What Integrates with Nucleus?

Find out what Nucleus integrations exist in 2024. Learn what software and services currently integrate with Nucleus, and sort them by reviews, cost, features, and more. Below is a list of products that Nucleus currently integrates with:

  • 1
    Cisco Duo Reviews
    Top Pick

    Cisco Duo

    Cisco

    $3 per user per month
    1,285 Ratings
    See Software
    Learn More
    Secure your workforce with powerful, simple access security. We are Cisco Duo. Our modern access security system is designed to protect all users, devices, applications, so you can focus on what you do best. Secure access for all users and devices, in any environment, from any location. You will enjoy the peace of mind that only total device visibility and trust can provide. A SaaS solution that natively protects all applications and is easy to deploy, scaleable and quick to respond to threats. Duo's access security protects all applications from compromised credentials and devices. It also provides comprehensive coverage that helps you meet compliance requirements. Duo integrates natively with applications to provide flexible, user friendly security that is easy to implement and manage. It's a win-win-win for administrators, users, and IT staff. Multi-factor authentication, dynamic device trust and adaptive authentication are key components of your zero-trust journey. Secure SSO is also a part of the mix.
  • 2
    Microsoft 365 Defender Reviews
    Security teams become overwhelmed as threats become more complex, persistent, and difficult to detect. Microsoft 365 Defender is part of Microsoft's XDR Solution. It automatically analyzes threat data across domains and presents a complete picture of every attack in a single dashboard. This clarity allows defenders to focus on the most critical threats and hunt for sophisticated attacks. The powerful automation in Microsoft 365 Defender detects, stops and recovers from all types of attacks and returns the organization back to a secure state. Reduce your attack surface to eliminate persistent threats. Integrate threat data to provide a rapid and complete response. Use the time you save to use your unique expertise. Secure hybrid identities and simplify access for employees, partners, and customers.
  • 3
    Amazon EC2 Reviews
    Amazon Elastic Compute Cloud (Amazon EC2) provides secure, resizable cloud computing capacity. It was designed to make cloud computing at web scale easier for developers. Amazon EC2's web service interface makes it easy to configure and obtain capacity with minimal effort. It gives you complete control over your computing resources and allows you to run on Amazon's proven computing environment.
  • 4
    OpenText Extended ECM Reviews
    Bridge information silos, strengthen governance, and improve processes. OpenText™, Extended ECM, is an enterprise content solution that governs the lifecycle of information by securely integrating with leading enterprise apps, such as SAP, Microsoft®, Salesforce, and SAP SuccessFactors. Extended ECM brings content and processes together to provide access to information whenever and wherever it is needed, improve decision-making and drive operational effectiveness. Create bridges between the digital workspace and applications that drive ERP, HCM and BPM business processes. This will help you achieve operational excellence. A fully integrated portfolio of solutions for information management can address the most complex business or industry use cases. Use automated, defensible Governance--from document creation and capture to archiving, disposal, and more--that extends across applications such as SAP®, Salesforce®, and Microsoft®.
  • 5
    SonarQube Reviews
    SonarSource creates world-class products to ensure Code Quality and Security. SonarQube, our open-source and commercial code analysis tool - SonarQube -- supports 27 programming languages. This allows dev teams of all sizes to resolve coding issues in their existing workflows.
  • 6
    JumpCloud Reviews
    Small and medium-sized enterprises (SMEs) around the world can realize true freedom of choice by partnering with JumpCloud. JumpCloud centralizes the management and security of identities, access, and devices through its cloud-based open directory platform, enabling IT teams and managed service providers (MSPs) to remotely support Windows, Mac, Linux, and Android devices, manage identities natively or from their preferred HRIS or productivity suite, and provide access to hundreds of on-prem and cloud-based apps with a single, secure set of credentials. Start a 30 Day Trial of JumpCloud today to take advantage of the entire platform for free.
  • 7
    OneLogin Reviews
    OneLogin, a trusted identity management (IAM), solution for modern enterprises, helps you secure company information and empower your employees. OneLogin is a great solution for companies that want to simplify business logins and strengthen enterprise security. OneLogin features include single sign-on (SS), user provisioning, unified directory, user provisioning and adaptive authentication. Compliance reporting is also available.
  • 8
    Mend.io Reviews

    Mend.io

    Mend.io

    $12,000 per year
    1 Rating
    Mend.io’s enterprise suite of app security tools, trusted by leading companies such as IBM, Google and Capital One, is designed to help build and manage an mature, proactive AppSec programme. Mend.io is aware of the AppSec needs of both developers and security teams. Mend.io, unlike other AppSec tools that force everyone to use a unified tool, helps them work together by giving them different, but complementary tools - enabling each team to stop chasing vulnerability and start proactively management application risk.
  • 9
    Splunk Cloud Platform Reviews
    Splunk is a secure, reliable, and scalable service that turns data into answers. Our Splunk experts will manage your IT backend so you can concentrate on your data. Splunk's cloud-based data analytics platform is fully managed and provisioned by Splunk. In as little as two days, you can go live. Software upgrades can be managed to ensure that you have the most recent functionality. With fewer requirements, you can tap into the data's value in days. Splunk Cloud is compliant with FedRAMP security standards and assists U.S. federal agencies, their partners, and them in making confident decisions and taking decisive actions at rapid speed. Splunk's mobile apps and augmented reality, as well as natural language capabilities, can help you increase productivity and contextual insight. Splunk solutions can be extended to any location by simply typing a phrase or tapping a finger. Splunk Cloud is designed to scale, from infrastructure management to data compliance.
  • 10
    Nmap Reviews
    Nmap is an open-source software project that aims to dispel the stereotype of poorly documented open-source software. It provides a comprehensive set documentation for installing and using Nmap. This page links to Insecure.Org documentation as well as generous contributions by other parties. Nmap Network Scanning, the official guide to Nmap Security Scanner is a free and open source utility that millions of people use for network discovery, administration and security auditing. This book is suitable for all levels of security and networking professionals, from beginners to advanced hackers to explaining basic port scanning techniques. The 42-page reference guide explains each Nmap option and feature, while the rest of this book shows how to use those features to solve real-world problems. Diagrams and examples show real communication over the wire.
  • 11
    ASPHostPortal.com Reviews
    Top Pick

    ASPHostPortal.com

    ASPHostPortal.com

    $0.99 per month
    54 Ratings
    Best, affordable, reliable Windows hosting provider. ASPHostPortal.com has been voted the #1 Microsoft Spotlight Hosting Partner and Windows. ASPHostPortal.com can support the latest Microsoft technology and ASP.NET technology. Our customers have the option to choose from 12 world-class data centers: USA (Washington & Seattle), Netherlands, Amsterdam, Singapore, Hong Kong and Australia (Melbourne), France, Germany (Frankfurt), Italy, Milan, India (Chennai). We offer hosting services worldwide. Each data center can hold approximately 40,000 servers and is located in Jurong East (Singapore), Chennai, India and Hong Kong. You can be confident that your site is being maintained professionally by our network specialists, system engineers, and electricians.
  • 12
    Nessus Reviews
    Top Pick
    More than 30,000 organizations around the world trust Nessus as the most widely used security technology on the planet. It is also the gold standard in vulnerability assessment. Since the beginning, we have worked closely with the security community. Nessus is continuously optimized based on community feedback in order to provide the best vulnerability assessment solution available. Twenty years later, we are still focused on community collaboration and product innovations to provide the most complete and accurate vulnerability data. This will ensure that you don't miss critical issues that could expose your organization's vulnerabilities. Today, Nessus has been trusted by over 30,000 organizations around the world as the best vulnerability assessment tool and security technology.
  • 13
    Invicti Reviews
    Invicti (formerly Netsparker) dramatically reduces your risk of being attacked. Automated application security testing that scales like none other. Your team's security problems grow faster than your staff. Security testing automation should be integrated into every step in your SDLC. Automate security tasks to save your team hundreds of hours every month. Identify the critical vulnerabilities and then assign them to remediation. Whether you are running an AppSec, DevOps or DevSecOps program, help security and development teams to get ahead of their workloads. It's difficult to prove that you are doing everything possible to reduce your company's risk without full visibility into your apps, vulnerabilities and remediation efforts. You can find all web assets, even those that have been forgotten or stolen. Our unique dynamic + interactive (DAST+ IAST) scanning method allows you to scan the corners of your apps in a way that other tools cannot.
  • 14
    Amazon Web Services (AWS) Reviews
    Top Pick
    AWS offers a wide range of services, including database storage, compute power, content delivery, and other functionality. This allows you to build complex applications with greater flexibility, scalability, and reliability. Amazon Web Services (AWS), the world's largest and most widely used cloud platform, offers over 175 fully featured services from more than 150 data centers worldwide. AWS is used by millions of customers, including the fastest-growing startups, large enterprises, and top government agencies, to reduce costs, be more agile, and innovate faster. AWS offers more services and features than any other cloud provider, including infrastructure technologies such as storage and databases, and emerging technologies such as machine learning, artificial intelligence, data lakes, analytics, and the Internet of Things. It is now easier, cheaper, and faster to move your existing apps to the cloud.
  • 15
    Microsoft Entra ID Reviews
    Microsoft Entra ID, formerly known as Azure Active Directory, is a comprehensive cloud-based identity and access management solution that combines core directory service, application access management and advanced identity protection. Cloud identity and access management solutions connect employees, customers and partners with their apps, devices and data. Protect data and resources with adaptive access policies and strong authentication without compromising the user experience. Provide a quick, easy sign-in across your multicloud environment in order to keep your users productive and reduce time spent managing passwords. Manage all your identities, and access to your applications, in one central location, whether in the cloud, or on-premises. This will improve visibility and control.
  • 16
    GitHub Reviews
    Top Pick
    GitHub is the most trusted, secure, and scalable developer platform in the world. Join millions of developers and businesses who are creating the software that powers the world. Get the best tools, support and services to help you build with the most innovative communities in the world. There's a free option for managing multiple contributors: GitHub Team Open Source. We also have GitHub Sponsors that help you fund your work. The Pack is back. We have partnered to provide teachers and students free access to the most powerful developer tools for the school year. Work for a government-recognized nonprofit, association, or 501(c)(3)? Receive a discount Organization account through us.
  • 17
    Okta Reviews
    Top Pick
    One platform, infinite ways for you to connect with your customers and employees. Any app can be made authable. Okta can help you create secure and delightful experiences quickly. Okta's Customer ID products can be combined to create the stack you need. This will provide security, scalability and reliability. Protect and empower your employees, contractors, partners. Okta's workforce identification solutions will protect your employees no matter where they are. You will have the tools you need to automate cloud journeys and support hybrid environments. Okta is trusted by companies around the globe to protect their workforce identities.
  • 18
    PagerDuty Reviews
    Top Pick
    PagerDuty, Inc. (NYSE PD) is a leader for digital operations management. Organizations of all sizes rely on PagerDuty to deliver the best digital experience to their customers in an ever-on world. PagerDuty is used by teams to quickly identify and solve problems and to bring together the right people to prevent future ones. PagerDuty's 350+ integrations include Slack, Zoom and ServiceNow as well as Microsoft Teams, Salesforce and AWS. This allows teams to centralize their technology stack and get a holistic view on their operations. It also optimizes processes within their toolkits.
  • 19
    Microsoft 365 Reviews
    Top Pick

    Microsoft 365

    Microsoft

    $5 per user per month
    103 Ratings
    Microsoft 365 (formerly Microsoft Office 365) is now available. Outlook, OneDrive and Excel, Word, PowerPoint, Excel, PowerPoint and OneNote allow you to be more creative and achieve the things that matter with Microsoft 365 (formerly Microsoft Office 365). You get the latest Office apps, both online and desktop, when you subscribe to Microsoft 365. You can access Office apps on your desktop, tablet, and phone. * Microsoft 365 + your device + Internet = productivity wherever and whenever you are. OneDrive makes it easy to access the work you have done from anywhere, and to others when you share or collaborate. There is help at every turn. Chat, email, or call to speak with a live person. Get Office today - choose the right option for you
  • 20
    GitLab Reviews
    Top Pick

    GitLab

    GitLab

    $29 per user per month
    14 Ratings
    GitLab is a complete DevOps platform. GitLab gives you a complete CI/CD toolchain right out of the box. One interface. One conversation. One permission model. GitLab is a complete DevOps platform, delivered in one application. It fundamentally changes the way Security, Development, and Ops teams collaborate. GitLab reduces development time and costs, reduces application vulnerabilities, and speeds up software delivery. It also increases developer productivity. Source code management allows for collaboration, sharing, and coordination across the entire software development team. To accelerate software delivery, track and merge branches, audit changes, and enable concurrent work. Code can be reviewed, discussed, shared knowledge, and identified defects among distributed teams through asynchronous review. Automate, track, and report code reviews.
  • 21
    Slack Reviews
    Top Pick

    Slack

    Slack

    $6.67 per user per month
    241 Ratings
    Slack, a cloud-based project collaboration software solution that facilitates communication between teams, is designed to seamlessly integrate with other organizations. Slack offers powerful tools and services all integrated into one platform. It provides private channels for interaction within smaller teams, direct channels for sending messages to colleagues, as well as public channels that allow members to start conversations across organizations. Slack is available on Mac, Windows and Android as well as iOS apps. It offers a variety of features including chat, file sharing and collaboration, real-time notifications and two-way audio/video, screen sharing, document imaging and activity tracking and logging.
  • 22
    Jira Reviews
    Top Pick
    Jira is a project management tool that allows you to plan and track the work of your entire team. Atlassian's Jira is the #1 tool for software development teams to plan and build great products. Jira is trusted by thousands of teams. It offers a range of tools to help plan, track, and release world-class software. It also allows you to capture and organize issues, assign work, and follow team activity. It integrates with leading developer software for end-toend traceability. Jira can help you break down big ideas into manageable steps, whether they are small projects or large cross-functional programs. Organize your work, create milestones and dependencies, and more. Linking work to goals allows everyone to see how their work contributes towards company objectives, and to stay aligned with what's important. Your next step, suggested by AI. Atlassian Intelligence automatically suggests tasks to help you get your big ideas done.
  • 23
    Microsoft Teams Reviews
    Top Pick

    Microsoft Teams

    Microsoft

    $12.50 per user per month
    188 Ratings
    Teams of engaged people work together to solve today's complex business challenges. We have created an online guide to help you and your team learn the secrets of teamwork. There are no limits to what you can accomplish when you have a place where you can create and make decisions together as a team. Teams allows you to bring everything together in one shared workspace. You can chat, meet, share documents, and use business apps. Your team can get on the same page using group chat, online meetings and calling. Microsoft 365 (formerly Office 365), apps such as Word, Excel, PowerPoint and SharePoint allow you to collaborate on files. To keep your business moving forward, add in your favorite Microsoft apps as well as third-party services. Microsoft 365 provides end-to-end security and administrative control. Teams is for all types of groups. Start with the no-obligation, free version. As part of the best-in class suite of productivity tools, you can also get Team.
  • 24
    Zendesk Reviews
    Top Pick

    Zendesk

    Zendesk

    $5 per month per user
    20 Ratings
    Zendesk helps you create exceptional customer experiences. Zendesk, a leading provider of software and solutions to improve customer relationships, empowers businesses to become more reliable, flexible, scalable, and adaptable. Zendesk's products include Support, an integrated customer service solution; Chat, chat, and messaging tool; Talk and call center software; Explore to analyze and report; Inbox, shared team mailbox; Guide, a knowledgebase and self-service solution; and Connect + Outbound to support proactive campaigns.
  • 25
    SolarWinds Access Rights Manager Reviews
    SolarWinds®, Access Rights Manager is designed for IT and security administrators to quickly and easily provision, deprovision, manage, audit, audit, and audit user access rights to files, systems, and data. This allows them to help protect their organizations against the potential risks of data theft or breaches. Analyzing user authorizations and access permissions will give you a visual representation of who has access to what and when. To demonstrate compliance with many regulatory requirements, customized reports can be created. Provision and deprovision users can be done using role-specific templates. This will ensure compliance with security policies and access privilege delegation.
  • 26
    Acunetix Reviews
    Acunetix is the market leader for automated web application security testing and is the preferred tool for many Fortune 500 customers. Acunetix can detect and report on a wide range of web application vulnerabilities. Acunetix's industry-leading crawler fully supports HTML5/JavaScript and Single-page applications. This allows auditing of complex, authenticated apps. Acunetix is the only technology that can automatically detect out of-band vulnerabilities. It is available online as well as on-premise. Acunetix includes integrated vulnerability management capabilities to help enterprises manage, prioritize and control all types of vulnerability threats. These features are based on business criticality. Acunetix is compatible with popular Issue Trackers, WAFs, and is available online on Windows, Linux, and Online
  • 27
    ServiceNow Reviews

    ServiceNow

    ServiceNow

    $100 per month
    1 Rating
    Digitize your workflows and they will love you for it. Your company will be more productive and your employees more engaged. ServiceNow makes work more enjoyable for employees. ServiceNow transforms old, manual ways to work into modern digital workflows so customers and employees get what they need when they need it. It's fast, simple, and easy. ServiceNow provides digital workflows that deliver great experiences and increase productivity for employees and enterprises. ServiceNow simplifies the complexity of work with a single enterprise cloud platform. The Now Platform: An intelligent, intuitive cloud platform that allows you to work smarter. You can choose from our workflows, or create your own apps. Our product portfolio is built on the Now Platform and delivers the IT, Employee, Customer, and Customer Workflows that matter. We also offer enterprise solutions to help you drive every aspect of your digital transformation. Get the amazing experiences you desire and unlock the productivity that you need. Now, native mobile capabilities are available for every day work across the enterprise.
  • 28
    Rumble Reviews
    Rumble.com, an open-source video platform, uses a rights management technology. This rights management technology is a machine-learning DRM algorithm called Rumble Rank that automatically scales verification clearance, discovery, licensing and licensing for social (UGC). ComScore has ranked the company as a top 50 video destination in less than three years. YouTube made it possible for rights management companies to manage videos on the platform. These companies are known as Multi Channel Networks (MCNs) because of legal concerns (the Viacom suit). YouTube can no longer algorithmically scale rights management and can't offer agnostic distribution. They also can't allow publishers take part in embed revenue. While ITunes and Amazon have basic DRM's (Digital Rights Management), they are not able to handle the billions of videos being produced every day.
  • 29
    Snyk Reviews
    Snyk is the leader in developer security. We empower the world’s developers to build secure applications and equip security teams to meet the demands of the digital world. Our developer-first approach ensures organizations can secure all of the critical components of their applications from code to cloud, leading to increased developer productivity, revenue growth, customer satisfaction, cost savings and an overall improved security posture. Snyk is a developer security platform that automatically integrates with a developer’s workflow and is purpose-built for security teams to collaborate with their development teams.
  • 30
    eXtremeDB Reviews
    What makes eXtremeDB platform independent? - Hybrid storage of data. Unlike other IMDS databases, eXtremeDB databases are all-in-memory or all-persistent. They can also have a mix between persistent tables and in-memory table. eXtremeDB's Active Replication Fabric™, which is unique to eXtremeDB, offers bidirectional replication and multi-tier replication (e.g. edge-to-gateway-to-gateway-to-cloud), compression to maximize limited bandwidth networks and more. - Row and columnar flexibility for time series data. eXtremeDB supports database designs which combine column-based and row-based layouts in order to maximize the CPU cache speed. - Client/Server and embedded. eXtremeDB provides data management that is fast and flexible wherever you need it. It can be deployed as an embedded system and/or as a clients/server database system. eXtremeDB was designed for use in resource-constrained, mission-critical embedded systems. Found in over 30,000,000 deployments, from routers to satellites and trains to stock market world-wide.
  • 31
    Jira Align Reviews

    Jira Align

    Atlassian

    $75 per user per month
    Jira Align (formerly AgileCraft), connects your business strategy and technical execution. To make all work visible across your enterprise, aggregate team-level data. To determine scope, roadmaps, and dependencies across portfolios and teams, get everyone on the same page. To drive faster and more reliable outcomes, connect strategic investments with customer value to accelerate the delivery of results. Investors, analysts, employees should be made aware of the benefits of funding strategic initiatives. To drive enterprise value, connect strategy and execution to support your high-level vision and mission. Sprint work should be done in line with your company's high level strategy. Ensure that programs run smoothly and that resources are properly allocated to ensure on-time delivery. You can manage idea intake, prioritize feature backlogs, and track progress using real-time roadmaps. A framework that scales agile in your company will enable digital transformation.
  • 32
    NTT Application Security Reviews
    The NTT Application Security Platform offers all the services necessary to protect the entire software development cycle. We help organizations reap the benefits of digital transformation without worrying about security. Be smart about application security. Our application security technology is the best in its class. We constantly scan your code and detect attack vectors. NTT Sentinel Dynamic identifies and verifies all vulnerabilities in websites and web applications. NTT Sentinel Source, NTT Scout scans your entire source code and identifies vulnerabilities. They also provide remediation advice and detailed vulnerability descriptions.
  • 33
    ManageEngine Access Manager Plus Reviews
    Remote access for privileged sessions secured Remote connections that grant privileged access to business systems can be centralized, secured, and managed by us. An exclusive privileged session management solution for enterprises. Businesses need to allow privileged access to their critical systems to the right employees regardless of where they are located and what time they require access. Remote privileged users have to be granted such access poses a security and privacy risk. Legacy solutions such as VPNs are often inflexible, making it difficult for businesses to keep their data private. Modern enterprises require a solution that allows direct access to all components of the infrastructure across public and private clouds. It also monitors and records all actions and provides real-time control over privileged sessions. ManageEngine Access Manager Plus, a web-based software for managing privileged sessions, is available.
  • 34
    Titania Nipper Reviews
    Nipper, our network configuration audit tool and firewall software, helps you manage your network risks. Nipper automatically prioritizes risks for your organization by identifying vulnerabilities in routers, switches, and firewalls. Virtual modelling reduces false positives, and identifies the exact solutions to keep you secure. Nipper allows you to spend your time analyzing false positives and non-compliance. It gives you visibility of network vulnerabilities, significantly fewer false negatives to investigate, automated risk prioritization and precise remediation.
  • 35
    Markopolo Reviews

    Markopolo

    Markopolo

    $79 per month
    Use the power of AI to unify your marketing data, transform it & activate it. Every time, you'll hit the target. Focused targeting will help you reach the right audience, and make each dollar count. AI can boost the performance of your ads. Reduce your costs and maximize ROI. Smart, simple and effective. Data unlocks the power. Never miss your target audience with advanced attribution. Automate your success. Automate your success. AI's limitless power can help you break out of growth limbo. Create targeted user segments on Facebook, Google and TikTok. Lifetime ID allows you to track user activity and ensures recognition for years. Integrate with any platform to build your MarTech stack and run your business within a few clicks.
  • 36
    Axe Credit Portal Reviews
    Axe Credit Portal, axefinance’s powerful integrated software for loan origination automation, is available as a locally hosted solution or as a SaaS solution (cloud). Axefinance was founded in 2004 and is a global provider of software that focuses on credit management automation for financial institutions (traditional, Islamic, etc.). Looking for a competitive edge in productivity and customer support for all client segments: corporate, retail, and SME. axefinance is a trusted financial partner to respected global financial institutions such as Societe Generale and Al Rajhi Bank, Banque Internationale de Luxembourg, First Abu Dhabi Bank, and Banque Internationale de Luxembourg. ACP users enjoy increased profitability, greater productivity, and customer satisfaction, while staying current with ever-changing compliance regulations
  • 37
    Rapid7 InsightIDR Reviews
    The cloud architecture and intuitive interface of InsightIDR make it easy to centralize your data and analyze it across logs, network and endpoints. You can find results in hours, not months. Our threat intelligence network provides insights and user behavior analytics that are automatically applied to all your data. This helps you to detect and respond quickly to attacks. Hacking-related breaches involving hacking were responsible for 80% of all hacking-related breaches in 2017. These breaches involved stolen passwords and/or weak passwords. Your greatest asset and greatest threat are your users. InsightIDR uses machine-learning to analyze the behavior of your users and alerts you if there is any suspicious lateral movement or stolen credentials.
  • 38
    KCM GRC Platform Reviews
    There are many challenges in compliance, not enough time for audits, and it is difficult to keep up with risk assessments. KCM GRC platform makes it easy to get audits done in half time. It is also simple to use and affordable. Pre-built templates for common regulations will reduce the time it takes to satisfy requirements and meet compliance goals. You can save time by managing policy distribution and tracking attestation via campaigns. An easy-to-use wizard that uses NIST 800-30 to simplify risk management will make it easier for you to manage your risk initiatives. You can easily prequalify, assess, or conduct remediation to keep track of the vendors' risk requirements. KCM reduces the time it takes to meet all requirements and achieve compliance goals. You will spend significantly less time and money on your compliance and audit projects.
  • 39
    OpenText Fortify Static Code Analyzer Reviews
    Find and fix security problems early with the most accurate results available in the industry. The OpenText™, Fortify™, Static Code Analyzer pinpoints security vulnerabilities, prioritizes issues that are most serious, and provides detailed instructions on how to fix these. A centralized software security manager helps developers resolve issues faster. Support for 1,657 vulnerabilities categories in 33+ languages and more than 1 million APIs. Fortify's integration platform allows you to embed security into the application development tools that you use. Audit Assistant allows you to control the speed and accuracy SAST scans by adjusting the depth and minimizing false-positives. Scale SAST scans dynamically up or down in order to meet the changing needs of the CI/CD pipe. Shift-left security is achieved in a single solution for cloud-native apps, from IaC through to serverless.
  • 40
    Tenable One Reviews
    Tenable One unifies security visibility and insight across the attack surface. This allows modern organizations to isolate and eliminate priority cyber exposures, from IT infrastructure, cloud environments, critical infrastructure, and everywhere else. The only AI-powered exposure platform in the world. Tenable's leading vulnerability management sensors allow you to see every asset on your entire attack surface, from cloud environments to operational technology, infrastructure to containers and remote workers to web-apps. Tenable's machine learning-powered predictions, which include more than 20 trillion aspects related to threat, vulnerability and misconfiguration information, reduce remediation effort by allowing you to focus on the most important risks. By communicating objective measures of risks, you can drive improvements to reduce the likelihood of a business impacting cyber event occurring.
  • 41
    Brakeman Reviews
    Brakeman is a security scanner for Ruby on Rails applications. Brakeman scans your application's source code, which is a different approach to other web security scanners. Brakeman does not require you to set up your entire application stack in order to use it. Brakeman scans your application code and generates a report detailing all security issues found. Once Brakeman is installed, it doesn't require any configuration or setup. Simply run it. Brakeman is a program that only requires source code. You can create a new application using rails new and then run Brakeman to check it. Brakeman doesn't rely on spidering sites for all pages. This allows it to provide a more comprehensive coverage of an application. This includes pages that may not yet be live. Brakeman can detect security flaws before they are exploitable. Brakeman was specifically designed for Ruby on Rails applications. It can check configuration settings for best practice.
  • 42
    Bugcrowd Reviews
    Crowdcontrol's advanced security automation and analytics connect and enhance human creativity. This allows you to find and fix higher priority vulnerabilities faster. Crowdcontrol offers the insight you need to increase impact, measure success and protect your business, from intelligent workflows to robust program monitoring and reporting. Crowdsource human intelligence on a large scale to quickly identify high-risk vulnerabilities. Engage with the Crowd to take a proactive, pay for results approach. A framework to identify vulnerabilities and meet compliance will help you reduce risk and meet compliance. Find, prioritize, manage, and reduce your unknown attack surface.
  • 43
    Arachni Reviews
    Arachni is a Ruby framework that allows administrators and penetration testers to evaluate the security of modern web applications. It is modular, feature-rich, and high-performance. It is free and open-source, so you can review the source code. It is multi-platform and supports all major operating systems (MS Windows OS X, Mac OS X, and Linux). It is distributed via portable packages that allow for immediate deployment. It can be used for a variety of purposes, including a command-line scanner utility, a global high-performance grid of scanners, a Ruby library that allows for scripted audits, and a multi-user multiscan web collaboration platform. Its simple REST API makes integration easy. It can also support complex web applications that make heavy use JavaScript, HTML5, DOM manipulation, and AJAX thanks to its integrated browser environment.
  • 44
    HackerOne Reviews
    HackerOne empowers the entire world to create a safer internet. HackerOne is the most trusted hacker-powered security platform in the world. It gives organizations access to the largest hackers community on the planet. HackerOne is equipped with the most comprehensive database of vulnerabilities trends and industry benchmarks. This community helps organizations mitigate cyber risk by finding, reporting, and safely reporting real-world security flaws for all industries and attack surfaces. U.S. Department of Defense customers include Dropbox, General Motors and GitHub. HackerOne was fifth on the Fast Company World's Top 100 Most Innovative Companies List for 2020. HackerOne is headquartered in San Francisco and has offices in London, New York City, France, Singapore, France, and more than 70 other locations around the world.
  • 45
    Trustwave Reviews
    A cloud-native platform that provides enterprises unprecedented visibility and control over how security resource provisioning, monitoring and management are done in any environment. Trustwave Fusion is a cloud-based cybersecurity platform which serves as the foundation for Trustwave managed security products, services and other cybersecurity offerings. The Trustwave Fusion platform was designed to meet enterprises where they are in their operations today and in the future, as they embrace digital transformation and deal with an ever-changing security landscape. Connects enterprises and government agencies' digital footprints to a robust security cloud that includes the Trustwave data lake, advanced analysis, threat intelligence, and a wide range security products and Trustwave SpiderLabs. This is the company's elite security team.
  • 46
    Qualys TruRisk Platform Reviews
    Qualys TruRisk Platform, formerly Qualys Cloud Platform. The revolutionary architecture behind Qualys IT, security and compliance cloud apps. Qualys TruRisk Platform provides a continuous, always on assessment of your global security, compliance, and IT posture. You can see all your IT assets in 2 seconds, no matter where they are located. With automated, built in threat prioritization and patching, as well as other response capabilities, this is a complete end-to-end solution. Qualys TruRisk Platform sensor are always active, whether on premises, endpoints, mobile, containers, or in the cloud. This gives you continuous visibility of your IT assets in just 2 seconds. The sensors are self-updating and centrally managed, they can be remotely deployed, and they can also be virtual appliances or lightweight agents. Qualys TruRisk Platform is an end-toend solution that allows you to avoid the costs and complexity of managing multiple security vendors.
  • 47
    OpenVAS Reviews

    OpenVAS

    Greenbone Networks

    OpenVAS is a fully-featured vulnerability scanner. It can perform unauthenticated and authenticated testing as well as various high-level and lower-level industrial protocols. Performance tuning is available for large-scale scans. There is also an internal programming language that can be used to implement any vulnerability test. The scanner retrieves the tests to detect vulnerabilities from a feed with a long history and daily update. OpenVAS was developed by Greenbone Networks and has been moving forward since 2006. The scanner is part of the commercial vulnerability management product Greenbone Enterprise Appliance. It forms the Greenbone Vulnerability Management along with other Open Source modules.
  • 48
    Prisma Reviews
    Modern applications require a data layer. Prisma replaces the traditional ORMs. Simplified & type-safe database access. Declarative migrations and data modeling. Powerful & visual data management. Client for auto-generated and type-safe databases. Prisma client simplifies database access. It allows you to read and write data to your database with your favorite programming language. Prisma makes it simple to create GraphQL servers. Learn how to use Prisma to access your database within your resolvers.
  • 49
    Checkmarx Reviews
    The Checkmarx Software Security Platform is a centralized platform for managing your software security solutions. This includes Static Application Security Testing, Interactive Application Security Testing and Software Composition Analysis. It also provides application security training and skill development. The Checkmarx Software Security Platform is designed to meet the needs of every organization. It offers a wide range of options, including on-premises and private cloud solutions. Customers can immediately start securing code without having to adapt their infrastructure to one method. The Checkmarx Software Security Platform is a powerful tool that transforms secure application development. It offers industry-leading capabilities and one powerful resource.
  • 50
    OWASP ZAP Reviews
    Zed Attack Proxy is a free and open-source penetration test tool that is being maintained under the wing of the Open Web Application Security Project. ZAP is flexible and extensible and was specifically designed for testing web applications. ZAP is a "man in the middle proxy" that acts as a firewall between the browser and the web app. It can intercept and inspect the messages between the browser and web applications, modify them if necessary, and then forward those packets to the destination. It can be used both as a standalone application and as a daemon process. ZAP offers functionality for all skill levels, from developers to security testers, to security specialists, to security testers who are new to security testing. ZAP supports all major OSes and Dockers, so you don't have to stick with one OS. You can access additional functionality from the ZAP Marketplace by downloading add-ons.
  • Previous
  • You're on page 1
  • 2
  • Next