SDLCformsDocumentation Consultants
|
||||||
Related Products
|
||||||
About
Legit Security protects software supply chains from attack by automatically discovering and securing the pipelines, infrastructure, code and people so that businesses can stay safe while releasing software fast.
Automatically discover security issues, remediate threats and ensure the integrity and compliance of software releases. Comprehensive, visual SDLC inventory that's continually updated. Reveal unknown, misconfigured and vulnerable SDLC systems and infrastructure. Centralized visibility over location, coverage and configuration of your existing security tools and scanners. Catch insecure build actions before they can embed vulnerabilities downstream. Centralized, early prevention of sensitive data leaks, secrets and PII, before being pushed into the SDLC. Track security trends across teams and product lines to improve security posture and incentivize behavior. Get security posture at-a-glance with Legit Security Scores, Integrate your own alert and ticketing tools or use ours.
|
About
Purchase from one of five scalable packages ranging from the Starter Package of 8 forms (for small IT shops) to the Ultimate Package of 100 forms (for the enterprise size shop) containing every SDLC form/SDLC template for ultimate control of the application development process. Purchase from one of two scalable packages including the Planning Package of 10 Agile forms or the Status Package of 20 Agile forms, which includes all forms that support the Envision, Speculate, Explore and Adapt phases for all-supporting application development. Download 7 FREE MS Word Waterfall forms and Excel Waterfall forms that attest to the professional quality and standards of our entire inventory of SDLC forms and SDLC templates. These free forms are all customizable by incorporating your company name and logo, copyright notice, and much more. Then you can optionally modify tables, text and graphics to customize the forms to your specific requirements.
|
|||||
Platforms Supported
Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook
|
Platforms Supported
Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook
|
|||||
Audience
Enterprise SaaS security solution that protects an organization's software supply chain from attacks
|
Audience
Companies searching for a solution to manage and improve their operations
|
|||||
Support
Phone Support
24/7 Live Support
Online
|
Support
Phone Support
24/7 Live Support
Online
|
|||||
API
Offers API
|
API
Offers API
|
|||||
Screenshots and Videos |
Screenshots and Videos |
|||||
Pricing
No information available.
Free Version
Free Trial
|
Pricing
$195 one-time payment
Free Version
Free Trial
|
|||||
Reviews/
|
Reviews/
|
|||||
Training
Documentation
Webinars
Live Online
In Person
|
Training
Documentation
Webinars
Live Online
In Person
|
|||||
Company InformationLegit Security
Founded: 2020
United States
www.legitsecurity.com
|
Company InformationDocumentation Consultants
Founded: 2008
United States
sdlcforms.com
|
|||||
Alternatives |
Alternatives |
|||||
|
|
||||||
Categories |
Categories |
|||||
Application Security Features
Analytics / Reporting
Open Source Component Monitoring
Source Code Analysis
Third-Party Tools Integration
Training Resources
Vulnerability Detection
Vulnerability Remediation
|
IT Management Features
Capacity Monitoring
Compliance Management
Event Logs
Hardware Inventory
IT Budgeting
License Management
Patch Management
Remote Access
Scheduling
Software Inventory
User Activity Monitoring
Project Management Features
Agile Methodologies
Budget Management
Client Portal
Collaboration Tools
Cost-to-Completion Tracking
Customizable Templates
Gantt Charts
Idea Management
Kanban Board
Milestone Tracking
Portfolio Management
Resource Management
Time & Expense Tracking
Traditional Methodologies
|
|||||
Integrations
Avalor
Bitbucket
Chainguard
GitHub
GitLab
JFrog Artifactory
Jenkins
Qwiet AI
Snyk
Terraform
|
Integrations
Avalor
Bitbucket
Chainguard
GitHub
GitLab
JFrog Artifactory
Jenkins
Qwiet AI
Snyk
Terraform
|
|||||
|
|
|