Loading...
Application security tools and solutions for securing web applications, mobile apps, and software throughout the development lifecycle.
Browse 686 application security tools
Tracks OSS components, monitors vulnerabilities, and ensures license compliance
Tracks OSS components, monitors vulnerabilities, and ensures license compliance
Automated SBOM generation and management platform for software supply chain
Automated SBOM generation and management platform for software supply chain
Open-source risk mgmt platform for detecting & mitigating OSS vulnerabilities
Open-source risk mgmt platform for detecting & mitigating OSS vulnerabilities
AI-powered software supply chain security platform with SBOM management
AI-powered software supply chain security platform with SBOM management
SBOM lifecycle management platform for creation, validation, and distribution
SBOM lifecycle management platform for creation, validation, and distribution
AI-powered SBOM & SCA platform for software supply chain security
AI-powered SBOM & SCA platform for software supply chain security
Contextual risk analyzer for software supply chain security across SDLC stages
Contextual risk analyzer for software supply chain security across SDLC stages
Bot defense platform protecting websites, mobile apps, and APIs from attacks
Bot defense platform protecting websites, mobile apps, and APIs from attacks
API-based risk intelligence for non-custodial wallets to detect threats
API-based risk intelligence for non-custodial wallets to detect threats
Real-time transaction security for Web3 wallets and blockchain transactions
Real-time transaction security for Web3 wallets and blockchain transactions
Onchain firewall that blocks malicious blockchain transactions in real-time
Onchain firewall that blocks malicious blockchain transactions in real-time
Server-side mobile app attestation verifying app integrity and API access
Server-side mobile app attestation verifying app integrity and API access
Mobile app security testing tool with static & interactive analysis
Mobile app security testing tool with static & interactive analysis
Real-time mobile threat detection and monitoring platform with RASP integration
Real-time mobile threat detection and monitoring platform with RASP integration
Android app protection tool with obfuscation, encryption, and RASP
Android app protection tool with obfuscation, encryption, and RASP
AI-based real-time security engine for blocking web threats in browsers & agents
AI-based real-time security engine for blocking web threats in browsers & agents
Platform protecting web apps and APIs from attacks, bots, and DDoS
Platform protecting web apps and APIs from attacks, bots, and DDoS
Cryptographic protocols designed to resist side-channel attacks
Cryptographic protocols designed to resist side-channel attacks
Cryptographic solution for outsourcing computation with verifiable results
Cryptographic solution for outsourcing computation with verifiable results
Cryptographic technique for verifying claims without revealing sensitive data.
Cryptographic technique for verifying claims without revealing sensitive data.
Formal verification of Amazon's s2n TLS library using SAW and Cryptol
Formal verification of Amazon's s2n TLS library using SAW and Cryptol
Development platform for building Intel SGX enclaves using Rust language
Development platform for building Intel SGX enclaves using Rust language
Managed application security testing service for web applications
Managed application security testing service for web applications
Mobile app security testing combining vuln assessment, pentesting & forensics
Mobile app security testing combining vuln assessment, pentesting & forensics
Common questions about Application Security tools including selection guides, pricing, and comparisons.
Application security tools and solutions for securing web applications, mobile apps, and software throughout the development lifecycle.
Fix-first AppSec powered by agentic remediation, covering SCA, SAST & secrets.
Cybercrime intelligence tools for searching compromised credentials from infostealers
Password manager with end-to-end encryption and identity protection features
Fractional CISO services for B2B companies to build security programs
Real-time OSINT monitoring for leaked credentials, data, and infrastructure
A threat intelligence aggregation service that consolidates and summarizes security updates from multiple sources to provide comprehensive cybersecurity situational awareness.
AI security assurance platform for red-teaming, guardrails & compliance
Get strategic cybersecurity insights in your inbox