Loading...
Software Composition Analysis (SCA) tools for identifying security vulnerabilities in open source components, third-party libraries, and software dependencies.
Browse 163 software composition analysis tools
Tracks OSS components, monitors vulnerabilities, and ensures license compliance
Tracks OSS components, monitors vulnerabilities, and ensures license compliance
Automated SBOM generation and management platform for software supply chain
Automated SBOM generation and management platform for software supply chain
Open-source risk mgmt platform for detecting & mitigating OSS vulnerabilities
Open-source risk mgmt platform for detecting & mitigating OSS vulnerabilities
AI-powered software supply chain security platform with SBOM management
AI-powered software supply chain security platform with SBOM management
SBOM lifecycle management platform for creation, validation, and distribution
SBOM lifecycle management platform for creation, validation, and distribution
AI-powered SBOM & SCA platform for software supply chain security
AI-powered SBOM & SCA platform for software supply chain security
Contextual risk analyzer for software supply chain security across SDLC stages
Contextual risk analyzer for software supply chain security across SDLC stages
Automated code signing solution for software authenticity and integrity
Automated code signing solution for software authenticity and integrity
Binary-based SBOM generation for mobile apps with vulnerability analysis
Binary-based SBOM generation for mobile apps with vulnerability analysis
SDK for integrating Kaspersky anti-malware engine into third-party products
SDK for integrating Kaspersky anti-malware engine into third-party products
SCA tool with reachability analysis for dependency vulnerabilities
SCA tool with reachability analysis for dependency vulnerabilities
Tracks, governs, and secures software installs across endpoints and marketplaces.
Tracks, governs, and secures software installs across endpoints and marketplaces.
AI-powered AppSec platform for code, dependencies, and container security
AI-powered AppSec platform for code, dependencies, and container security
Malware-resistant software libraries rebuilt from source for multiple languages
Malware-resistant software libraries rebuilt from source for multiple languages
SCA tool that finds, prioritizes, and fixes open source vulnerabilities
SCA tool that finds, prioritizes, and fixes open source vulnerabilities
Software supply chain security platform using binary analysis for threat detection
Software supply chain security platform using binary analysis for threat detection
SCA tool for managing security, quality, and license risks in open source code
SCA tool for managing security, quality, and license risks in open source code
AI-driven app & supply chain security platform with SBOM generation & scanning
AI-driven app & supply chain security platform with SBOM generation & scanning
Public repository for open source Java components and libraries
Public repository for open source Java components and libraries
Open source vulnerability intelligence engine analyzing 270M+ components
Open source vulnerability intelligence engine analyzing 270M+ components
Unified platform for open source security, AI governance, and SBOM management
Unified platform for open source security, AI governance, and SBOM management
Automates SBOM ingestion, monitoring, and compliance management for software
Automates SBOM ingestion, monitoring, and compliance management for software
AI-driven SCA tool for open-source dependency vulnerability detection & remediation
AI-driven SCA tool for open-source dependency vulnerability detection & remediation
Software supply chain security platform for SDLC infrastructure protection
Software supply chain security platform for SDLC infrastructure protection
Common questions about Software Composition Analysis tools including selection guides, pricing, and comparisons.
Software Composition Analysis (SCA) tools for identifying security vulnerabilities in open source components, third-party libraries, and software dependencies.
Get strategic cybersecurity insights in your inbox