jimi is an orchestration automation tool focusing on multi-team collaboration through an intuitive flow-based interface. It offers unlimited flexibility into all areas of automation from IT/Security operations to Development and CI/CD pipelines. jimi is a cross between a low-code programming language like node red and a no-code SOAR / Automation platform. Built on-top of Python, it has the power and capability to do just about anything, and is expandable, even supporting raw Python code directly within the flows created.
FEATURES
EXPLORE BY TAGS
SIMILAR TOOLS
Fabric Platform is a cybersecurity reporting solution that automates and standardizes report generation, offering a private-cloud platform, open-source tools, and community-supported templates.
Reveelium UEBA is a French-developed User and Entity Behavior Analytics solution that uses artificial intelligence to detect abnormal behaviors and security threats by analyzing user and entity activities within an organization's network.
A DFIR console integrating various cybersecurity tools and frameworks for efficient incident response.
Automatically configure your app to follow OWASP security patterns and principles with Nuxt Security module.
Collection of scripts and resources for DevSecOps, Security Automation and Automated Incident Response Remediation.
Open-source abuse management toolkit for automating and improving the abuse handling process.
A centralized management console for efficiently operating and monitoring large-scale, multitenant Logpoint SIEM deployments across customers, geographies, and organizational divisions.
Anomali is an AI-Powered Security Operations Platform that delivers speed, scale, and performance at a reduced cost, combining ETL, SIEM, XDR, SOAR, and TIP to detect, investigate, respond, and remediate threats.
A Live Response collection script for Incident Response that automates the collection of artifacts from various Unix-like operating systems.
PINNED

Mandos
Fractional CISO service that helps B2B companies implement security leadership to win enterprise deals, achieve compliance, and develop strategic security programs.

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.