Lineaje SBOM360Lineaje 
                        
                        
                     | 
        
        ||||||
                
            
            
            About
            Eagle-eyes over your software factory. Know what’s in your software with the world’s most advanced SBOM manager. SBOM360 is the industry’s first SBOM manager supporting full life-cycle management of thousands of SBOMs for all software you source, build, sell, or buy. Ensure all your software meets your security policies and compliance mandates automatically. Search your software inventory in seconds. Know your riskiest applications at a glance. Our amazing security profiler automatically shows you your riskiest applications and components, automatically quantified and prioritized for you. Easily justify software maintenance investments and their direct impact on software quality and your business. Insert function-driven policy gates for each stage of software development. Cascade them down automatically to all your organizations and projects, driving scans and remediations at scale.
             
            
        
         | 
        
        
                
            
            
            About
            Wiz is a new approach to cloud security that finds the most critical risks and infiltration vectors with complete coverage across the full stack of multi-cloud environments. Find all lateral movement risks such as private keys used to access both development and production environments. Scan for vulnerable and unpatched operating systems, installed software, and code libraries in your workloads prioritized by risk. Get a complete and up-to-date inventory of all services and software in your cloud environments including the version and package. Identify all keys located on your workloads cross referenced with the privileges they have in your cloud environment. See which resources are publicly exposed to the internet based on a full analysis of your cloud network, even those behind multiple hops. Assess the configuration of cloud infrastructure, Kubernetes, and VM operating systems against your baselines and industry best practices.
             
            
        
         | 
        |||||
        
        Platforms Supported
            
                Windows
            
            
         
        
    
        
        
            
                Mac
            
            
         
        
    
        
        
            
                Linux
            
            
         
        
    
        
        
            
                Cloud
            
            
         
        
    
        
        
            
                On-Premises
            
            
         
        
    
        
        
            
                iPhone
            
            
         
        
    
        
        
            
                iPad
            
            
         
        
    
        
        
            
                Android
            
            
         
        
    
        
        
            
                Chromebook
            
            
         
        
    
         | 
        
        
        
        Platforms Supported
            
                Windows
            
            
         
        
    
        
        
            
                Mac
            
            
         
        
    
        
        
            
                Linux
            
            
         
        
    
        
        
            
                Cloud
            
            
         
        
    
        
        
            
                On-Premises
            
            
         
        
    
        
        
            
                iPhone
            
            
         
        
    
        
        
            
                iPad
            
            
         
        
    
        
        
            
                Android
            
            
         
        
    
        
        
            
                Chromebook
            
            
         
        
    
         | 
        |||||
                
            
        
        Audience
        Enterprises and developers searching for a solution to manage their supply chain security operations
         
        
    
         | 
        
        
                
            
        
        Audience
        Enterprises interested in a cloud infrastructure security solution to find critical risks and infiltration vectors
         
        
    
         | 
        |||||
                
            
        
        Support
            
                Phone Support
            
            
         
        
    
        
        
            
                24/7 Live Support
            
            
         
        
    
        
        
            
                Online
            
            
         
        
    
         | 
        
        
                
            
        
        Support
            
                Phone Support
            
            
         
        
    
        
        
            
                24/7 Live Support
            
            
         
        
    
        
        
            
                Online
            
            
         
        
    
         | 
        |||||
                
            
        
        API
            
                Offers API
            
            
         
        
    
         | 
        
        
                
            
        
        API
            
                Offers API
            
            
         
        
    
         | 
        |||||
                
            
        
        Screenshots and Videos | 
        
        
                
            
        
        Screenshots and Videos | 
        |||||
                
            
        
        Pricing
        Free
        
     
    
    
        
        
            
                Free Version
            
            
         
        
    
        
        
            
                Free Trial
            
            
         
        
    
         | 
        
        
                
            
        
        Pricing
        Request Pricing
        
     
    
    
        
        
            
                Free Version
            
            
         
        
    
        
        
            
                Free Trial
            
            
         
        
    
         | 
        |||||
                
            
        
    
        
Reviews/
         | 
        
        
                
            
        
    
        
Reviews/
        
    
    
         | 
        |||||
                
            
        
        Training
            
                Documentation
            
            
         
        
    
        
        
            
                Webinars
            
            
         
        
    
        
        
            
                Live Online
            
            
         
        
    
        
        
            
                In Person
            
            
         
        
    
         | 
        
        
                
            
        
        Training
            
                Documentation
            
            
         
        
    
        
        
            
                Webinars
            
            
         
        
    
        
        
            
                Live Online
            
            
         
        
    
        
        
            
                In Person
            
            
         
        
    
         | 
        |||||
                
            
        
        Company InformationLineaje 
    
    United States 
    www.lineaje.com 
         | 
        
        
                
            
        
        Company InformationWiz 
    
    Founded: 2020 
    
    United States 
    www.wiz.io 
         | 
        |||||
                
            
            
    
        
        
        
            Alternatives | 
        
        
                
            
            
    
        
        
        
            Alternatives | 
        |||||
| 
                
            
            
    
        
        
        
        
             | 
        
        ||||||
| 
                
            
            
    
        
        
        
        
             | 
        
        ||||||
| 
                
            
            
    
        
        
        
        
             | 
        ||||||
| 
                
            
            
    
        
        
        
        
             | 
        ||||||
                
            
        
    
        Categories | 
        
        
                
            
        
    
        Categories | 
        |||||
                
            
        
    
        
            
            
                
                    
                
                Cloud Security Features
            
                Antivirus
            
            
         
        
    
        
        
            
                Application Security
            
            
         
        
    
        
        
            
                Behavioral Analytics
            
            
         
        
    
        
        
            
                Encryption
            
            
         
        
    
        
        
            
                Endpoint Management
            
            
         
        
    
        
        
            
                Incident Management
            
            
         
        
    
        
        
            
                Intrusion Detection System
            
            
         
        
    
        
        
            
                Threat Intelligence
            
            
         
        
    
        
        
            
                Two-Factor Authentication
            
            
         
        
    
        
        
            
                Vulnerability Management
            
            
         
        
    
                    Cloud Workload Protection Features
            
                Anomaly Detection
            
            
         
        
    
        
        
            
                Asset Discovery
            
            
         
        
    
        
        
            
                Cloud Gap Analysis
            
            
         
        
    
        
        
            
                Cloud Registry
            
            
         
        
    
        
        
            
                Data Loss Prevention (DLP)
            
            
         
        
    
        
        
            
                Data Security
            
            
         
        
    
        
        
            
                Governance
            
            
         
        
    
        
        
            
                Logging & Reporting
            
            
         
        
    
        
        
            
                Machine Learning
            
            
         
        
    
        
        
            
                Security Audit
            
            
         
        
    
        
        
            
                Workload Diversity
            
            
         
        
    
                    Container Security Features
            
                Access Roles / Permissions
            
            
         
        
    
        
        
            
                Application Performance Tracking
            
            
         
        
    
        
        
            
                Centralized Policy Management
            
            
         
        
    
        
        
            
                Container Stack Scanning
            
            
         
        
    
        
        
            
                Image Vulnerability Detection
            
            
         
        
    
        
        
            
                Reporting
            
            
         
        
    
        
        
            
                Testing
            
            
         
        
    
        
        
            
                View Container Metadata
            
            
         
        
    
                    Cybersecurity Features
            
                AI / Machine Learning
            
            
         
        
    
        
        
            
                Behavioral Analytics
            
            
         
        
    
        
        
            
                Endpoint Management
            
            
         
        
    
        
        
            
                Incident Management
            
            
         
        
    
        
        
            
                IOC Verification
            
            
         
        
    
        
        
            
                Tokenization
            
            
         
        
    
        
        
            
                Vulnerability Scanning
            
            
         
        
    
        
        
            
                Whitelisting / Blacklisting
            
            
         
        
    
                    IT Security Features
            
                Anti Spam
            
            
         
        
    
        
        
            
                Anti Virus
            
            
         
        
    
        
        
            
                Email Attachment Protection
            
            
         
        
    
        
        
            
                Event Tracking
            
            
         
        
    
        
        
            
                Internet Usage Monitoring
            
            
         
        
    
        
        
            
                Intrusion Detection System
            
            
         
        
    
        
        
            
                IP Protection
            
            
         
        
    
        
        
            
                Spyware Removal
            
            
         
        
    
        
        
            
                Two-Factor Authentication
            
            
         
        
    
        
        
            
                Vulnerability Scanning
            
            
         
        
    
        
        
            
                Web Threat Management
            
            
         
        
    
        
        
            
                Web Traffic Reporting
            
            
         
        
    
                    Identity Management Features
            
                Access Certification
            
            
         
        
    
        
        
            
                Compliance Management
            
            
         
        
    
        
        
            
                Multifactor Authentication
            
            
         
        
    
        
        
            
                Password Management
            
            
         
        
    
        
        
            
                Privileged Account Management
            
            
         
        
    
        
        
            
                Self-Service Access Request
            
            
         
        
    
        
        
            
                Single Sign On
            
            
         
        
    
        
        
            
                User Activity Monitoring
            
            
         
        
    
        
        
            
                User Provisioning
            
            
         
        
    
                    Patch Management Features
            
                Alerts/Notifications
            
            
         
        
    
        
        
            
                Automatic Approval
            
            
         
        
    
        
        
            
                Automatic Patch Deployment
            
            
         
        
    
        
        
            
                Automatic Scans
            
            
         
        
    
        
        
            
                Compliance Management
            
            
         
        
    
        
        
            
                Custom Patches
            
            
         
        
    
        
        
            
                Dashboard
            
            
         
        
    
        
        
            
                Network Wide Management
            
            
         
        
    
        
        
            
                Patch Prioritization
            
            
         
        
    
        
        
            
                Patch Testing
            
            
         
        
    
        
        
            
                Remote Access/Control
            
            
         
        
    
        
        
            
                Vulnerability Scanning
            
            
         
        
    
                    Vulnerability Management Features
            
                Asset Discovery
            
            
         
        
    
        
        
            
                Asset Tagging
            
            
         
        
    
        
        
            
                Network Scanning
            
            
         
        
    
        
        
            
                Patch Management
            
            
         
        
    
        
        
            
                Policy Management
            
            
         
        
    
        
        
            
                Prioritization
            
            
         
        
    
        
        
            
                Risk Management
            
            
         
        
    
        
        
            
                Vulnerability Assessment
            
            
         
        
    
        
        
            
                Web Scanning
            
            
         
        
    
                    Vulnerability Scanners Features
            
                Asset Discovery
            
            
         
        
    
        
        
            
                Black Box Scanning
            
            
         
        
    
        
        
            
                Compliance Monitoring
            
            
         
        
    
        
        
            
                Continuous Monitoring
            
            
         
        
    
        
        
            
                Defect Tracking
            
            
         
        
    
        
        
            
                Interactive Scanning
            
            
         
        
    
        
        
            
                Logging and Reporting
            
            
         
        
    
        
        
            
                Network Mapping
            
            
         
        
    
        
        
            
                Perimeter Scanning
            
            
         
        
    
        
        
            
                Risk Analysis
            
            
         
        
    
        
        
            
                Threat Intelligence
            
            
         
        
    
        
        
            
                Web Inspection
            
            
         
        
    
                     | 
        ||||||
                
            
        
    
        Integrations
            
                
    Avalor
            
            
         
        
    
        
        
            
                
    Azure Marketplace
            
            
         
        
    
        
        
            
                
    CardinalOps
            
            
         
        
    
        
        
            
                
    Cogent Security
            
            
         
        
    
        
        
            
                
    Cyera
            
            
         
        
    
        
        
            
                
    DataBahn
            
            
         
        
    
        
        
            
                
    Docker
            
            
         
        
    
        
        
            
                
    Google Cloud Platform
            
            
         
        
    
        
        
            
                
    Jira Work Management
            
            
         
        
    
        
        
            
                
    Longbow
            
            
         
        
    
                
                    
    
        
        
        
    
        
        
        
    
        
        
        
    
        
        
        
    
        
        
        
    
        
        
        
    
        
        
        
    
        
        
        
    
        
        
        
    
        
        
        
    
                
             | 
        
        
                
            
        
    
        Integrations
            
                
    Avalor
            
            
         
        
    
        
        
            
                
    Azure Marketplace
            
            
         
        
    
        
        
            
                
    CardinalOps
            
            
         
        
    
        
        
            
                
    Cogent Security
            
            
         
        
    
        
        
            
                
    Cyera
            
            
         
        
    
        
        
            
                
    DataBahn
            
            
         
        
    
        
        
            
                
    Docker
            
            
         
        
    
        
        
            
                
    Google Cloud Platform
            
            
         
        
    
        
        
            
                
    Jira Work Management
            
            
         
        
    
        
        
            
                
    Longbow
            
            
         
        
    
                
                    
    
        
        
        
    
        
        
        
    
        
        
        
    
        
        
        
    
        
        
        
    
        
        
        
    
        
        
        
    
        
        
        
    
        
        
        
    
        
        
        
    
                
             | 
        |||||
| 
                
            
        
    
     |