Application Security Posture Management for Ci Cd

Task: Ci Cd

Explore 8 curated cybersecurity tools, with + visitors searching for solutions

FEATURED

Proton Pass Logo

Password manager with end-to-end encryption and identity protection features

NordVPN Logo

VPN service providing encrypted internet connections and privacy protection

Mandos Fractional CISO Services Logo

Fractional CISO services for B2B companies to accelerate sales and compliance

Get Featured

Feature your product and reach thousands of professionals.

Xygeni All-In-One AppSec Platform Logo

All-in-one application security platform for SDLC protection and risk management

0
OX Application Security Platform Logo

Platform for securing applications across the software development lifecycle

0
Legit Security Logo

An Application Security Posture Management platform that provides visibility, security controls, and risk management across the software development lifecycle from code to cloud deployment.

0
Tromzo Product Security Operating Platform Logo

An Application Security Posture Management platform that provides visibility, security controls, and automated workflows across the software development lifecycle from code to cloud.

0
Jit Logo

An integrated application security platform that combines multiple security scanning tools with developer-focused workflows for automated code and infrastructure security testing.

0
Heeler Logo

An application security platform that provides runtime threat modeling, vulnerability management, and automated remediation workflows with a focus on identifying exploitable vulnerabilities in production environments.

0
Data Theorem API Secure Logo

Data Theorem API Secure is an application security platform that combines SAST, DAST, IAST, and SCA testing methodologies to provide comprehensive security assessment and monitoring for APIs and modern applications throughout their development lifecycle.

0
StepSecurity Logo

StepSecurity is a platform that enhances GitHub Actions security by providing network egress control, risk discovery, action replacement, and security best practices orchestration.

0