Application Security for License Compliance

Application security tools and solutions for securing web applications, mobile apps, and software throughout the development lifecycle. Task: License Compliance

Browse 38 security tools

SCA tool detecting OSS vulnerabilities & license risks in code, binaries, containers.

SBOM exchange platform for managing software supply chain compliance.

SBOM generation & vuln identification tool for C/C++ and embedded software

Autonomous open source supply chain security & license compliance platform.

SBOM creation, management & vulnerability scanning across the dep. tree.

SCA tool for detecting OSS vulnerabilities and license risks in dependency trees.

Free SCA tool for open source projects with vuln scanning & SBOM.

OSS risk management system for SBOM generation, vuln & license analysis.

Database for researching & tracking open source components with safety scores.

Web scanner that detects vulnerable/outdated components and license risks.

SCA tool scanning web projects for vulnerable, outdated, or non-compliant components.

Tool for searching, comparing, and evaluating open source dependencies.

Enterprise SBOM management platform for software supply chain security.

Software supply chain security platform for managing open source dependencies

SCA tool for source code, binaries, and AI-generated code vulnerability detection

SCA tool with reachability analysis for dependency vulnerabilities

SCA tool for managing security, quality, and license risks in open source code

AI-driven app & supply chain security platform with SBOM generation & scanning

Automates SBOM ingestion, monitoring, and compliance management for software

Enterprise SCA tool for scanning & remediating vulnerable open source dependencies

Open source license compliance management integrated into dev workflows

Risk-based SCA with deep code analysis and runtime context for OSS security

SCA tool for SBOM generation, dependency analysis, and open-source risk mgmt.

SAST tool using virtual compilers to analyze source code for vulnerabilities