Loading...
Software Composition Analysis (SCA) tools for identifying security vulnerabilities in open source components, third-party libraries, and software dependencies.
Browse 103 software composition analysis tools
Fix-first AppSec powered by agentic remediation, covering SCA, SAST & secrets.
Fix-first AppSec powered by agentic remediation, covering SCA, SAST & secrets.
Tracks, governs, and secures software installs across endpoints and marketplaces.
Tracks, governs, and secures software installs across endpoints and marketplaces.
AI-powered AppSec platform for code, dependencies, and container security
AI-powered AppSec platform for code, dependencies, and container security
SCA tool that finds, prioritizes, and fixes open source vulnerabilities
SCA tool that finds, prioritizes, and fixes open source vulnerabilities
SCA tool for managing security, quality, and license risks in open source code
SCA tool for managing security, quality, and license risks in open source code
AI-driven app & supply chain security platform with SBOM generation & scanning
AI-driven app & supply chain security platform with SBOM generation & scanning
Public repository for open source Java components and libraries
Public repository for open source Java components and libraries
Open source vulnerability intelligence engine analyzing 270M+ components
Open source vulnerability intelligence engine analyzing 270M+ components
Unified platform for open source security, AI governance, and SBOM management
Unified platform for open source security, AI governance, and SBOM management
Automates SBOM ingestion, monitoring, and compliance management for software
Automates SBOM ingestion, monitoring, and compliance management for software
AI-driven SCA tool for open-source dependency vulnerability detection & remediation
AI-driven SCA tool for open-source dependency vulnerability detection & remediation
Software supply chain security platform for SDLC infrastructure protection
Software supply chain security platform for SDLC infrastructure protection
Open source license compliance management integrated into dev workflows
Open source license compliance management integrated into dev workflows
AI-powered developer security platform for SDLC code security & governance
AI-powered developer security platform for SDLC code security & governance
SCA tool with proof-based validation and runtime analysis for open-source risks
SCA tool with proof-based validation and runtime analysis for open-source risks
Runtime SCA tool prioritizing fixable & exploitable open-source vulnerabilities
Runtime SCA tool prioritizing fixable & exploitable open-source vulnerabilities
SCA tool for identifying vulnerable third-party libraries and dependencies
SCA tool for identifying vulnerable third-party libraries and dependencies
SCA tool using Code Property Graph and AI/ML for reachability analysis
SCA tool using Code Property Graph and AI/ML for reachability analysis
SBOM generation tool for software supply chain visibility and risk management
SBOM generation tool for software supply chain visibility and risk management
Risk-based SCA with deep code analysis and runtime context for OSS security
Risk-based SCA with deep code analysis and runtime context for OSS security
SCA tool for SBOM generation, dependency analysis, and open-source risk mgmt.
SCA tool for SBOM generation, dependency analysis, and open-source risk mgmt.
Generates SBOM for cloud workloads to track software components and dependencies
Generates SBOM for cloud workloads to track software components and dependencies
End-to-end software supply chain platform for secure artifact management
End-to-end software supply chain platform for secure artifact management
SCA tool for managing open source security risks and vulnerabilities
SCA tool for managing open source security risks and vulnerabilities
Common questions about Software Composition Analysis tools including selection guides, pricing, and comparisons.
Software Composition Analysis (SCA) tools for identifying security vulnerabilities in open source components, third-party libraries, and software dependencies.
Fix-first AppSec powered by agentic remediation, covering SCA, SAST & secrets.
Cybercrime intelligence tools for searching compromised credentials from infostealers
Password manager with end-to-end encryption and identity protection features
Fractional CISO services for B2B companies to build security programs
Real-time OSINT monitoring for leaked credentials, data, and infrastructure
A threat intelligence aggregation service that consolidates and summarizes security updates from multiple sources to provide comprehensive cybersecurity situational awareness.
AI security assurance platform for red-teaming, guardrails & compliance
A comprehensive educational resource that provides structured guidance on penetration testing methodology, tools, and techniques organized around the penetration testing attack chain.
Get strategic cybersecurity insights in your inbox