Software Composition Analysis

Software Composition Analysis (SCA) tools for identifying security vulnerabilities in open source components, third-party libraries, and software dependencies.

Explore 99 curated cybersecurity tools, with 15,426 visitors searching for solutions

FEATURED

Hudson Rock Cybercrime Intelligence Tools Logo

Cybercrime intelligence tools for searching compromised credentials from infostealers

Proton Pass Logo

Password manager with end-to-end encryption and identity protection features

NordVPN Logo

VPN service providing encrypted internet connections and privacy protection

Mandos Fractional CISO Logo

Fractional CISO services for B2B companies to build security programs

Get Featured

Feature your product and reach thousands of professionals.

Black Duck Black Duck SCA Logo

SCA tool for managing security, quality, and license risks in open source code

0
The Code Registry Application & Supply Chain Security Logo

AI-driven app & supply chain security platform with SBOM generation & scanning

0
Sonatype Maven Central Logo

Public repository for open source Java components and libraries

0
Sonatype Intelligence Engine Logo

Open source vulnerability intelligence engine analyzing 270M+ components

0
Sonatype Nexus One Platform Logo

Unified platform for open source security, AI governance, and SBOM management

0
Sonatype SBOM Manager Logo

Automates SBOM ingestion, monitoring, and compliance management for software

0
Sec1 Scopy Logo

AI-driven SCA tool for open-source dependency vulnerability detection & remediation

0
BoostSecurity Software Supply Chain Protection Logo

Software supply chain security platform for SDLC infrastructure protection

0
Snyk Open Source License Compliance Logo

Open source license compliance management integrated into dev workflows

0
Snyk AI Security Platform Logo

AI-powered developer security platform for SDLC code security & governance

0
Invicti Software Composition Analysis Logo

SCA tool with proof-based validation and runtime analysis for open-source risks

0
Heeler Runtime, Fixability-First SCA Logo

Runtime SCA tool prioritizing fixable & exploitable open-source vulnerabilities

0
Fluid Attacks SCA Logo

SCA tool for identifying vulnerable third-party libraries and dependencies

0
Qwiet AI Intelligent SCA Logo

SCA tool using Code Property Graph and AI/ML for reachability analysis

0
Qwiet SBOM Logo

SBOM generation tool for software supply chain visibility and risk management

0
Apiiro SCA Logo

Risk-based SCA with deep code analysis and runtime context for OSS security

0
DerSecur Software Composition Analysis (SCA) Logo

SCA tool for SBOM generation, dependency analysis, and open-source risk mgmt.

0
Plerion Software Composition Logo

Generates SBOM for cloud workloads to track software components and dependencies

0
JFrog Software Supply Chain Platform Logo

End-to-end software supply chain platform for secure artifact management

0
Mend SCA Logo

SCA tool for managing open source security risks and vulnerabilities

0
Mend AI Native AppSec Platform Logo

AI-native AppSec platform with SCA, SAST, container & dependency mgmt.

0
Flyingduck Software Composition Analysis Logo

SCA tool for identifying & resolving vulnerabilities in dependencies

0
Flyingduck Comprehensive SBOM Management Logo

SBOM management platform for tracking dependencies and vulnerabilities

0
Raven Runtime Prevention Logo

Runtime protection preventing supply-chain attacks & exploits via library-level policies

0

Stay Updated with Mandos Brief

Get the latest cybersecurity updates in your inbox

POPULAR

RoboShadow Logo

Automated vulnerability assessment and remediation platform

13
Cybersec Feeds Logo

A threat intelligence aggregation service that consolidates and summarizes security updates from multiple sources to provide comprehensive cybersecurity situational awareness.

7
TestSavant AI Security Assurance Platform Logo

AI security assurance platform for red-teaming, guardrails & compliance

5
OSINTLeak Real-time OSINT Leak Intelligence Logo

Real-time OSINT monitoring for leaked credentials, data, and infrastructure

5
Mandos Brief Logo

Weekly cybersecurity newsletter covering security incidents, AI, and leadership

5
View Popular Tools →

FEATURED

Hudson Rock Cybercrime Intelligence Tools Logo

Cybercrime intelligence tools for searching compromised credentials from infostealers

Proton Pass Logo

Password manager with end-to-end encryption and identity protection features

NordVPN Logo

VPN service providing encrypted internet connections and privacy protection

Mandos Fractional CISO Logo

Fractional CISO services for B2B companies to build security programs

Software Composition Analysis Tools - FAQ

Common questions about Software Composition Analysis tools including selection guides, pricing, and comparisons.

Software Composition Analysis (SCA) tools for identifying security vulnerabilities in open source components, third-party libraries, and software dependencies.

Have more questions? Browse our categories or search for specific tools.