Veracode Logo

Veracode

0
Commercial
Visit Website

Veracode is an intelligent software security platform that helps developers learn secure coding on-demand, find and fix flaws as they write code, and leverage the skills of experienced penetration testers. With Veracode, you can secure container technologies before production, find and fix runtime web app vulnerabilities, and automate remediation to save developer's time. The platform provides unified visibility and remediation of application risk, allowing you to build, mature, and scale impactful AppSec programs. Veracode helps developers and security teams manage risk across their software portfolio, secure code with confidence, and discover unknown risks. The platform provides security from code to cloud-native, connecting security and development teams to ensure adoption and compliance. With Veracode, you can spend more time writing code and less time fixing what isn't broken, and achieve pervasive, not invasive, application security.

FEATURES

ALTERNATIVES

A security-focused general purpose memory allocator providing the malloc API with hardening against heap corruption vulnerabilities.

Aikido is an all-in-one security platform that combines multiple security scanning and management functions for cloud-native applications and infrastructure.

ThreatLocker is an enterprise cybersecurity platform that provides comprehensive endpoint protection and zero-trust security to prevent ransomware, viruses, and other malicious software from running on endpoints.

A third-party Nginx module that prevents common web attacks by reading a small subset of simple rules containing 99% of known patterns involved in website vulnerabilities.

Drltrace is a dynamic API calls tracer for Windows and Linux applications.

Automated framework for monitoring and tampering system API calls of native macOS, iOS, and Android apps.

Tenable One Exposure Management Platform is a comprehensive platform for vulnerability management and exposure management.

Detect trojan source attacks that employ unicode bidi attacks to inject malicious code.