Best Threagile Alternatives in 2024
Find the top alternatives to Threagile currently available. Compare ratings, reviews, pricing, and features of Threagile alternatives in 2024. Slashdot lists the best Threagile alternatives on the market that offer competing products that are similar to Threagile. Sort through Threagile alternatives below to make the best choice for your needs
-
1
Crowdin
Crowdin
631 RatingsGet quality translations for your app, website, game, supporting documentation, and on. Invite your own translation team or work with professional translation agencies within Crowdin. Features that ensure quality translations and speed up the process • Glossary – create a list of terms to get consistent translations • Translation Memory (TM) – no need to translate identical strings • Screenshots – tag source strings to get context-relevant translations • Integrations – set up integration with GitHub, Google Play, API, CLI, Android Studio, and on • QA checks – make sure that all the translations have the same meaning and functions as the source strings • In-Context – proofreading within the actual web application • Machine Translations (MT) – pre-translate via translation engine • Reports – get insights, plan and manage the project Crowdin supports more than 30 file formats for mobile, software, documents, subtitles, graphics and assets: .xml, .strings, .json, .html, .xliff, .csv, .php, .resx, .yaml, .xml, .strings and on. -
2
OWASP Threat Dragon
OWASP
OWASP Threat Dragon is a modeling program that creates threat model diagrams as part a secure development cycle. Threat Dragon adheres to the principles and values of the threat modeling manifesto. It can be used to identify possible threats and determine their mitigations. It also provides visual information about the threat model components as well as threat surfaces. Threat Dragon can be used as a web or desktop application. The Open Web Application Security Project is a non-profit foundation that works to improve software security. Anyone interested in improving the security of applications can access all our tools, documents, forums and chapters at no cost. -
3
IriusRisk
IriusRisk
IriusRisk is an open Threat Modeling platform that can be used by any development and operations team – even those without prior security training. Whether your organization follows a framework or not, we can work with all the threat modeling methodologies, such as STRIDE, TRIKE, OCTAVE and PASTA. We support organisations in financial services, insurance, industrial automation, healthcare, private sector and more. IriusRisk is the industry's leading threat modeling and secure design solution in Application Security. With enterprise clients including Fortune 500 banks, payments, and technology providers, it empowers security and development teams to ensure applications have security built-in from the start - using its powerful threat modeling platform. Whether teams are implementing threat modeling from scratch, or scaling-up their existing operations, the IriusRisk approach results in improved speed-to-market, collaboration across security and development teams, and the avoidance of costly security flaws. -
4
SD Elements
Security Compass
Today, Security Compass is a pioneer in application security that enables organizations to shift left and build secure applications by design, integrated directly with existing DevSecOps tools and workflows. To better understand the benefits, costs, and risks associated with an investment in SD Elements, Security Compass commissioned Forrester Consulting to interview four decision-makers with direct experience using the platform. Forrester aggregated the interviewees’ experiences for this study and combined the results into a single composite organization. The decision-maker interviews and financial analysis found that a composite organization experiences benefits of $2.86 million over three years versus costs of $663,000, adding up to a net present value (NPV) of $2.20 million and an ROI of 332%. Security Compass is the trusted solution provider to leading financial and technology organizations, the US Department of Defense, government agencies, and renowned global brands across multiple industries. -
5
CAIRIS
CAIRIS
FreeYou can import or enter a wide variety of security, usability and requirements data to gain new insights. These include information about assets, countermeasures, personas, requirements, and architectural components. A single view cannot capture a complex system. Therefore, automatically generate 12 views of your emerging design, from different perspectives, including people, risks and requirements, architecture, physical location, and even physical locations. As your design develops, automatically generate threat models such Data Flow Diagrams. Open source intelligence about possible attacks and candidate security architectures can be used to assess your attack surface. Showcase all security, usability, design, and risk factors associated with your product. -
6
Microsoft Threat Modeling Tool
Microsoft
Microsoft Security Development Lifecycle, (SDL) is a core component of threat modeling. It's an engineering technique that you can use to identify threats, attacks and vulnerabilities that could affect your application. Threat modeling can be used to help you design your application, meet your company's security goals, and reduce risk. Microsoft Threat Modeling Tool makes it easier to threat model by providing a standard notation that allows you to visualize system components, data flows, security boundaries, and other information. It helps threat modelers to identify the classes of threats they should be considering based on their software design. The tool was designed with non-security professionals in mind. It makes threat modeling easy for all developers by providing clear guidance and instructions on how to create and analyze threat models. -
7
ThreatModeler
ThreatModeler
ThreatModeler™, an enterprise threat modeling platform, is an automated solution that reduces the effort required to develop secure applications. Today's information security professionals have a pressing need to create threat models of their organizations' data and software. We do this at the scale of their IT ecosystem and with the speed of innovation. ThreatModeler™, which empowers enterprise IT organizations, allows them to map their unique security requirements and policies directly into the enterprise cyber ecosystem. This provides real-time situational awareness of their threat portfolio and risks. InfoSec executives and CISOs gain a complete understanding of their entire attack landscape, defense-in depth strategy, and compensating control, which allows them to strategically allocate resources and scale up their output. -
8
You can't fix all the vulnerabilities. Use extensive threat intelligence and patented prioritization techniques to reduce costs, save time and keep your team focused on reducing your biggest risks. This is Modern Risk-Based Vulnerability management. We developed Risk-Based Vulnerability Management and are now defining the modern model. Show your IT and security teams which infrastructure vulnerabilities need to be remedied, and when. Our latest version shows that exploitability is measurable, and accurately calculating exploitability will help you minimize it. Cisco Vulnerability Management, formerly Kenna.VM, combines real-world exploit and threat intelligence with advanced data science in order to determine which vulnerabilities are the most risky and which can be deprioritized. Spoiler alert! Your mega-list will shrink faster than the woolen sweater-vest on a hot wash cycle.
-
9
Tutamen Threat Model Automator
Tutamantic Sec
Flexibility, ease of use, common taxonomies All the details are here. The Tutamen Threat Model Automator was designed to allow security at the architectural stage where it is most cost-effective to fix flaws. With a single input of variables, human error and inconsistencies can be reduced. A living threat model can be created that adapts to changes in the design. The Tutamen Threat Model Automator can generate multiple reports for different stakeholder group in your company. Not just for your project. It is easy to use. There is no need to learn new software. The Tutamen Threat Model Automator lets you enter threat data with tools you already use, such as Excel and Microsoft Visio. -
10
MITRE ATT&CK
MITRE ATT&CK
MITRE ATT&CK®, a global-accessible knowledge base that provides information about adversary tactics and techniques based upon real-world observations, is available at MITRE ATT&CK®. The ATT&CK knowledge database is used to develop specific threat models and methods in the private sector, government, and the cybersecurity product- and service community. MITRE's mission is to solve problems and create safer worlds by bringing together communities to improve cybersecurity. ATT&CK is free and open to all. To gather information that can be used in targeting, adversaries may perform active reconnaissance scans. Active scans involve the adversary probing victim infrastructure via network traffic. This is in contrast to other forms of reconnaissance which do not involve direct interaction. -
11
The most powerful way to monitor and protect sensitive data at large scale. The all-in-one data security solution that doesn't slow down will help you reduce risk and detect abnormal behavior. You get a platform, a team, an approach, and a plan that gives you every advantage. Classification, access governance, and behavioral analytics all work together to secure data, prevent threats, and ease the burden of compliance. Our proven method to monitor, protect and manage your data is backed by thousands of successful rollouts. Hundreds of security professionals are able to create advanced threat models, update policies, and assist in incidents, allowing you to concentrate on other priorities.
-
12
Podman
Containers
What is Podman? Podman is a daemonless container engine that allows you to develop, manage, and run OCI Containers on your Linux System. Containers can be run in root or rootless mode. Simply put: alias docker=podman. Manage containers, pods, and container images. -
13
ARIA ADR
ARIA Cybersecurity Solutions
ARIA Advanced Detection and Response is an automated AI SOC solution that integrates seven security tools. This includes SIEMs and IDS/IPSs as well as EDRs, Threat Intel Tools, EDRs and Threat Intel tools. Organizations will no longer need to compromise on the threat surface coverage or struggle with integrating and maintaining disparate tools at a high cost and low return. ARIA ADR's AI-powered threat models are machine learning-powered and can detect and stop the most dangerous network-borne threats, such as ransomware and malware, intrusions and zero-day attacks, APTs, and more. This is done in just minutes. This is a significant advantage over traditional security operations methods that are more noisy than they are dangerous and require highly-trained security personnel. ARIA ADR can also be accessed via the cloud, which is a great option for companies looking to start. -
14
CloudKnit
CloudKnit
Open-source platform for managing cloud environments. Dashboards are included to help visualize and monitor environments. YAML is an easy-to-read format for defining entire environments in a declarative manner. Declarative format to define entire environments. It allows organizations to define whole environments in a declarative format. Provision them, detect drift and reconcile it, and teardown the environments when they are no longer required. Dashboards are included to help visualize and monitor environments. Environment as Code (EaC), an abstraction of cloud-native software, provides a declarative method to define an entire environment. It has a control plan that manages the environment's state, including resource dependencies and drift detection and reconciliation. CloudKnit, an open-source platform for managing cloud environments, is a progressive delivery platform. We currently support an easy-to-use YAML format to define the environment. -
15
Drone
Harness
Configuration as code. Pipelines are created with a simple, readable file that is then committed to your git repository. Each step of a pipeline is executed in a Docker container, which is automatically downloaded at runtime. Any source code manager. Drone.io seamlessly integrates with multiple source code management system, including Bitbucket and GitHubEnterprise. Any platform. Drone natively supports multiple operating system and architectures, including Linux x64/ARM/ARM64/Windows x64. Any language. Drone can communicate with any language, database, or service that runs within a Docker container. You can choose from thousands of Docker images, or create your own. Make and share plugins. Drone uses containers to drop preconfigured steps into your pipeline. You can choose from hundreds of pre-made plugins or create your own. Drone allows for advanced customization. You can create custom access controls, approve workflows, secret management, yaml syntax extension, and other features using drone. -
16
Simple templates make it easy to create and manage cloud resources. Google Cloud Deployment Manager allows users to specify all resources required for their application in a declarative format using Python or Jinja2 templates. To parameterize the configuration, you can use Jinja2 or Python templates. This allows reuse of common deployment paradigms like an auto-scaled instance group that is load balanced and auto-scaled. Consider your configuration code and use it to perform repeatable deployments. The process of creating resources can be repeated repeatedly by creating configuration files that define the resources. Many tools use an imperative approach. This requires the user to specify the steps required to create and configure resources. Declarative approaches allow the user to define the configuration and the system will take the necessary steps. Instead of deploying each resource individually, the user can concentrate on the resources that make up the application or service.
-
17
Kestra
Kestra
Kestra is a free, open-source orchestrator based on events that simplifies data operations while improving collaboration between engineers and users. Kestra brings Infrastructure as Code to data pipelines. This allows you to build reliable workflows with confidence. The declarative YAML interface allows anyone who wants to benefit from analytics to participate in the creation of the data pipeline. The UI automatically updates the YAML definition whenever you make changes to a work flow via the UI or an API call. The orchestration logic can be defined in code declaratively, even if certain workflow components are modified. -
18
Kubescape
Armo
$0/month Kubernetes is an open-source platform that provides developers and DevOps with an end-to-end security solution. This includes security compliance, risk analysis, security compliance and RBAC visualizer. It also scans images for vulnerabilities. Kubescape scans K8s clusters, Kubernetes manifest files (YAML files, and HELM charts), code repositories, container registries and images, detecting misconfigurations according to multiple frameworks (such as the NSA-CISA, MITRE ATT&CK®), finding software vulnerabilities, and showing RBAC (role-based-access-control) violations at early stages of the CI/CD pipeline. It instantly calculates risk scores and displays risk trends over time. Kubescape is one of the most popular Kubernetes security compliance tools for developers. Its easy-to-use interface, flexible output formats and automated scanning capabilities have made Kubescape one of the fastest growing Kubernetes tools. This has saved Kubernetes admins and users precious time, effort and resources. -
19
Canonical Juju
Canonical
Enterprise apps will have better operators thanks to a full application graph, declarative integration for legacy estate and Kubernetes, and a full app graph. Juju operator integration allows us keep each operator as simple and consistent as possible, then we compose them to create rich topologies for complex scenarios that support complex scenarios with less YAML. Large-scale operations code can also be governed by the UNIX philosophy of "doing one thing right". The benefits of clarity as well as reuse are the same. It is important to be small. Juju allows you the option to use the same operator pattern across your entire estate, even legacy apps. Model-driven operations significantly reduce maintenance and operation costs for traditional workloads, without the need to re-platform to K8s. Once mastered, legacy apps can be made multi-cloud-ready. The Juju Operator Lifecycle Manager, (OLM), uniquely supports both machine-based and container-based apps with seamless integration. -
20
YAML
YAML
FreeYAML: YAML Isn't Markup Language™. YAML is a human-friendly data Serialization Language for all Programming Languages. -
21
Flyte
Union.ai
FreeThe workflow automation platform that automates complex, mission-critical data processing and ML processes at large scale. Flyte makes it simple to create machine learning and data processing workflows that are concurrent, scalable, and manageable. Flyte is used for production at Lyft and Spotify, as well as Freenome. Flyte is used at Lyft for production model training and data processing. It has become the de facto platform for pricing, locations, ETA and mapping, as well as autonomous teams. Flyte manages more than 10,000 workflows at Lyft. This includes over 1,000,000 executions per month, 20,000,000 tasks, and 40,000,000 containers. Flyte has been battle-tested by Lyft and Spotify, as well as Freenome. It is completely open-source and has an Apache 2.0 license under Linux Foundation. There is also a cross-industry oversight committee. YAML is a useful tool for configuring machine learning and data workflows. However, it can be complicated and potentially error-prone. -
22
APIFuzzer
PyPI
FreeAPIFuzzer is a tool that reads your API description, and fuzzes each field step-by-step to determine if your application will be able to handle the fuzzed parameter. It does not require any coding. Parse API definitions from a remote URL or local file. Support for JSON and YAML files. All HTTP methods can be used. Support for fuzzing the request body, path parameter, query string and request header. Supports CI integration and relies on random mutations. Create JUnit XML format for test reports. Send a request using an alternative URL. Support HTTP basic authentication from the configuration. Save the JSON formatted report of the failed tests into the preconfigured folder. -
23
rkt
Red Hat
rkt is an application containers engine that was developed for modern production cloud environments. It is pod-native, pluggable execution environments, and a well-defined area that allows for easy integration with other systems. The pod is the core execution unit of RKT. It is a collection or applications that execute in a shared context. (Pods in Kubernetes orchestration software are synonymous with rkt's pods). rkt lets users apply different configurations (such as isolation parameters) at both the pod-level and per-application levels. Rkt's architecture allows each pod to execute in the Unix process model (i.e. There is no central daemon, and each pod executes in its own isolated environment. rkt implements an open container format called the App Container (appc spec), but can also execute other container images such as those created with Docker. -
24
GenRocket
GenRocket
Enterprise synthetic test data solutions. It is essential that test data accurately reflects the structure of your database or application. This means it must be easy for you to model and maintain each project. Respect the referential integrity of parent/child/sibling relations across data domains within an app database or across multiple databases used for multiple applications. Ensure consistency and integrity of synthetic attributes across applications, data sources, and targets. A customer name must match the same customer ID across multiple transactions simulated by real-time synthetic information generation. Customers need to quickly and accurately build their data model for a test project. GenRocket offers ten methods to set up your data model. XTS, DDL, Scratchpad, Presets, XSD, CSV, YAML, JSON, Spark Schema, Salesforce. -
25
DbGate
DbGate
FreeDbGate offers a powerful data editor and browser. This allows you to quickly modify or find what you need even when you are using complex relations. A data browser is more efficient than typing a query manually or using a query designer in most cases. However, you can still use all variants of DbGate. The database compare tool is extremely fast. It uses cached DB models and can be compared to other DB comparison tools. You can browse and filter objects based on type (table view, procedure function), and compare status (equal, modified, added, deleted). You can choose objects to be synchronized into a target database. The preview of the deploy script is displayed to the user. It must be confirmed before you apply. The DB model can be downloaded from the database to a set YAML files describing table structures (one YAML file per table) and SQL files describing additional database objects (table view, procedure function). -
26
DQOps
DQOps
$499 per monthDQOps is a data quality monitoring platform for data teams that helps detect and address quality issues before they impact your business. Track data quality KPIs on data quality dashboards and reach a 100% data quality score. DQOps helps monitor data warehouses and data lakes on the most popular data platforms. DQOps offers a built-in list of predefined data quality checks verifying key data quality dimensions. The extensibility of the platform allows you to modify existing checks or add custom, business-specific checks as needed. The DQOps platform easily integrates with DevOps environments and allows data quality definitions to be stored in a source repository along with the data pipeline code. -
27
Microtica
Microtica
$99/month Pipelines are the heart of Microtica's CI process. They can automate your workflow. A pipeline is used to automate the build of all components and microservices. A microtica.yaml file located in the root folder of the repository is the single source of truth that defines the build process. User customization is a key feature. Every user can define how their build process works and what commands they run by changing the microtica.yaml. -
28
Styra
Styra
$70 per monthOpen Policy Agent is the fastest and most efficient way to implement Open Policy Agent across Kubernetes Microservices and Custom APIs. This works for admins as well as developers. You need to restrict who can access your pipeline based on who's currently on call. It's easy. You can define which microservices have access to PCI data. We can help. Do you need to prove compliance across your clusters with regulations? It's easy. Styra Declarative Authorization Service, which is open-source and declarative by design, provides a turnkey OPA control plan to reduce risk, human error, and speed up development. A built-in library for policies. Our OPA project allows you to customize and implement authorization policies-as-code. Pre-running allows you to validate and monitor policy changes before they are committed, which helps reduce risk before deployment. Declarative model describes the desired state to prevent security drift, and eliminate errors before they can occur. -
29
Saifr
Saifr
A human-machine partnership allows computers to perform monotonous tasks, allowing humans to concentrate on the creative, exciting details. Saifr started with access to millions upon millions of documents that represented the work of compliance and regulatory experts and thousands upon thousands of content creators. These data were the basis for Saifr's Natural Language Understanding models (NLU), and they are what makes Saifr unique in being able to mitigate regulatory and reputational risks. Traditional content workflows are inefficient and can be hampered by too many email hand-offs and touchpoints. Saifr's solutions encourage collaboration between professionals within and outside of the organization. This results in compliant materials that can be created, reviewed, approved and filed more efficiently. Our solutions allow companies to create compliant public communications more quickly. -
30
Hdiv
Hdiv Security
Hdiv solutions allow you to provide holistic, all-in one solutions that protect applications from within and simplify implementation across a variety of environments. Hdiv eliminates the need to have security experts in teams and automates self-protection to significantly reduce operating costs. Hdiv protects applications right from the beginning. It works with applications during development to find the root causes of risk, and after they are put into production. Hdiv's lightweight, integrated approach doesn't require additional hardware and can be used with your default hardware. Hdiv scales with your application, removing the extra hardware cost associated with security solutions. Hdiv uses a runtime dataflow technique that reports the file and line number of security flaws in the source code to detect them before they can be exploited. -
31
ShuttleOps
ShuttleOps
DevOps teams now have one platform to build, deploy, and manage applications. This allows them to quickly and securely get updates, fixes, and features to customers. One platform. Many integrations. Rapid scalability. ShuttleOps is an open-source continuous delivery platform that allows for rapid deployment, deployment, and management of complex distributed applications. ShuttleOps is a drag-and-drop interface that allows organizations and teams to quickly adopt and scale DevOps strategies. ShuttleOps is compatible with Docker Container registries, Chef Habitat, and custom build configurations. This means that you can deploy YAML-free, Persistent volume claims, Ingress rules, log management, and YAML-free deployments out of the box. You can create custom workflows that include acknowledgement and approval gates. Real-time notifications are sent to Slack and email. -
32
Archi
Phil Beauvoir
Open Source modeling toolkit to create ArchiMate sketches and models. Enterprise Architects worldwide use this toolkit. The Archi®, modeling toolkit is designed for all levels of Enterprise Architects. It is a low-cost solution for users who are just starting to use the ArchiMate modelling language or those who are looking for an open source, cross-platform ArchiMate model tool for their company. The ArchiMate®, an independent Enterprise Architecture standard, supports the analysis, visualization, and description of architecture within and between business domains. ArchiMate is a standard hosted by The Open Group® and fully aligned to TOGAF®. ArchiMate assists stakeholders in assessing the impacts of design changes and choices. -
33
Startupxplore
Startupxplore
Startupxplore, Spain's leading platform for startup investment, is the best. It invests in high-potential companies between seed rounds or series A. This platform offers entrepreneurs the seriousness and support that venture capital provides, but with the agility of a business angel. The +12k registered investors invest in Startupxplore as well. It is also home to the largest Spanish startup community, with over +28k entrepreneurs, accelerators, and other players from the entrepreneurial world. Startupxplore's main goal is to help its users have a well-diversified and balanced investment portfolio in quality emerging businesses. We are very thorough in our company analysis and risk mitigation. -
34
Velite
Velite
Velite is a tool that creates a type-safe layer of data by transforming content files, such as Markdown or MDX, YAML or JSON, into the data layer for an application using Zod schemas. It provides out-of-the box functionality that allows developers to move content in a designated folder and define collection schemas. They can then run Velite and use the output data for their applications. Velite provides type safety for the entire application by generating TypeScript types and validating content fields based on Zod Schemas. Its lightweight, efficient design results in faster startup times and better performance. Velite also includes built-in features for asset processing, such as relative paths resolving, image optimization and content management. Lightweight, powerful, yet efficient, faster startup and better performance. Built-in assets such as relative path resolution, image optimization, and more. -
35
IBM watsonx.governance
IBM
$1,050 per monthEvery model requires governance to ensure ethical and responsible decision-making in the business. IBM® watsonx.governance™ toolkit for AI governance allows you to direct, manage and monitor your organization's AI activities. It uses software automation to enhance your ability to mitigate risk, manage regulatory requirements, and address ethical concerns when it comes to both generative AI (ML) and machine learning models. Access automated and scalable compliance, governance and risk tools that cover financial management, IT governance, IT governance, operational risk and policy management. Proactively detect model risks and mitigate them while translating AI regulations to enforceable policies that can be enforced automatically. -
36
Canonical Netplan
Canonical Netplan
Netplan is a utility that allows you to easily configure networking on a Linux system. Simply create a YAML description that describes the network interfaces you need and how each should be configured. Netplan will then generate the configuration necessary for your chosen renderer. This will allow NetworkManager to manage all devices (and by default any ethernet device with DHCP will be displayed once a carrier is detected). Netplan reads network configurations from /etc/netplan/*.yaml, which can be written by administrators, installers or cloud image instantiations. Netplan generates configuration files for backend purposes in /run during early boot to give control to a specific networking daemon. -
37
System Composer
MathWorks
$740 per yearSystem Composer™, enables the specification, analysis, and modeling of architectures for model-based system engineering and software architecture modelling. System Composer allows you to assign requirements and refine an architecture model that can be used to design and simulate in Simulink®. You can create architecture models that include components and interfaces directly, import them from other tools, or use the Simulink architectural elements to populate them. Multiple architecture models can be used to describe your system and establish direct relationships among them using model-to-model allocations. Sequence diagrams, state charts, and Simulink models can capture the behavior of a system. Simulink and embedded coder® allow you to simulate the execution order of components and generate code using your software architecture models. -
38
Transforming the way professionals work by combining artificial intelligence with security and risk mitigation with market-leading document and email management. The iManage Cloud, a modern cloud architecture, is designed to meet the needs of professional product management. Users can work efficiently on both high-speed and low-bandwidth connections, as well as when they are disconnected. iManage Cloud provides a user-friendly experience when working with large files. It is fully secured and has back-up across a network worldwide. Rapid onboarding, a proven deployment method, and annual subscription pricing will increase your organization's agility.
-
39
Maxeler Technologies
Maxeler Technologies
Maxeler high performance dataflow solutions are easy to integrate into production data centres and allow for easy programming and management. Maxeler high performance dataflow solutions can be integrated into production server environments and support standard operating systems as well as management tools. Our management software coordinates resource usage, scheduling, and data movement within the dataflow computing environment. Maxeler dataflow nodes can run production-standard Linux distributions, including Red Hat Enterprise 4 or 5. Any accelerated application can run on a Maxeler Node as a standard Linux executable. Programmers can create new applications by linking existing dataflow engine configurations into their code and then calling simple functions interfaces. MaxCompiler offers complete support for debugging during development, including a high speed simulator to verify code accuracy before generating an implementation. -
40
Steadybit
Steadybit
$1,250 per monthOur experiment editor makes it easier to reach reliability. You have complete control over your experiments. All are designed to help you achieve goals and safely implement chaos engineering in your organization. Steadybit extensions allow you to add new targets, checks, and attacks. The targets are easily selected using a unique discovery and selection procedure. Export and import experiments in JSON or YAML to reduce friction between teams. Steadybit’s landscape allows you to see the dependencies and relationships of your software. This is a great way to start your chaos engineering journey. Divide your system(s), using the powerful query language based on the information you use elsewhere, into different environments. Assigning environments to specific teams and users to prevent unwanted damage. -
41
ACTICO Credit Risk Platform
ACTICO
Credit Risk Platform - This platform is designed to manage credit risk assessment and credit approvals via a secure, cloud-based platform. The Credit Risk Platform streamlines credit risk assessment and credit approval workflows, allowing you to make better, faster credit decisions in commercial and SME lending. The platform allows for the creation and execution of rating models in a centralized, flexible framework. Access to a large number of industry-leading external credit scorecards can be accessed plug-and-play, either as a benchmark or as an alternative to the internal models. The solution is built on the Salesforce(TM platform and offers banks and financial institutions a cloud-based, secure solution that increases the speed and efficiency of risk assessment processes. -
42
AppVeyor
AppVeyor
$29 per monthSupport for Bitbucket and GitLab Enterprise, Bitbucket and GitLab, Azure Reposs, Kiln, Gitea and custom repos. Configure builds using versioned YAML and UI. Clean, isolated build environment for each build. NuGet server and deployment built-in. Branch and PR builds are available to help you with your development workflow. Support from professionals and a vibrant community. We offer continuous integration tools for Windows developers. This service is free for open-source projects. We also offer subscriptions for private projects. Your apps can be built, tested, and deployed faster on any platform. Start in minutes, works on any source control, builds VMs quickly with admin/sudo. Multi-stage deployments, Windows, Linux, and macOS support. Install on Windows, Linux, and Mac in minutes. You can run unlimited pipelines locally, in Docker or in any cloud. Unlimited users, projects, jobs and clouds are all free. -
43
Kustomize.io
Kustomize.io
FreeKustomize traverses Kubernetes manifests to add, remove, or update configuration options without having to fork. It is available as a standalone binary or as a native feature in kubectl. Configuration customization can be done in a declarative way. You can manage an unlimited number of Kubernetes configurations. This binary can be used as a standalone binary to allow for integration with other services. Every artifact kustomize uses can be validated and processed in plain YAML. Kustomize encourages a fork/modify/rebase workflow. -
44
Alfabet
Software AG
IT is being challenged by digital transformation. You will be responsible for mastering new tech, working with the business to develop digital strategies, and recommending strategic investments in the future. How can you do more confidently? Alfabet is the industry leader in enterprise architecture management, IT portfolio administration and IT planning tools. Industry-analyst-recognized Alfabet helps you invest in IT wisely by managing your current IT portfolio and collaboratively planning for the future. The richest meta-model to manage your IT projects is the one that includes portfolio rationalization, strategy alignment and API management, Agile innovation management, cloud management, project execution and M&A due diligence, risk management as well as GDPR, IT governance, and more. Your digital transformation requires stakeholders to get involved. Alfabet can be customized to appeal to different stakeholder groups in terms of look and feel, information relevance, and clear procedures for task execution. Make sure to create stakeholder-relevant reports, workflows, and roadmaps. -
45
Private AI
Private AI
Share your production data securely with ML, data scientists, and analytics teams, while maintaining customer trust. Stop wasting time with regexes and free models. Private AI anonymizes 50+ entities PII PCI and PHI in 49 languages, with unmatched accuracy, across GDPR, CPRA and HIPAA. Synthetic data can be used to replace PII, PCI and PHI text in order to create model training data that looks exactly like production data. This will not compromise customer privacy. Remove PII in 10+ file formats such as PDFs, DOCXs, PNGs, and audios to protect customer data and comply privacy regulations. Private AI uses the most advanced transformer architectures for remarkable accuracy right out of the box. No third-party processing required. Our technology outperforms every other redaction service available on the market. Please feel free to request a copy of the evaluation toolkit for you to test with your own data. -
46
EGroupware
EGroupware
EGroupware provides an online calendar to manage appointments, contacts with CRM, tasks and project management. It also offers an online file server. These basic functions can be enhanced by chat, video conferencing, remote desktop modules, and other features to create a sophisticated home office system. Groupware allows you to share all information through an online company platform. It runs in any browser, regardless of your operating system. It also works well on tablets and smartphones in its mobile version. EGroupware is an open-source software that focuses on customer needs and incorporates the contributions of the community. EGroupware is equally useful for SMEs (small- and medium-sized enterprises), city administrators, as well as universities, education, research institutions, and other institutions. Free trial of the online teamwork tool! -
47
Trace
Trace Data & Privacy
Our SaaS platform powers your data audit, information governance and on-demand compliance toolkit. It is a reliable, secure, and highly available app that leverages Microsoft's best-in-class infrastructure. Trace's platform can be offered as a managed service. This allows you to combine the best of tech tools with human support for a complete compliance solution. DPOs can also access our SaaS plan. Trace's app and expert assistance helps organisations comply, mitigate data and legal risks, and streamline cloud due diligence. Smart compliance documents, collaborative workflows and e-signatures are just some of the many benefits that Trace's app offers. It provides visual, demonstrable and on-demand compliance reporting for you as well as your stakeholders. Once you have created a model of your data using our data map tool, you can see exactly where it is located. Our unique global data visualiser will allow you to see the locations of data held by third parties, assess its suitability, and identify privacy risks. -
48
RelationalAI
RelationalAI
RelationalAI is a next generation database system that allows intelligent data applications to be built on relational knowledge graphs. Data-centric application design combines logic and data into reusable models. Intelligent data applications can understand and make use each relation in a model. Relational provides a knowledge graph system that allows knowledge to be expressed as executable models. These models can easily be extended using declarative, human-readable software. RelationalAI's expressive and declarative language results in a 10-100x decrease in code. By involving non-technical domain specialists in the creation process, and automating complex programming tasks, applications are created faster and with better quality. The extensible graph data model is a foundation for data-centric architecture. Integrate models to uncover new relationships and reduce barriers between applications. -
49
SQL Server Data Tools (SSDT)
Microsoft
SQL Server Data Tools (SSDT), transforms database development by introducing an ubiquitous declarative model that spans all phases of database development within Visual Studio. To build, debug, maintain and refactor databases, you can use SSDT TransactSQL design capabilities. You can work directly with a connected database instance, or with a database project. Developers can use familiar Visual Studio tools for database development. Tools include code navigation, IntelliSense and language support that is similar to what is available for Visual Basic and C#. Also, platform-specific validation and debugging are possible. Declavicive editing can be done in Transact-SQL. SSDT also offers a visual Table Designer that allows you to create and edit tables in any of your database projects or connected databases. Version control can be used to manage all files while you work on your database projects in a group-based environment. -
50
Statiq
Statiq
This static site generator comes with batteries and is suitable for most uses. You can use it straight out of the box or add custom pipelines, data sources, layouts, and configurations. Statiq Web now supports generating.NET API documentation. This allows you to extend the functionality of a general-purpose static site generator. Statiq Docs and Statiq Web are the framework that allows you to easily create a custom static generator application for your specific needs. Statiq supports Markdown and Razor, along with plain HTML. More languages like Handlebars/Mustache or Liquid will be added soon. Statiq can read and interpret a variety data formats, including YAML, JSON and XML. It is designed to be able to integrate any data format into any use. You can choose the data format that you are most comfortable with, from data files to front matter.