+
+

Related Products

  • Chainguard
    49 Ratings
    Visit Website
  • Aikido Security
    224 Ratings
    Visit Website
  • Wiz
    1,439 Ratings
    Visit Website
  • Google Cloud Run
    325 Ratings
    Visit Website
  • Apryse PDF SDK
    150 Ratings
    Visit Website
  • Square Payments
    10,006 Ratings
    Visit Website
  • Reflectiz
    18 Ratings
    Visit Website
  • SOCRadar Extended Threat Intelligence
    101 Ratings
    Visit Website
  • Revaly
    7 Ratings
    Visit Website
  • Paladin POS
    23 Ratings
    Visit Website

About

Simplified dependency lifecycle management lies at the heart of both supply chain security and developer productivity. Endor Labs helps security and dev teams accelerate development by safely maximizing software reuse. Reduce the overall amount of dependencies with a better selection process, and eliminate of unused dependencies. Identify the vulnerabilities that matter, and use dozens of leading indicators of risk to defend against software supply chain attacks. Get out of dependency hell faster by identifying and remediating bugs and security issues in your dependency chain. Increased productivity for dev and security teams. By maximizing software reuse, minimizing false positives, and making it easier for security and development teams to select, secure, and maintain dependencies, Endor Labs helps organizations focus on shipping value-adding code. Get complete visibility into your dependency network across repos. Who is using what, and who depends on who.

About

DevSecOps Next Generation – Securing Your Binaries. Identify security vulnerabilities and license violations early in the development process and block builds with security issues from deployment. Automated and continuous governance and auditing of software artifacts and dependencies throughout the software development lifecycle from code to production. Additional functionalities include: - Deep recursive scanning of components drilling down to analyze all artifacts and dependencies and creating a graph of relationships between software components. - On-Prem, Cloud, Hybrid, or Multi-Cloud Solution - Impact analysis of how an issue in one component affects all dependent components with a display chain of impacts in a component dependency graph. - JFrog’s vulnerabilities database, continuously updated with new component vulnerability data, includes VulnDB, the industry’s most comprehensive security vulnerability database.

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Audience

Security and dev teams searching for a solution to accelerate development by safely maximizing software reuse

Audience

Developers, DevOps Engineers, DevSecOps, SRE.

Support

Phone Support
24/7 Live Support
Online

Support

Phone Support
24/7 Live Support
Online

API

Offers API

API

Offers API

Screenshots and Videos

Screenshots and Videos

Pricing

No information available.
Free Version
Free Trial

Pricing

No information available.
Free Version
Free Trial

Reviews/Ratings

Overall 5.0 / 5
ease 4.0 / 5
features 5.0 / 5
design 5.0 / 5
support 5.0 / 5

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Training

Documentation
Webinars
Live Online
In Person

Training

Documentation
Webinars
Live Online
In Person

Company Information

Endor Labs
United States
www.endorlabs.com

Company Information

JFrog
Founded: 2008
United States
jfrog.com/xray/

Alternatives

Alternatives

Xygeni

Xygeni

Xygeni Security
aqua cloud

aqua cloud

aqua cloud GmbH

Categories

Categories

Continuous Integration Features

Build Log
Change Management
Configuration Management
Continuous Delivery
Continuous Deployment
Debugging
Permission Management
Quality Assurance Management
Testing Management

DevOps Features

Approval Workflow
Dashboard
KPIs
Policy Management
Portfolio Management
Prioritization
Release Management
Timeline Management
Troubleshooting Reports

IT Security Features

Anti Spam
Anti Virus
Email Attachment Protection
Event Tracking
Internet Usage Monitoring
Intrusion Detection System
IP Protection
Spyware Removal
Two-Factor Authentication
Vulnerability Scanning
Web Threat Management
Web Traffic Reporting

Vulnerability Management Features

Asset Discovery
Asset Tagging
Network Scanning
Patch Management
Policy Management
Prioritization
Risk Management
Vulnerability Assessment
Web Scanning

Integrations

ArmorCode
Atlassian Insight
Boozang
Chainguard
Cider
CycloneDX
Databricks Data Intelligence Platform
Netskope
OpsLevel
OpsMx Enterprise for Spinnaker
Palo Alto Networks Threat Prevention
ReleaseIQ
Rubrik
Seeker
Snowflake
ThoughtSpot
Tromzo
Uber
Vulcan Cyber
Zoom

Integrations

ArmorCode
Atlassian Insight
Boozang
Chainguard
Cider
CycloneDX
Databricks Data Intelligence Platform
Netskope
OpsLevel
OpsMx Enterprise for Spinnaker
Palo Alto Networks Threat Prevention
ReleaseIQ
Rubrik
Seeker
Snowflake
ThoughtSpot
Tromzo
Uber
Vulcan Cyber
Zoom
Claim Endor Labs and update features and information
Claim Endor Labs and update features and information
Claim JFrog Xray and update features and information
Claim JFrog Xray and update features and information