CircleCI Reviews

    CircleCI

    CircleCI

    $50 per month
    2 Ratings
    CI hosted on the cloud or on a dedicated server can automate your development process.
  • 23
    ServiceNow Reviews

    ServiceNow

    ServiceNow

    $100 per month
    1 Rating
    Digitize your workflows and they will love you for it. Your company will be more productive and your employees more engaged. ServiceNow makes work more enjoyable for employees. ServiceNow transforms old, manual ways to work into modern digital workflows so customers and employees get what they need when they need it. It's fast, simple, and easy. ServiceNow provides digital workflows that deliver great experiences and increase productivity for employees and enterprises. ServiceNow simplifies the complexity of work with a single enterprise cloud platform. The Now Platform: An intelligent, intuitive cloud platform that allows you to work smarter. You can choose from our workflows, or create your own apps. Our product portfolio is built on the Now Platform and delivers the IT, Employee, Customer, and Customer Workflows that matter. We also offer enterprise solutions to help you drive every aspect of your digital transformation. Get the amazing experiences you desire and unlock the productivity that you need. Now, native mobile capabilities are available for every day work across the enterprise.
  • 24
    Snyk Reviews
    Snyk is the leader in developer security. We empower the world’s developers to build secure applications and equip security teams to meet the demands of the digital world. Our developer-first approach ensures organizations can secure all of the critical components of their applications from code to cloud, leading to increased developer productivity, revenue growth, customer satisfaction, cost savings and an overall improved security posture. Snyk is a developer security platform that automatically integrates with a developer’s workflow and is purpose-built for security teams to collaborate with their development teams.
  • 25
    TeamCity Reviews

    TeamCity

    JetBrains

    $299.00/year
    Powerful Continuous Integration right out of the box You can define up to 100 job-based build configurations and run unlimited builds. You can run up to three builds simultaneously. If necessary, add additional agents. All TeamCity features can be used to their full potential. This product has the same features as our largest customers. You can get peer support via the forum or file a bug report or feature request and vote in our public issue tracker. Unlimited users, unlimited build times. There are no strings attached. You can run automated tests on the server before you commit your changes. This keeps your code base clean. You don't have to wait for a build finish to find out if something is wrong. To inherit parent settings and permissions, create a project tree. You can create templates with common settings to inherit multiple build configurations.
  • 26
    SonarCloud Reviews

    SonarCloud

    SonarSource

    €10 per month
    SonarCloud automatically analyzes and decorates pull request branches to maximize your throughput. To prevent undefined behavior from affecting end-users, catch tricky bugs. Security Hotspots will help you identify and fix vulnerabilities that could compromise your app. It takes just a few mouse clicks to get your code up and running. Instant access to the most recent features and enhancements. Project dashboards keep stakeholders and teams informed about code quality and releasability. Show your communities that you care about awesome by displaying project badges. Your entire stack should be concerned about code quality and security. We cover 24 languages, including C++, Java, Python, and many other. Transparency is a good thing and the trend is growing. Join the fun! Open-source projects are completely free!
  • 27
    JFrog Xray  Reviews
    DevSecOps Next Generation - Securing Your Binaries. Identify security flaws and license violations early in development and block builds that have security issues before deployment. Automated and continuous auditing and governance of software artifacts throughout the software development cycle, from code to production. Additional functionalities include: - Deep recursive scanning components, drilling down to analyze all artifacts/dependencies and creating a graph showing the relationships between software components. - On-Prem or Cloud, Hybrid, Multi-Cloud Solution - An impact analysis of how one issue in a component affects all dependent parts with a display chain displaying the impacts in a component dependency diagram. - JFrog's vulnerability database is continuously updated with new component vulnerabilities data. VulnDB is the industry's most comprehensive security database.
  • 28
    Active Directory Reviews

    Active Directory

    Microsoft

    $1 per user per month
    Active Directory stores information about objects in the network and makes it easy for administrators and users find and use this information. Active Directory uses a structured database store to organize directory information in a hierarchical, logical way. This data store, also known by the directory, contains information about Active Directory object. These objects usually include shared resources like servers, volumes and printers as well as the network user account and computer accounts. See Directory data store for more information on Active Directory. Active Directory security is integrated through logon authentication. This allows for access control to objects within the directory. Administrators can manage their directory and organization through one network logon. Authorized network users have access to all resources on the network. The management of complex networks can be made easier by policy-based administration.
  • 29
    Amazon Inspector Reviews
    Amazon Inspector is an automated security service that helps to improve security and compliance for applications deployed on AWS. Amazon Inspector automatically evaluates applications for vulnerabilities, exposure, and deviations to best practices. After performing an assessment, Amazon Inspector generates a detailed list with security findings sorted by severity. These findings can be viewed directly or as part a detailed assessment report that is available via the Amazon Inspector console, API. Amazon Inspector security assessments can help you identify vulnerabilities and unintended network access to your Amazon EC2 instances. Amazon Inspector assessments can be accessed as pre-defined rules packages that are mapped to common security best practice and vulnerability definitions.
  • 30
    Semgrep Reviews

    Semgrep

    r2c

    $40 per month
    Modern security teams "pave the way" for developers by enforcing code guardrails at every commit. Semgrep from r2c can eliminate vulnerabilities across an entire organization. Lightweight static analysis can scale your security team. Semgrep, an open-source static analysis tool, is fast and easy to use. It excels at expressing code standards without complex queries and surfacing bugs early in development. No need to navigate through abstract syntax trees or wrestle with regexes. Precise rules are as real as the code you're looking for. You can start immediately with over 900+ rules and SaaS Infrastructure to quickly get results in your editor, at commit time, or in CI. You can quickly and intuitively create custom rules to express your code standards when standard rules from the shelf are not enough. Rules look exactly like the code that you are searching. Rules for Go, for example, look like Go. You can find function calls, class and method definitions without having to learn abstract syntax trees or deal with regexes.
  • 31
    Mandiant Threat Intelligence Reviews
    Mandiant Threat Intelligence module gives organizations of all sizes visibility to the latest threats right from the frontlines. Get started today. Mandiant Threat Intelligence provides security professionals unparalleled visibility and expertise into the threats that are important to their business. Over 300 intelligence and security professionals from 22 countries have compiled our threat intelligence. They have conducted undercover adversarial searches, malicious infrastructure reconstructions, and actor identification processes. This knowledge is part of the Mandiant Intel Grid. Threat Intelligence can either be delivered as a technology or operated side-by-side by your team. You can improve your defenses by understanding the motivations, behaviors, and cybercrime actors that target your organization.
  • 32
    .NET Reviews

    .NET

    Microsoft

    Free
    Free. Cross-platform. Open source. Open source platform for developing all your apps. You can create native apps for Android and iOS from one code base. Your.NET apps can be written in C# or F#, as well as Visual Basic. You can use your skills, code, favorite libraries, and code wherever you use.NET. These videos will show you more about.NET. .NET is open-source and we are grateful for all the contributions from the community.
  • 33
    Coverity Reviews
    As code is being developed, you can address security and quality issues. Coverity®, a fast, accurate and highly scalable static analytics (SAST) tool that assists development and security teams to address security and quality issues early in the software development cycle (SDLC), track risks across the application portfolio, manage them, and ensure compliance with security standards and coding standards. Coverity is compatible with the Code Sight™, an IDE plugin that allows developers to identify and fix security and quality issues as they code. To minimize disruption, Coverity runs an incremental analysis in the background, giving developers real-time results. This includes CWE information and remediation guidance.
  • 34
    Black Duck Reviews
    Black Duck has been helping security, legal, and development teams around the world for over 15 years to manage the open source risks. Built on the Black Duck KnowledgeBase™--the most comprehensive database of open source component, vulnerability, and license information--Black Duck software composition analysis solutions and open source audits give you the insight you need to track the open source in your code, mitigate security and license compliance risks, and automatically enforce open source policies using your existing DevOps tools and processes. Black Duck offers a comprehensive software composition analysis (SCA), which helps you manage security, quality, and compliance risks that can be caused by third-party and open source code in containers and applications. Black Duck provides unparalleled visibility into third-party codes, allowing you to manage it throughout your software supply chain as well as the entire application life cycle.
  • 35
    Lacework Reviews
    Data and automation can be used to protect multi-cloud environments, prioritize risks with pinpoint accuracy, innovate with confidence, and identify and manage risk. Secure your code from the beginning to enable faster innovation. You can gain valuable security insights and build apps faster and more confidently. Our platform uses patented machine learning and behavioral analysis to automatically detect abnormal behavior and determine what is normal in your environment. 360o visibility shows you the entire environment, detecting vulnerabilities and unusual activity. Unmatched fidelity is achieved through data and analytics. Automatedly identify the most important information and eliminate unnecessary alerts. Monolithic rules are no longer necessary with an adaptive platform that is constantly learning.
  • 36
    Secure Code Warrior Reviews

    Secure Code Warrior

    Secure Code Warrior

    Secure Code Warrior is a trusted suite of secure coding tools. They are all contained in one powerful platform that shifts the focus from reactive to prevention. The platform trains and equips developers to think and act with security mindsets as they build and verify skills, get real-time advice, and monitor skill development. This allows them to ship secure code with confidence. Secure Code Warrior "starts left" within the Software Development Life Cycle. This means that the Developer is the first line of defense and prevents coding vulnerabilities from ever happening. Most modern application security tools focus on "shifting left" in the SDLC. This is an approach that supports detection as well as reaction. It detects vulnerabilities in written code and then reacts to correct them. According to the National Institute of Standards and Technology it costs 30 times more to fix and prevent vulnerabilities in committed code.
  • 37
    Brakeman Reviews
    Brakeman is a security scanner for Ruby on Rails applications. Brakeman scans your application's source code, which is a different approach to other web security scanners. Brakeman does not require you to set up your entire application stack in order to use it. Brakeman scans your application code and generates a report detailing all security issues found. Once Brakeman is installed, it doesn't require any configuration or setup. Simply run it. Brakeman is a program that only requires source code. You can create a new application using rails new and then run Brakeman to check it. Brakeman doesn't rely on spidering sites for all pages. This allows it to provide a more comprehensive coverage of an application. This includes pages that may not yet be live. Brakeman can detect security flaws before they are exploitable. Brakeman was specifically designed for Ruby on Rails applications. It can check configuration settings for best practice.
  • 38
    OpenText Fortify WebInspect Reviews
    Automated dynamic application security testing can help you find and fix web application vulnerabilities. Automated dynamic analysis of web applications and APIs can detect exploitable vulnerabilities. Support for the most recent web technologies and pre-configured policies to comply with major compliance regulations. High-powered scanning integrations allow API and single page application testing at scale. Automation and workflow integrations are key to meeting the DevOps needs. Monitoring trends and dynamic analysis are two of the ways to identify vulnerabilities. With custom scan policies and incremental support, you can achieve fast and focused results. AppSec programs should be built around solutions and not just products. Fortify's single taxonomy can be used for SAST (DAST), IAST, RASP, and DAST. WebInspect is the industry's most advanced dynamic web application testing tool, providing the coverage required to support both modern and legacy applications.
  • 39
    Node.js Reviews
    Node.js is an asynchronous JavaScript runtime that drives JavaScript calls. It's designed to create scalable network applications. Node.js will go to sleep if there isn't any work being done. This is in contrast with the more common concurrency model today, where OS threads are used. Thread-based networking is slow and difficult to use. Node.js users are not at risk of deadlocking the process because there are no locks. Nearly every function in Node.js performs I/O. The process never blocks unless the I/O is performed using synchronous Node.js methods standard library. Scalable systems are easy to create in Node.js because nothing blocks. Node.js is inspired by and similar to Ruby's Event Machine, and Python's Twisted. Node.js extends the event model a little further. It presents an event loop instead of a library as a runtime construct.
  • 40
    HackerOne Reviews
    HackerOne empowers the entire world to create a safer internet. HackerOne is the most trusted hacker-powered security platform in the world. It gives organizations access to the largest hackers community on the planet. HackerOne is equipped with the most comprehensive database of vulnerabilities trends and industry benchmarks. This community helps organizations mitigate cyber risk by finding, reporting, and safely reporting real-world security flaws for all industries and attack surfaces. U.S. Department of Defense customers include Dropbox, General Motors and GitHub. HackerOne was fifth on the Fast Company World's Top 100 Most Innovative Companies List for 2020. HackerOne is headquartered in San Francisco and has offices in London, New York City, France, Singapore, France, and more than 70 other locations around the world.
  • 41
    Qualys TruRisk Platform Reviews
    Qualys TruRisk Platform, formerly Qualys Cloud Platform. The revolutionary architecture behind Qualys IT, security and compliance cloud apps. Qualys TruRisk Platform provides a continuous, always on assessment of your global security, compliance, and IT posture. You can see all your IT assets in 2 seconds, no matter where they are located. With automated, built in threat prioritization and patching, as well as other response capabilities, this is a complete end-to-end solution. Qualys TruRisk Platform sensor are always active, whether on premises, endpoints, mobile, containers, or in the cloud. This gives you continuous visibility of your IT assets in just 2 seconds. The sensors are self-updating and centrally managed, they can be remotely deployed, and they can also be virtual appliances or lightweight agents. Qualys TruRisk Platform is an end-toend solution that allows you to avoid the costs and complexity of managing multiple security vendors.
  • 42
    Nexus Lifecycle Reviews
    Ensure that your entire software supply chain is protected. Developers can use a Chrome browser extension to see if an open-source component is vulnerable when they select from public repositories. Developers can integrate to the most popular IDEs to quickly select the best components based upon real-time intelligence, and then move to an approved version in one click. Nexus Lifecycle integrates Eclipse, IntelliJ and Visual Studio. Nexus Lifecycle integrates to GitHub, GitLab and Atlassian Bitbucket in order to automatically generate pull request for components that violate open-source policies. Developers can see which versions they should use to fix violations. No more guessing which version to upgrade to. Because Nexus Intelligence is the only automated dependency management solution that can eliminate noise, developers can trust that the PRs are accurate.
  • 43
    Checkmarx Reviews
    The Checkmarx Software Security Platform is a centralized platform for managing your software security solutions. This includes Static Application Security Testing, Interactive Application Security Testing and Software Composition Analysis. It also provides application security training and skill development. The Checkmarx Software Security Platform is designed to meet the needs of every organization. It offers a wide range of options, including on-premises and private cloud solutions. Customers can immediately start securing code without having to adapt their infrastructure to one method. The Checkmarx Software Security Platform is a powerful tool that transforms secure application development. It offers industry-leading capabilities and one powerful resource.
  • 44
    Tenable Reviews
    Tenable's Cyber Exposure Platform provides all the information, research and data that you need to find weaknesses in your entire attack surface. Tenable's market-leading vulnerability monitoring sensors allow you to see every asset on your attack surface, from cloud environments to operational technologies, containers to containers, remote workers to modern web apps. Tenable's machine learning-powered predictions reduce remediation efforts and allow you to concentrate on the most important risks. Communicating objective measures of risk and aligning business goals to security initiatives will help you drive improvements that reduce the likelihood of a cyber-related event affecting your business. These products include: Tenable.ep Tenable.io Tenable.sc Tenable.ad Tenable.ot - Tenable Lumin
  • 45
    AppSpider Reviews
    No app should be left untested or at risk. Gather the information you need to test today's constantly-changing apps. Reduce risk and get the job done sooner in the SDLC. DevOps can be helped by hand. To close any security gaps in your web applications, we offer web application security testing. Mobile, APIs, SPAs--the evolution in application technology takes place over months, not years. Is your web application security tool up-to-date? AppSpider allows you to gather all the information you need to test all apps. This will ensure that you don't have any application risks. Our dynamic application security test (DAST) solution reaches into the darkest corners of complex apps to find vulnerabilities and give you the information you need to make the right decisions faster. AppSpider will allow you to scan all apps and be prepared for anything that may come.
  • 46
    Synopsys Seeker Reviews
    Industry's first IAST solution that combines active verification and sensitive data tracking for web-based applications. Automatically retests vulnerabilities and validates that they can be exploited. This is more accurate than traditional dynamic testing. It provides a real-time overview of the top security holes. Sensitive data tracking allows you to see where your most important information is stored without adequate encryption. This helps ensure compliance with industry standards and regulations such as PCI DSS or GDPR. Seeker is easy-to-implement and scale in your CI/CD workflows. Native integrations, web APIs and plugins allow seamless integration with your tools for container-based, cloud-based and microservices-based development. Without any configuration, tuning, or custom services, you'll get precise results right out of the box.
  • 47
    OWASP ZAP Reviews
    Zed Attack Proxy is a free and open-source penetration test tool that is being maintained under the wing of the Open Web Application Security Project. ZAP is flexible and extensible and was specifically designed for testing web applications. ZAP is a "man in the middle proxy" that acts as a firewall between the browser and the web app. It can intercept and inspect the messages between the browser and web applications, modify them if necessary, and then forward those packets to the destination. It can be used both as a standalone application and as a daemon process. ZAP offers functionality for all skill levels, from developers to security testers, to security specialists, to security testers who are new to security testing. ZAP supports all major OSes and Dockers, so you don't have to stick with one OS. You can access additional functionality from the ZAP Marketplace by downloading add-ons.
  • 48
    gitleaks Reviews
    Gitleaks can be used to detect and prevent hardcoded secrets such as passwords, api keys, tokens in git repos, and other sensitive information. Gitleaks can detect secrets in your code, past and present, with an all-in-one tool. Gitleaks is available in Homebrew, Docker and Go. Gitleaks can also be downloaded in binary format for many popular OS types and platforms on the releases page. Gitleaks is also available in binary form for many popular OS types.
  • 49
    Checkov Reviews
    Verify that changes have been made to hundreds of supported resource types across all major cloud providers. A simple Python policy-as code framework can scan cloud resources for misconfigured attributes in build-time. Checkov's graph-based YAML policy allows you to analyze the relationships between cloud resources. Execute, test, or modify the runner parameters within the context of subject repository CI/CD integrations and version control integrations. Checkov allows you to create your own custom policies, providers, suppressions terms. By embedding Checkov into existing developer workflows, you can prevent misconfigurations being deployed. Automate pull/merge request annotations in your repositories. The Bridge crew platform will scan pull requests and add comments to any policy violations.
  • 50
    Veracode Reviews
    Veracode provides a holistic and scalable solution to manage security risk across all your applications. Only one solution can provide visibility into the status of all types of testing, including manual penetration testing, SAST, DAST and SCA.
  • Previous
  • You're on page 1
  • Next