Loading...
Software Composition Analysis (SCA) tools for identifying security vulnerabilities in open source components, third-party libraries, and software dependencies.
Browse 124 software composition analysis tools
Fix-first AppSec powered by agentic remediation, covering SCA, SAST & secrets.
Fix-first AppSec powered by agentic remediation, covering SCA, SAST & secrets.
Healthcare-focused software security platform for vulnerability reduction
Healthcare-focused software security platform for vulnerability reduction
Automotive vulnerability & SBOM management system for vehicle software security
Automotive vulnerability & SBOM management system for vehicle software security
SCA tool scanning dependencies for vulnerabilities across 30+ languages
SCA tool scanning dependencies for vulnerabilities across 30+ languages
SBOM tool for identifying software supply chain vulnerabilities
SBOM tool for identifying software supply chain vulnerabilities
SCA tool for detecting OSS vulnerabilities in code and dependencies
SCA tool for detecting OSS vulnerabilities in code and dependencies
Post-quantum cryptography solution for chip-to-cloud secure communications
Post-quantum cryptography solution for chip-to-cloud secure communications
Specialized cryptography IP for FHE, LWC, PBC, and WBC implementations
Specialized cryptography IP for FHE, LWC, PBC, and WBC implementations
Security solution for WooCommerce e-commerce platform vulnerabilities
Security solution for WooCommerce e-commerce platform vulnerabilities
Tracks OSS components, monitors vulnerabilities, and ensures license compliance
Tracks OSS components, monitors vulnerabilities, and ensures license compliance
Automated SBOM generation and management platform for software supply chain
Automated SBOM generation and management platform for software supply chain
Open-source risk mgmt platform for detecting & mitigating OSS vulnerabilities
Open-source risk mgmt platform for detecting & mitigating OSS vulnerabilities
AI-powered software supply chain security platform with SBOM management
AI-powered software supply chain security platform with SBOM management
SBOM lifecycle management platform for creation, validation, and distribution
SBOM lifecycle management platform for creation, validation, and distribution
AI-powered SBOM & SCA platform for software supply chain security
AI-powered SBOM & SCA platform for software supply chain security
Contextual risk analyzer for software supply chain security across SDLC stages
Contextual risk analyzer for software supply chain security across SDLC stages
Automated code signing solution for software authenticity and integrity
Automated code signing solution for software authenticity and integrity
Binary-based SBOM generation for mobile apps with vulnerability analysis
Binary-based SBOM generation for mobile apps with vulnerability analysis
SDK for integrating Kaspersky anti-malware engine into third-party products
SDK for integrating Kaspersky anti-malware engine into third-party products
SCA tool with reachability analysis for dependency vulnerabilities
SCA tool with reachability analysis for dependency vulnerabilities
Tracks, governs, and secures software installs across endpoints and marketplaces.
Tracks, governs, and secures software installs across endpoints and marketplaces.
AI-powered AppSec platform for code, dependencies, and container security
AI-powered AppSec platform for code, dependencies, and container security
Malware-resistant software libraries rebuilt from source for multiple languages
Malware-resistant software libraries rebuilt from source for multiple languages
SCA tool that finds, prioritizes, and fixes open source vulnerabilities
SCA tool that finds, prioritizes, and fixes open source vulnerabilities
Common questions about Software Composition Analysis tools including selection guides, pricing, and comparisons.
Software Composition Analysis (SCA) tools for identifying security vulnerabilities in open source components, third-party libraries, and software dependencies.
Fix-first AppSec powered by agentic remediation, covering SCA, SAST & secrets.
Cybercrime intelligence tools for searching compromised credentials from infostealers
Password manager with end-to-end encryption and identity protection features
Fractional CISO services for B2B companies to build security programs
Real-time OSINT monitoring for leaked credentials, data, and infrastructure
A threat intelligence aggregation service that consolidates and summarizes security updates from multiple sources to provide comprehensive cybersecurity situational awareness.
AI security assurance platform for red-teaming, guardrails & compliance
Get strategic cybersecurity insights in your inbox