Related Products
|
||||||
About
A platform for security, governance, and pipeline integrity for all your development tools & infrastructure. Harden your source control management systems (SCM), find secrets, leaks and prevent code tampering. Scan your CI/CD settings and Infrastructure-as-Code (IaC) for security misconfiguration. Identify drift between production systems IaC configurations and prevent source code tampering. Stop developers from inadvertently exposing proprietary code in public repositories, fingerprint code assets and proactively identify exposure on public sites. Inventory assets, enforce security policies, and easily demonstrate compliance across all your DevOps tools and infrastructure, both in the cloud and on-premises. Scan IaC for security misconfigurations and ensure compliance between defined IaC configurations and production infrastructure. Scan every commit or pull/merge request for hard-coded secrets and prevent them from reaching the master branch across all SCMs and programming languages.
|
About
Legit Security protects software supply chains from attack by automatically discovering and securing the pipelines, infrastructure, code and people so that businesses can stay safe while releasing software fast.
Automatically discover security issues, remediate threats and ensure the integrity and compliance of software releases. Comprehensive, visual SDLC inventory that's continually updated. Reveal unknown, misconfigured and vulnerable SDLC systems and infrastructure. Centralized visibility over location, coverage and configuration of your existing security tools and scanners. Catch insecure build actions before they can embed vulnerabilities downstream. Centralized, early prevention of sensitive data leaks, secrets and PII, before being pushed into the SDLC. Track security trends across teams and product lines to improve security posture and incentivize behavior. Get security posture at-a-glance with Legit Security Scores, Integrate your own alert and ticketing tools or use ours.
|
About
Purchase from one of five scalable packages ranging from the Starter Package of 8 forms (for small IT shops) to the Ultimate Package of 100 forms (for the enterprise size shop) containing every SDLC form/SDLC template for ultimate control of the application development process. Purchase from one of two scalable packages including the Planning Package of 10 Agile forms or the Status Package of 20 Agile forms, which includes all forms that support the Envision, Speculate, Explore and Adapt phases for all-supporting application development. Download 7 FREE MS Word Waterfall forms and Excel Waterfall forms that attest to the professional quality and standards of our entire inventory of SDLC forms and SDLC templates. These free forms are all customizable by incorporating your company name and logo, copyright notice, and much more. Then you can optionally modify tables, text and graphics to customize the forms to your specific requirements.
|
||||
Platforms Supported
Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook
|
Platforms Supported
Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook
|
Platforms Supported
Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook
|
||||
Audience
Developers and enterprises requiring a DevOps platform to optimize security, governance, and pipeline integrity across all their infrastructure
|
Audience
Enterprise SaaS security solution that protects an organization's software supply chain from attacks
|
Audience
Companies searching for a solution to manage and improve their operations
|
||||
Support
Phone Support
24/7 Live Support
Online
|
Support
Phone Support
24/7 Live Support
Online
|
Support
Phone Support
24/7 Live Support
Online
|
||||
API
Offers API
|
API
Offers API
|
API
Offers API
|
||||
Screenshots and Videos |
Screenshots and Videos |
Screenshots and Videos |
||||
Pricing
No information available.
Free Version
Free Trial
|
Pricing
No information available.
Free Version
Free Trial
|
Pricing
$195 one-time payment
Free Version
Free Trial
|
||||
Reviews/
|
Reviews/
|
Reviews/
|
||||
Training
Documentation
Webinars
Live Online
In Person
|
Training
Documentation
Webinars
Live Online
In Person
|
Training
Documentation
Webinars
Live Online
In Person
|
||||
Company InformationCycode
Founded: 2019
Israel
cycode.com
|
Company InformationLegit Security
Founded: 2020
United States
www.legitsecurity.com
|
Company InformationDocumentation Consultants
Founded: 2008
United States
sdlcforms.com
|
||||
Alternatives |
Alternatives |
Alternatives |
||||
|
|
||||||
|
|
||||||
Categories |
Categories |
Categories |
||||
Application Security Features
Analytics / Reporting
Open Source Component Monitoring
Source Code Analysis
Third-Party Tools Integration
Training Resources
Vulnerability Detection
Vulnerability Remediation
|
IT Management Features
Capacity Monitoring
Compliance Management
Event Logs
Hardware Inventory
IT Budgeting
License Management
Patch Management
Remote Access
Scheduling
Software Inventory
User Activity Monitoring
Project Management Features
Agile Methodologies
Budget Management
Client Portal
Collaboration Tools
Cost-to-Completion Tracking
Customizable Templates
Gantt Charts
Idea Management
Kanban Board
Milestone Tracking
Portfolio Management
Resource Management
Time & Expense Tracking
Traditional Methodologies
|
|||||
Integrations
Amazon Web Services (AWS)
Avalor
Axonius
CircleCI
Cobalt
Databricks Data Intelligence Platform
Flexport
GitLab
Google Cloud Platform
JFrog Artifactory
|
Integrations
Amazon Web Services (AWS)
Avalor
Axonius
CircleCI
Cobalt
Databricks Data Intelligence Platform
Flexport
GitLab
Google Cloud Platform
JFrog Artifactory
|
Integrations
Amazon Web Services (AWS)
Avalor
Axonius
CircleCI
Cobalt
Databricks Data Intelligence Platform
Flexport
GitLab
Google Cloud Platform
JFrog Artifactory
|
||||
|
|
|
|