Introducing G2.ai, the future of software buying.Try now

Best Application Security Posture Management (ASPM) Software

Lauren Worth
LW
Researched and written by Lauren Worth

Application security posture management (ASPM) is a comprehensive cybersecurity solution that focuses on safeguarding software applications from potential threats. The process involves continuously assessing, monitoring, and enhancing an organization's application security posture. ASPM encompasses various technologies to identify and mitigate security risks in software applications. It helps companies with visibility, risk identification, and remediation recommendations. This software aids security teams, DevOps, and IT administration to manage compliance, prioritize risks, and handle vulnerabilities.

Application security posture management (ASPM) solutions offer unique capabilities that distinguish them from other cybersecurity tools like security information and event management (SIEM) systems and vulnerability scanners. Unlike these tools, which identify, assess, and mitigate security risks, ASPM is specifically tailored to the security of software applications. It provides a holistic picture of application security health and integrates with the development lifecycle for proactive security measures.

To qualify for inclusion in the ASPM category, a product must:

Help prioritize and address the most critical security issues and recommend how to remediate vulnerabilities and weaknesses
Scan and analyze software applications to identify vulnerabilities, misconfigurations, and weaknesses in the code, libraries, and configurations
Actively monitor applications for signs of malicious activity and potential security breaches, using techniques such as behavioral analysis and anomaly detection
Help organizations ensure that their applications adhere to industry standards and compliance requirements by assessing and reporting on security posture against these benchmarks

Best Application Security Posture Management (ASPM) Software At A Glance

Easiest to Use:
Best Free Software:
Show LessShow More
Best Free Software:

G2 takes pride in showing unbiased reviews on user satisfaction in our ratings and reports. We do not allow paid placements in any of our ratings, rankings, or reports. Learn about our scoring methodologies.

No filters applied
28 Listings in Application Security Posture Management (ASPM) Available
(51)4.8 out of 5
2nd Easiest To Use in Application Security Posture Management (ASPM) software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Security should be an integral part of the software development process, not an afterthought. Founded by Neatsun Ziv and Lion Arzi, two former Check Point executives, OX is the first and only Active A

    Users
    • Security Engineer
    Industries
    • Financial Services
    • Information Technology and Services
    Market Segment
    • 63% Mid-Market
    • 25% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • OX Security Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Features
    27
    Ease of Use
    24
    Customer Support
    22
    Integration Support
    22
    Security
    22
    Cons
    Missing Features
    9
    Integration Issues
    7
    Limited Features
    6
    Complexity
    5
    Inadequate Reporting
    5
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2021
    HQ Location
    New York, USA
    LinkedIn® Page
    www.linkedin.com
    164 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Security should be an integral part of the software development process, not an afterthought. Founded by Neatsun Ziv and Lion Arzi, two former Check Point executives, OX is the first and only Active A

Users
  • Security Engineer
Industries
  • Financial Services
  • Information Technology and Services
Market Segment
  • 63% Mid-Market
  • 25% Enterprise
OX Security Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Features
27
Ease of Use
24
Customer Support
22
Integration Support
22
Security
22
Cons
Missing Features
9
Integration Issues
7
Limited Features
6
Complexity
5
Inadequate Reporting
5
Seller Details
Year Founded
2021
HQ Location
New York, USA
LinkedIn® Page
www.linkedin.com
164 employees on LinkedIn®
(36)4.7 out of 5
Optimized for quick response
1st Easiest To Use in Application Security Posture Management (ASPM) software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Jit is redefining application security by introducing the first Agentic AppSec Platform, seamlessly blending human expertise with AI-driven automation. Designed for modern development teams, Jit empow

    Users
    No information available
    Industries
    • Computer Software
    • Financial Services
    Market Segment
    • 53% Mid-Market
    • 36% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Jit Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    19
    Security
    18
    Integration Support
    15
    Customer Support
    14
    Features
    13
    Cons
    UX Improvement
    6
    Integration Issues
    4
    Limited Cloud Integration
    4
    Limited Features
    4
    Complexity
    3
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    jit
    Company Website
    Year Founded
    2021
    HQ Location
    Boston, MA
    Twitter
    @jit_io
    521 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    113 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Jit is redefining application security by introducing the first Agentic AppSec Platform, seamlessly blending human expertise with AI-driven automation. Designed for modern development teams, Jit empow

Users
No information available
Industries
  • Computer Software
  • Financial Services
Market Segment
  • 53% Mid-Market
  • 36% Small-Business
Jit Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
19
Security
18
Integration Support
15
Customer Support
14
Features
13
Cons
UX Improvement
6
Integration Issues
4
Limited Cloud Integration
4
Limited Features
4
Complexity
3
Seller Details
Seller
jit
Company Website
Year Founded
2021
HQ Location
Boston, MA
Twitter
@jit_io
521 Twitter followers
LinkedIn® Page
www.linkedin.com
113 employees on LinkedIn®

This is how G2 Deals can help you:

  • Easily shop for curated – and trusted – software
  • Own your own software buying journey
  • Discover exclusive deals on software
(55)4.7 out of 5
Optimized for quick response
3rd Easiest To Use in Application Security Posture Management (ASPM) software
Save to My Lists
Entry Level Price:Free
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Aikido is an application security (AppSec) platform specifically designed for developers who prioritize their coding tasks over managing security alerts. Our innovative solution consolidates nine esse

    Users
    No information available
    Industries
    • Computer Software
    • Information Technology and Services
    Market Segment
    • 78% Small-Business
    • 22% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Aikido Security Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    28
    Easy Integrations
    24
    Easy Setup
    23
    Security
    23
    Customer Support
    22
    Cons
    Limited Features
    7
    Missing Features
    7
    Improvement Needed
    6
    UX Improvement
    6
    False Positives
    5
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2022
    HQ Location
    Ghent, Belgium
    Twitter
    @AikidoSecurity
    2,538 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    83 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Aikido is an application security (AppSec) platform specifically designed for developers who prioritize their coding tasks over managing security alerts. Our innovative solution consolidates nine esse

Users
No information available
Industries
  • Computer Software
  • Information Technology and Services
Market Segment
  • 78% Small-Business
  • 22% Mid-Market
Aikido Security Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
28
Easy Integrations
24
Easy Setup
23
Security
23
Customer Support
22
Cons
Limited Features
7
Missing Features
7
Improvement Needed
6
UX Improvement
6
False Positives
5
Seller Details
Company Website
Year Founded
2022
HQ Location
Ghent, Belgium
Twitter
@AikidoSecurity
2,538 Twitter followers
LinkedIn® Page
www.linkedin.com
83 employees on LinkedIn®
(63)4.7 out of 5
4th Easiest To Use in Application Security Posture Management (ASPM) software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    AppCheck is a Dynamic Application Security Testing (DAST) and network vulnerability testing solution, developed and supported by experienced penetration testers. We approach security testing as a

    Users
    No information available
    Industries
    • Computer Software
    • Information Technology and Services
    Market Segment
    • 51% Mid-Market
    • 30% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • APPCHECK Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Customer Support
    23
    Ease of Use
    23
    Vulnerability Detection
    20
    Automated Scanning
    18
    Scanning Efficiency
    14
    Cons
    UX Improvement
    8
    Poor Interface Design
    6
    Confusing Interface
    3
    Lacking Features
    3
    Limited Customization
    3
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    APPCHECK
    Company Website
    Year Founded
    2014
    HQ Location
    Leeds, GB
    Twitter
    @AppcheckNG
    657 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    97 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

AppCheck is a Dynamic Application Security Testing (DAST) and network vulnerability testing solution, developed and supported by experienced penetration testers. We approach security testing as a

Users
No information available
Industries
  • Computer Software
  • Information Technology and Services
Market Segment
  • 51% Mid-Market
  • 30% Small-Business
APPCHECK Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Customer Support
23
Ease of Use
23
Vulnerability Detection
20
Automated Scanning
18
Scanning Efficiency
14
Cons
UX Improvement
8
Poor Interface Design
6
Confusing Interface
3
Lacking Features
3
Limited Customization
3
Seller Details
Seller
APPCHECK
Company Website
Year Founded
2014
HQ Location
Leeds, GB
Twitter
@AppcheckNG
657 Twitter followers
LinkedIn® Page
www.linkedin.com
97 employees on LinkedIn®
Entry Level Price:Free
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    SonarQube helps developers continuously improve the quality and security of both AI-generated and human-written code. It addresses key areas including: - Code Quality: Ensuring all code meets high st

    Users
    • Software Engineer
    Industries
    • Computer Software
    • Information Technology and Services
    Market Segment
    • 44% Enterprise
    • 38% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • SonarQube Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Code Quality
    26
    Ease of Use
    19
    Features
    19
    Integrations
    19
    Easy Integrations
    17
    Cons
    Complex Configuration
    14
    Complex Setup
    12
    Expensive
    12
    Limited Features
    12
    Software Bugs
    8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2008
    HQ Location
    Geneva, Switzerland
    Twitter
    @SonarSource
    10,226 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    781 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

SonarQube helps developers continuously improve the quality and security of both AI-generated and human-written code. It addresses key areas including: - Code Quality: Ensuring all code meets high st

Users
  • Software Engineer
Industries
  • Computer Software
  • Information Technology and Services
Market Segment
  • 44% Enterprise
  • 38% Mid-Market
SonarQube Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Code Quality
26
Ease of Use
19
Features
19
Integrations
19
Easy Integrations
17
Cons
Complex Configuration
14
Complex Setup
12
Expensive
12
Limited Features
12
Software Bugs
8
Seller Details
Company Website
Year Founded
2008
HQ Location
Geneva, Switzerland
Twitter
@SonarSource
10,226 Twitter followers
LinkedIn® Page
www.linkedin.com
781 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Vulnerability management tool on steroids 📈 Measure and control your application security state; 🔎 Scan your code, containers, web and mobile applications using ANY tool; 🔥 Remove duplicates, v

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 60% Mid-Market
    • 20% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Whitespots Security Portal Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    User Interface
    4
    Vulnerability Detection
    4
    Collaboration
    3
    Easy Setup
    3
    Features
    3
    Cons
    Poor Analytics
    1
    Poor Documentation
    1
    UX Improvement
    1
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2020
    HQ Location
    Tallinn, Estonia
    LinkedIn® Page
    www.linkedin.com
    15 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Vulnerability management tool on steroids 📈 Measure and control your application security state; 🔎 Scan your code, containers, web and mobile applications using ANY tool; 🔥 Remove duplicates, v

Users
No information available
Industries
No information available
Market Segment
  • 60% Mid-Market
  • 20% Enterprise
Whitespots Security Portal Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
User Interface
4
Vulnerability Detection
4
Collaboration
3
Easy Setup
3
Features
3
Cons
Poor Analytics
1
Poor Documentation
1
UX Improvement
1
Seller Details
Year Founded
2020
HQ Location
Tallinn, Estonia
LinkedIn® Page
www.linkedin.com
15 employees on LinkedIn®
Entry Level Price:Contact Us
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Edgescan is a comprehensive platform for continuous security testing, exposure management, and Penetration Testing as a Service (PTaaS). It is designed to assist organizations in gaining a thorough un

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 38% Enterprise
    • 33% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Edgescan Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Customer Support
    7
    Features
    7
    Security
    6
    Ease of Use
    5
    Pentesting Efficiency
    5
    Cons
    Slow Performance
    2
    Slow Scanning
    2
    Bugs
    1
    Difficult Setup
    1
    Inadequate Reporting
    1
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Edgescan
    Company Website
    Year Founded
    2011
    HQ Location
    Dublin, Dublin
    Twitter
    @edgescan
    2,306 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    96 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Edgescan is a comprehensive platform for continuous security testing, exposure management, and Penetration Testing as a Service (PTaaS). It is designed to assist organizations in gaining a thorough un

Users
No information available
Industries
No information available
Market Segment
  • 38% Enterprise
  • 33% Mid-Market
Edgescan Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Customer Support
7
Features
7
Security
6
Ease of Use
5
Pentesting Efficiency
5
Cons
Slow Performance
2
Slow Scanning
2
Bugs
1
Difficult Setup
1
Inadequate Reporting
1
Seller Details
Seller
Edgescan
Company Website
Year Founded
2011
HQ Location
Dublin, Dublin
Twitter
@edgescan
2,306 Twitter followers
LinkedIn® Page
www.linkedin.com
96 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Apiiro is the leader in application security posture management (ASPM), unifying risk visibility, prioritization, and remediation with deep code analysis and runtime context. Get complete applicatio

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Mid-Market
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Apiiro
    Year Founded
    2019
    HQ Location
    New York, NY
    Twitter
    @apiiroSecurity
    7,577 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    113 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Apiiro is the leader in application security posture management (ASPM), unifying risk visibility, prioritization, and remediation with deep code analysis and runtime context. Get complete applicatio

Users
No information available
Industries
No information available
Market Segment
  • 100% Mid-Market
Seller Details
Seller
Apiiro
Year Founded
2019
HQ Location
New York, NY
Twitter
@apiiroSecurity
7,577 Twitter followers
LinkedIn® Page
www.linkedin.com
113 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    ArmorCode is on a mission to supercharge security teams with a new independent governance approach to reduce risk and burn down critical security technical debt. With its AI-powered ASPM Platform, dri

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 67% Mid-Market
    • 33% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • ArmorCode Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Easy Integrations
    2
    Centralization
    1
    Cloud Management
    1
    Coverage Effectiveness
    1
    Cybersecurity
    1
    Cons
    Inadequate Reporting
    1
    Information Management
    1
    Information Overload
    1
    Limited Customization
    1
    Needs Improvement
    1
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    ArmorCode
    Year Founded
    2020
    HQ Location
    Palo Alto, California, United States
    LinkedIn® Page
    www.linkedin.com
    173 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

ArmorCode is on a mission to supercharge security teams with a new independent governance approach to reduce risk and burn down critical security technical debt. With its AI-powered ASPM Platform, dri

Users
No information available
Industries
No information available
Market Segment
  • 67% Mid-Market
  • 33% Small-Business
ArmorCode Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Easy Integrations
2
Centralization
1
Cloud Management
1
Coverage Effectiveness
1
Cybersecurity
1
Cons
Inadequate Reporting
1
Information Management
1
Information Overload
1
Limited Customization
1
Needs Improvement
1
Seller Details
Seller
ArmorCode
Year Founded
2020
HQ Location
Palo Alto, California, United States
LinkedIn® Page
www.linkedin.com
173 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Snyk AppRisk is a product offered by Snyk that enables Application Security teams to implement, manage, and scale a modern, high-performing, developer security program.

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Mid-Market
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Snyk
    HQ Location
    Boston, Massachusetts
    Twitter
    @snyksec
    19,789 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    1,331 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Snyk AppRisk is a product offered by Snyk that enables Application Security teams to implement, manage, and scale a modern, high-performing, developer security program.

Users
No information available
Industries
No information available
Market Segment
  • 100% Mid-Market
Seller Details
Seller
Snyk
HQ Location
Boston, Massachusetts
Twitter
@snyksec
19,789 Twitter followers
LinkedIn® Page
www.linkedin.com
1,331 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Cycode is the only end-to-end software supply chain (SSC) security solution to provide visibility, security, and integrity across all phases of the SDLC. Cycode integrates with all of your software de

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 67% Mid-Market
    • 33% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Cycode Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    1
    Easy Integrations
    1
    Features
    1
    Onboarding
    1
    Risk Management
    1
    Cons
    Integration Issues
    1
    Limited Cloud Integration
    1
    Limited Integrations
    1
    Security Vulnerabilities
    1
    Vulnerability Management
    1
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Cycode
    Year Founded
    2019
    HQ Location
    New York, US
    LinkedIn® Page
    www.linkedin.com
    135 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Cycode is the only end-to-end software supply chain (SSC) security solution to provide visibility, security, and integrity across all phases of the SDLC. Cycode integrates with all of your software de

Users
No information available
Industries
No information available
Market Segment
  • 67% Mid-Market
  • 33% Enterprise
Cycode Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
1
Easy Integrations
1
Features
1
Onboarding
1
Risk Management
1
Cons
Integration Issues
1
Limited Cloud Integration
1
Limited Integrations
1
Security Vulnerabilities
1
Vulnerability Management
1
Seller Details
Seller
Cycode
Year Founded
2019
HQ Location
New York, US
LinkedIn® Page
www.linkedin.com
135 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Phoenix Security is a Contextual ASPM focused on product security. It combines risk-based Vulnerability Management, Application Security Posture Management, and Cloud into a risk and remediation-first

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Phoenix Security Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Customer Support
    1
    Customization
    1
    Ease of Use
    1
    Easy Integrations
    1
    Monitoring
    1
    Cons
    Complexity
    1
    Difficult Learning
    1
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2021
    HQ Location
    London, GB
    Twitter
    @sec_phoenix
    259 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    19 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Phoenix Security is a Contextual ASPM focused on product security. It combines risk-based Vulnerability Management, Application Security Posture Management, and Cloud into a risk and remediation-first

Users
No information available
Industries
No information available
Market Segment
  • 100% Small-Business
Phoenix Security Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Customer Support
1
Customization
1
Ease of Use
1
Easy Integrations
1
Monitoring
1
Cons
Complexity
1
Difficult Learning
1
Seller Details
Year Founded
2021
HQ Location
London, GB
Twitter
@sec_phoenix
259 Twitter followers
LinkedIn® Page
www.linkedin.com
19 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Plexicus offers a groundbreaking AI-driven Application Security Posture Management (ASPM) solution, designed to revolutionize how organizations manage cybersecurity vulnerabilities. Our intelligent AI

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Mid-Market
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    PLEXICUS
    Year Founded
    2023
    HQ Location
    Santa Clara, US
    LinkedIn® Page
    www.linkedin.com
    7 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Plexicus offers a groundbreaking AI-driven Application Security Posture Management (ASPM) solution, designed to revolutionize how organizations manage cybersecurity vulnerabilities. Our intelligent AI

Users
No information available
Industries
No information available
Market Segment
  • 100% Mid-Market
Seller Details
Seller
PLEXICUS
Year Founded
2023
HQ Location
Santa Clara, US
LinkedIn® Page
www.linkedin.com
7 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Secure your Software Development and Delivery! Xygeni Security specializes in Application Security Posture Management (ASPM), using deep contextual insights to effectively prioritize and manage secur

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 67% Small-Business
    • 33% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Xygeni Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Comprehensive Security
    2
    Prioritization
    2
    Risk Management
    2
    Security
    2
    Cloud Integration
    1
    Cons
    Difficult Setup
    1
    Learning Curve
    1
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2021
    Twitter
    @xygeni
    188 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    22 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Secure your Software Development and Delivery! Xygeni Security specializes in Application Security Posture Management (ASPM), using deep contextual insights to effectively prioritize and manage secur

Users
No information available
Industries
No information available
Market Segment
  • 67% Small-Business
  • 33% Mid-Market
Xygeni Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Comprehensive Security
2
Prioritization
2
Risk Management
2
Security
2
Cloud Integration
1
Cons
Difficult Setup
1
Learning Curve
1
Seller Details
Year Founded
2021
Twitter
@xygeni
188 Twitter followers
LinkedIn® Page
www.linkedin.com
22 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Automatically build Python, Perl and Tcl runtimes for Windows, Linux and Mac, or download one of our popular pre-built ActivePython, ActivePerl or ActiveTcl distributions. ActiveState has been cre

    Users
    No information available
    Industries
    • Computer & Network Security
    • Computer Software
    Market Segment
    • 53% Small-Business
    • 26% Mid-Market
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1997
    HQ Location
    Vancouver, BC
    Twitter
    @ActiveState
    4,038 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    72 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Automatically build Python, Perl and Tcl runtimes for Windows, Linux and Mac, or download one of our popular pre-built ActivePython, ActivePerl or ActiveTcl distributions. ActiveState has been cre

Users
No information available
Industries
  • Computer & Network Security
  • Computer Software
Market Segment
  • 53% Small-Business
  • 26% Mid-Market
Seller Details
Year Founded
1997
HQ Location
Vancouver, BC
Twitter
@ActiveState
4,038 Twitter followers
LinkedIn® Page
www.linkedin.com
72 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Arnica simplifies and effectively automates source code security, while maintaining or improving development velocity. Arnica uses rich tooling integration, deep learning, and behavioral analytics to

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 60% Enterprise
    • 20% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Arnica Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    2
    Vulnerability Detection
    2
    Accuracy of Findings
    1
    Actionable Recommendations
    1
    Easy Setup
    1
    Cons
    Lack of Customization
    1
    Limited Cloud Integration
    1
    Paid Features
    1
    UX Improvement
    1
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Arnica
    Year Founded
    2021
    HQ Location
    Alpharetta, Georgia
    Twitter
    @arnicaio
    117 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    52 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Arnica simplifies and effectively automates source code security, while maintaining or improving development velocity. Arnica uses rich tooling integration, deep learning, and behavioral analytics to

Users
No information available
Industries
No information available
Market Segment
  • 60% Enterprise
  • 20% Mid-Market
Arnica Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
2
Vulnerability Detection
2
Accuracy of Findings
1
Actionable Recommendations
1
Easy Setup
1
Cons
Lack of Customization
1
Limited Cloud Integration
1
Paid Features
1
UX Improvement
1
Seller Details
Seller
Arnica
Year Founded
2021
HQ Location
Alpharetta, Georgia
Twitter
@arnicaio
117 Twitter followers
LinkedIn® Page
www.linkedin.com
52 employees on LinkedIn®
0 ratings
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Bionic is an agentless Application Security Posture Management (ASPM) platform that provides unique visibility into the security, data privacy, and operational risk of applications running in producti

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Bionic
    LinkedIn® Page
    www.linkedin.com
    9,398 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Bionic is an agentless Application Security Posture Management (ASPM) platform that provides unique visibility into the security, data privacy, and operational risk of applications running in producti

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
Seller Details
Seller
Bionic
LinkedIn® Page
www.linkedin.com
9,398 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Boman.ai is a plug-n-play DevSecOps product, that can bring continuous application security to the DevOps pipeline. It brings SAST(Static Application Security Testing), DAST(Dynamic Application Secur

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Boman.ai
    LinkedIn® Page
    www.linkedin.com
    1 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Boman.ai is a plug-n-play DevSecOps product, that can bring continuous application security to the DevOps pipeline. It brings SAST(Static Application Security Testing), DAST(Dynamic Application Secur

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
Seller Details
Seller
Boman.ai
LinkedIn® Page
www.linkedin.com
1 employees on LinkedIn®
0 ratings
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    The Dazz Unified Remediation Platform maps your code-to-cloud environment and overlays it with everything you need to know about security.

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Dazz
    LinkedIn® Page
    www.linkedin.com
Product Description
How are these determined?Information
This description is provided by the seller.

The Dazz Unified Remediation Platform maps your code-to-cloud environment and overlays it with everything you need to know about security.

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
Seller Details
Seller
Dazz
LinkedIn® Page
www.linkedin.com
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Heeler empowers application security teams to shift left with the context they need to reduce noise, accelerate remediation, and move beyond traditional vulnerability management. By combining ASPM, SC

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2023
    HQ Location
    N/A
    LinkedIn® Page
    www.linkedin.com
    19 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Heeler empowers application security teams to shift left with the context they need to reduce noise, accelerate remediation, and move beyond traditional vulnerability management. By combining ASPM, SC

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
Seller Details
Year Founded
2023
HQ Location
N/A
LinkedIn® Page
www.linkedin.com
19 employees on LinkedIn®
0 ratings
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    CodeEye's IRIS is a next-generation application security posture management (ASPM) platform, offers an all-in-one solution with real-time, AI-powered vulnerability and threat detection, correlation, p

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    CodeEye
    Year Founded
    2015
    HQ Location
    Toronto, CA
    Twitter
    @CodeEyeAI
    5 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    10 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

CodeEye's IRIS is a next-generation application security posture management (ASPM) platform, offers an all-in-one solution with real-time, AI-powered vulnerability and threat detection, correlation, p

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
Seller Details
Seller
CodeEye
Year Founded
2015
HQ Location
Toronto, CA
Twitter
@CodeEyeAI
5 Twitter followers
LinkedIn® Page
www.linkedin.com
10 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Kodem is an application security platform powered by Runtime Intelligence. Kodem secures the software supply chain and the underlying cloud infrastructure throughout its lifecycle from development to

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2021
    HQ Location
    Tel Aviv, IL
    LinkedIn® Page
    www.linkedin.com
    43 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Kodem is an application security platform powered by Runtime Intelligence. Kodem secures the software supply chain and the underlying cloud infrastructure throughout its lifecycle from development to

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
Seller Details
Year Founded
2021
HQ Location
Tel Aviv, IL
LinkedIn® Page
www.linkedin.com
43 employees on LinkedIn®
Entry Level Price:Starting at $12,000.00
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    It is an application security orchestration platform that automates work across scanning tools, centralizes vulnerability management and improves security posture with risk-based metrics and security

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Kondukto
    LinkedIn® Page
    www.linkedin.com
Product Description
How are these determined?Information
This description is provided by the seller.

It is an application security orchestration platform that automates work across scanning tools, centralizes vulnerability management and improves security posture with risk-based metrics and security

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
Seller Details
Seller
Kondukto
LinkedIn® Page
www.linkedin.com
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Legit Security provides an application security posture management platform that secures application delivery from code to cloud and protects an organization's software supply chain from attacks. The

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    HQ Location
    N/A
    LinkedIn® Page
    www.linkedin.com
    70 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Legit Security provides an application security posture management platform that secures application delivery from code to cloud and protects an organization's software supply chain from attacks. The

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
Seller Details
HQ Location
N/A
LinkedIn® Page
www.linkedin.com
70 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Oxeye is an application security solution that was developed to address the unique architecture of cloud native applications. We combine static analysis with runtime flow tracing and infrastructure an

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Oxeye
    LinkedIn® Page
    www.linkedin.com
Product Description
How are these determined?Information
This description is provided by the seller.

Oxeye is an application security solution that was developed to address the unique architecture of cloud native applications. We combine static analysis with runtime flow tracing and infrastructure an

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
Seller Details
Seller
Oxeye
LinkedIn® Page
www.linkedin.com
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    RiskApp proves your app is secure — before and after it ships

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    RiskApp
    LinkedIn® Page
    www.linkedin.com
Product Description
How are these determined?Information
This description is provided by the seller.

RiskApp proves your app is secure — before and after it ships

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
Seller Details
Seller
RiskApp
LinkedIn® Page
www.linkedin.com
0 ratings
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Get 100% Security Design Review coverage without burning out your Security team Augment critical security talent by using Gen AI to automate manual AppSec workflows. Ship faster and save time, withou

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Seezo
    HQ Location
    Bangalore, IN
    LinkedIn® Page
    www.linkedin.com
    10 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Get 100% Security Design Review coverage without burning out your Security team Augment critical security talent by using Gen AI to automate manual AppSec workflows. Ship faster and save time, withou

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
Seller Details
Seller
Seezo
HQ Location
Bangalore, IN
LinkedIn® Page
www.linkedin.com
10 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Empower your business with complete visibility and control over your application security posture. Eliminate blind spots, prioritize threats effectively, and streamline remediation. Strobes ASPM Adv

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    HQ Location
    5700 Tennyson Pkwy, # 372, Plano, TX, 75024
    Twitter
    @StrobesHQ
    207 Twitter followers
    LinkedIn® Page
    www.linkedin.com
Product Description
How are these determined?Information
This description is provided by the seller.

Empower your business with complete visibility and control over your application security posture. Eliminate blind spots, prioritize threats effectively, and streamline remediation. Strobes ASPM Adv

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
Seller Details
HQ Location
5700 Tennyson Pkwy, # 372, Plano, TX, 75024
Twitter
@StrobesHQ
207 Twitter followers
LinkedIn® Page
www.linkedin.com