37 Integrations with JFrog Artifactory
View a list of JFrog Artifactory integrations and software that integrates with JFrog Artifactory below. Compare the best JFrog Artifactory integrations as well as features, ratings, user reviews, and pricing of software that integrates with JFrog Artifactory. Here are the current JFrog Artifactory integrations in 2026:
-
1
Kantata
Kantata
Kantata helps professional services organizations of 50 to 5,000+ employees ensure consistent excellence and profitability across every project. By connecting scoping, resourcing, and forecasting in one platform, you can always deliver amazing. Most PS organizations struggle with unpredictable projects that erode margins, strain resources, and weaken client trust. Kantata PSA puts an end to unpredictable projects by enabling you to: • Instantly assemble the ideal team based on skills, availability, and scope • Easily amplify institutional knowledge by turning past experience into real-time intelligence • Confidently forecast every outcome with an accurate view of everything from revenue and margins to capacity and sentiment -
2
Reo.Dev
Reo.Dev
Reo.Dev helps Go-To-Market teams unlock and act on developer intent signals across the full funnel. It deanonymizes your pipeline by revealing the 80% of developers who engage with your product or docs without signing up and surfaces anonymous sign-ups (like Gmail or GitHub IDs) for better clarity. By tapping into third-party signals from GitHub, LinkedIn, StackOverflow, and Reddit, it identifies high-intent leads early in their journey. You can prioritize accounts based on Dev Funnel stage, build hyper-targeted lists at both the company and individual level (with access to 25M developers across 50K skill sets), and improve outreach effectiveness by surfacing key buying signals and personalizing messaging around high-value actions—ensuring your sales team focuses where it matters most.Reo.Dev is an AI-powered revenue intelligence platform designed specifically for developer-focused companies. It tracks developer activity across multiple platforms, identifying high-intent accounts that -
3
ReleaseIQ
ReleaseIQ
ReleaseIQ helps companies accelerate software product release cycles while improving quality and efficiency with an Enterprise DevOps Platform that leverages existing CI/CD tools, if present, and: - provides visibility into every step of every pipeline, from commit to production, delivered in role-focused dashboards to ensure that all stakeholders have the same information in near real time. - integrates orchestration with intelligent diagnosis and troubleshooting to dramatically increase productivity and reduce MTTR. - highlights actionable insights to empower teams to drive continuous improvement. -
4
Snyk
Snyk
Snyk is the leader in developer security. We empower the world’s developers to build secure applications and equip security teams to meet the demands of the digital world. Our developer-first approach ensures organizations can secure all of the critical components of their applications from code to cloud, leading to increased developer productivity, revenue growth, customer satisfaction, cost savings and an overall improved security posture. Snyk’s Developer Security Platform automatically integrates with a developer’s workflow and is purpose-built for security teams to collaborate with their development teams. Snyk is used by 1,200 customers worldwide today, including industry leaders such as Asurion, Google, Intuit, MongoDB, New Relic, Revolut and Salesforce. Snyk is recognized on the Forbes Cloud 100 2021, the 2021 CNBC Disruptor 50 and was named a Visionary in the 2021 Gartner Magic Quadrant for AST.Starting Price: $0 -
5
Mend.io
Mend.io
Mend.io offers the first AI native application security platform, empowering organizations to build and run a proactive AppSec program tuned for AI powered development. The unified platform secures AI generated code and embedded AI components, drives risk reduction through AI powered remediation, automates compliance, and provides a holistic enterprise scale view of risks and clear actions for developers across your entire codebase.Starting Price: $1,000 per developer, per year -
6
Continuous delivery of any application to any environment. IBM DevOps Deploy (formerly IBM UrbanCode Deploy) is an application-release solution that combines continuous delivery and deployment automation with robust visibility, traceability and auditing capabilities. Increase frequency of software delivery through automated, repeatable deployment processes across development, testing and production. Simplify the deployment of multichannel applications to all environments, whether on premises or in the cloud, with consistency and repeatability. Use a single centralized server to manage tens of thousands of endpoints to any number of clouds, data centers or mainframes. Make processes more robust and easier to design by using tested integrations with dozens of tools and technologies, including Jira, Jenkins, Kubernetes, Microsoft, ServiceNow and WebSphere.
-
7
Opsera
Opsera
You choose your tools, we take care of the rest. Put together the perfect CI/CD stack that fits your organization’s goals with zero vendor lock-in. Eliminate manual scripts and stop building toolchain automation. Free your engineers to focus on your core business. Pipeline workflows follow a declarative model so you focus on what is required — not how it’s accomplished — including: software builds, security scans, unit testing, and deployments. With Blueprints, diagnose any failures from within Opsera using a console output of every step of your pipeline execution. Comprehensive software delivery analytics across your CI/CD process in a unified view — including Lead Time, Change Failure Rate, Deployment Frequency, and Time to Restore. Contextualized logs for faster resolution and improved auditing and compliance.Starting Price: $3.60 per user , Min 300 devs -
8
JupiterOne
JupiterOne
JupiterOne is a cyber asset analysis platform every modern security team needs to collect and transform asset data into actionable insights to secure their attack surface. JupiterOne was created to make security as simple as asking a question and getting the right answer back, with context, to make the right decision. With JupiterOne, organizations are able to see all asset data in a single place, improve confidence in choosing their priorities and optimize the deployment of their existing security infrastructure.Starting Price: $2000 per month -
9
FOSSA
FOSSA
Scalable, end-to-end management for third-party code, license compliance, and Open Source has become the critical supplier for modern software companies, changing everything about how people think about their code. FOSSA builds the infrastructure for modern teams to be successful with open source. FOSSA's flagship product helps teams track the open source used in their code and automate license scanning and compliance. Since then, over 7,000 open source projects (Kubernetes, Webpack, Terraform, ESLint) and companies ( Uber, Ford, Zendesk, Motorola) rely on FOSSA's tools to ship software. If you are in the software industry today, you're now using code that runs FOSSA. FOSSA is a venture-funded company backed by Cosanoa Ventures, Bain Capital Ventures, etc. with affiliate angels including Marc Benioff (Salesforce), Steve Chen (YouTube), Amr Awadallah (Cloudera), Jaan Tallin (Skype), and Justin Mateen (Tinder).Starting Price: $230 per month -
10
Harbor
Harbor
CNCF Harbor is an open-source project that enhances container registry capabilities with a focus on security and compliance. It builds upon basic registry functionality by offering features such as vulnerability scanning to identify known security weaknesses in images, role-based access control for granular image access management, image signing to ensure authenticity and prevent tampering, and replication for efficient syncing of images across multiple other registries. Harbor strengthens the security of the image management process. It can be particularly beneficial for organizations that prioritize security and compliance in their containerized environments. However, users should be aware that setting up and maintaining Harbor can require additional effort and expertise compared to simpler container registries. -
11
Kaholo
Kaholo
Scriptless CI/CD Automation for On-Demand Developer Portals Kaholo is a low-code IT workflow automation tool that empowers Developers to quickly self-serve environments and automate their workflows while giving Operators full visibility and control over compliance, security, and cloud costs. Key Capabilities: - Drag and drop low-code CI/CD pipelines - 150+ pre-built plugins that interact with external resources that anyone can use without proprietary knowledge, or custom-build your own - Orchestrate your existing CI/CD toolset to avoid the inefficient route of rip and replace - Extensive access permissions allow developers to safely work with and execute pipelines autonomously - Automate provisioning, testing, security scans, builds, deployments with various rollout strategies, rollbacks, cleanups, updates, troubleshooting, remediations, migrations, and more. - Integrations with all cloud providers as well on-prem environmentsStarting Price: $99 per month -
12
Cloud Maker
Cloud Maker
Diagram Driven Cloud Infrastructure - Drag and drop design, automated deployment and the benefits of Infrastructure-as-Code, without the complexity! Cloud Maker lets Solution Architects and DevOps Engineers rapidly diagram infrastructure, check for security issues with Cloud Maker Overwatch, and deploy to the Cloud at the click of a button. Under the hood, we automatically generate Infrastructure-as-Code so that you get all the benefits without having to write a single line of code. Key features and benefits: - Visually design beautiful, standardized infrastructure diagrams - Shift security left with our Overwatch design-time security scanner - Automatically generate IaC - Deploy directly to the Cloud with Cloud Maker Pipelines - Consume your designs and our deployment engine through Azure DevOps, GitHub Actions & JFrog CI/CD integrations.Starting Price: $27/user/month -
13
OpsVerse
OpsVerse
Aiden by OpsVerse is an AI-powered DevOps copilot designed to streamline workflows, automate repetitive tasks, and provide real-time insights into infrastructure and deployments. Powered by agentic AI, Aiden constantly learns from your team’s behavior and adapts to your specific needs, offering tailored responses and actions. It integrates seamlessly into your DevOps environment, proactively detecting and resolving issues, from scaling infrastructure to addressing deployment failures. Aiden ensures privacy-first design and compliance with data security policies, with deployment flexibility to fit your organization’s needs.Starting Price: $79 per month -
14
Docker Scout
Docker
Container images consist of layers and software packages, which are susceptible to vulnerabilities. These vulnerabilities can compromise the security of containers and applications. Docker Scout is a solution for proactively enhancing your software supply chain security. By analyzing your images, Docker Scout compiles an inventory of components, also known as a Software Bill of Materials (SBOM). The SBOM is matched against a continuously updated vulnerability database to pinpoint security weaknesses. Docker Scout is a standalone service and platform that you can interact with using Docker Desktop, Docker Hub, the Docker CLI, and the Docker Scout Dashboard. Docker Scout also facilitates integrations with third-party systems, such as container registries and CI platforms. Reveal and dig into the composition of your images. Ensure that your artifacts align with supply chain best practices.Starting Price: $5 per month -
15
Uptycs
Uptycs
Uptycs is the first unified CNAPP and XDR platform. Reduce risk by prioritizing responses to threats, vulnerabilities, misconfigurations, sensitive data exposure, and compliance mandates. With Uptycs, you can protect your entire enterprise, from laptops and servers to public and private cloud infrastructure. The platform streamlines your response to threats and offers a single UI and data model for easy management. Uptycs ties together threat activity as it traverses on-prem and cloud boundaries, delivering a more cohesive security posture. If you're looking for a powerful security solution that eliminates silos and tool sprawl, Uptycs is the answer. Looking for acronym coverage? We have you covered, including CNAPP, CWPP, CSPM, KSPM, CIEM, CDR, and XDR. Start with your Detection Cloud, Google-like search, and the attack surface coverage you need today. Be ready for what’s next. Shift up with Uptycs. -
16
TruffleHog
Truffle Security
TruffleHog runs behind the scenes to scan your environment for secrets like private keys and credentials, so you can protect your data before a breach occurs. Secrets can be found anywhere, so TruffleHog scans more than just code repositories, including SaaS and internally hosted software. With support for custom integrations and new integrations added all the time, you can secure your secrets across your entire environment. TruffleHog is developed by a team entirely comprised of career security experts. Security is our passion and primary concern, and all features are developed with best practices in mind. TruffleHog enables you to track and manage secrets within our intuitive management interface, including links to exactly where secrets have been found. Authenticate with secure OAuth workflows for users and never worry about username and password breaches. -
17
Legit Security
Legit Security
Legit Security protects software supply chains from attack by automatically discovering and securing the pipelines, infrastructure, code and people so that businesses can stay safe while releasing software fast. Automatically discover security issues, remediate threats and ensure the integrity and compliance of software releases. Comprehensive, visual SDLC inventory that's continually updated. Reveal unknown, misconfigured and vulnerable SDLC systems and infrastructure. Centralized visibility over location, coverage and configuration of your existing security tools and scanners. Catch insecure build actions before they can embed vulnerabilities downstream. Centralized, early prevention of sensitive data leaks, secrets and PII, before being pushed into the SDLC. Track security trends across teams and product lines to improve security posture and incentivize behavior. Get security posture at-a-glance with Legit Security Scores, Integrate your own alert and ticketing tools or use ours. -
18
JFrog
JFrog
Fully automated DevOps platform for distributing trusted software releases from code to production. Onboard DevOps projects with users, resources and permissions for faster deployment frequency. Fearlessly update with proactive identification of open source vulnerabilities and license compliance violations. Achieve zero downtime across your DevOps pipeline with High Availability and active/active clustering for your enterprise. Control your DevOps environment with out-of-the-box native and ecosystem integrations. Enterprise ready with choice of on-prem, cloud, multi-cloud or hybrid deployments that scale as you grow. Ensure speed, reliability and security of IoT software updates and device management at scale. Create new DevOps projects in minutes and easily onboard team members, resources and storage quotas to get coding faster.Starting Price: $98 per month -
19
Klera
Klera
Klera is a software products and services company focused on creating solutions that deliver intelligence from data, unlike ever before. We enable transparent, collaborative, and connected enterprises, without data silos. Our rapid, no code, intelligent application development platform simplifies how you gather, analyze, and synchronize data.Starting Price: $900 per month -
20
Sysdig Monitor
Sysdig
Kubernetes and cloud monitoring with a managed Prometheus service. Sysdig Monitor makes it easy to find detailed information about your Kubernetes environment. Bonus: We are fully Prometheus compatible! See all Kubernetes details in one place and troubleshoot Kubernetes errors up to 10x faster. Prometheus made simple with a managed service. Scale quickly with out-of-the-box dashboards, alerts, and integrations. Reduce wasted spending by 40% on average and save with low-cost custom metrics. Troubleshoot Kubernetes errors faster with a prioritized list of issues, pod details, live logs, and remediation steps. Our managed Prometheus service saves time! Use our scalable data store, automatic service discovery, and assisted integration deployment. Keep your PromQL and Grafana dashboards. Dashboards are available out of the box and you can customize any dashboard easily. Alerts are highly configurable and ready to integrate into your alert management system. -
21
Moderne
Moderne
Reduce 1000s of hours of static code analysis fixes to minutes. Patch security vulnerabilities across 100s of repositories at once. Moderne automates code remediation tasks for you, enabling developers to deliver more business value all the time. Automatically make safe, sweeping changes to your codebase that improve the quality, security, and cost of code. Manage dependencies of your software supply chain, keeping software up to date continuously. Alleviate code smells automatically without all the scanning noise of SAST and SCA tools. Work in high-quality code all the time. Find and fix CVEs automatically across repositories, it's the ultimate shift left for security. The reality of modern applications is that they naturally accrue technical debt. They are composed of large and diverse codebases and ecosystems, and a supply chain of custom, third-party, and open-source software. -
22
JFrog Connect
JFrog
JFrog Connect's unique design takes less than a minute to connect any type of Linux or IoT device. Need to add a thousand devices? Embed the Connect Agent to the image, and you’re ready to go. Comprehensive device management enables you to categorize fleet devices into logical groups and subgroups, making it easy to monitor, manage and update efficiently. Gain complete visibility of your fleet devices at scale. Monitor device resources (CPU, RAM, Disk), state and applications, with automated alerts to keep devices safe, stable and address issues before they become escalations. Securely troubleshoot and resolve device issues from anywhere in the world using SSH, VNC, port forwarding and remote Bash commands. JFrog Connect is a vital component of the JFrog Platform, providing prebuilt integrations with JFrog Artifactory and JFrog Xray, helping organizations deliver updates faster, continuously and securely at every stage of the software lifecycle, from development to deployment. -
23
Quickwork
Quickwork
Enterprises use Quickwork to build simple and complex workflows, create and publish secure APIs, and manage conversational interactions with customers, employees, and partners to provide a great user experience. Quickwork provides an all-in-one platform with the tools and services you need to build powerful & scalable integrations, serverless APIs, conversational experiences, and a lot more. Simply drag and drop the applications you wish to use to build powerful integrations without writing a single line of code. Choose from 1,000s of business, consumer, AI, analytics, messaging, and IoT apps to create an automated workflow you can imagine. Convert any workflow into an API with Quickwork’s single-click API management. Share your APIs securely with built-in authentication mechanisms and scale elastically with our serverless infrastructure. Build and manage real-time conversational and messaging workflows with human agents, chatbots, and IoT devices across multiple channels.Starting Price: $20 per month -
24
Digital.ai Release
Digital.ai
Digital.ai Release (formerly XebiaLabs XL Release) is a release management tool specifically for CD. It enables teams across an organization to model & monitor releases, automate tasks within IT infrastructure, and cut release times by analyzing and improving release processes. Automate, orchestrate and get visibility into your release pipelines – at enterprise scale. Manage the most advanced release pipelines with ease. Plan, automate, and analyze the entire software release pipeline. Control and optimize software delivery. Always know the status of automated and manual steps across the release pipeline. Identify bottlenecks, reduce errors, and lower the risk of release failures. Monitor your entire release pipeline to get a clear view and up-to-date status information across tools and systems, from code to production. Customize dashboards to highlight the most important information for each release. -
25
Sonatype Lifecycle
Sonatype
Sonatype Lifecycle is a leading software composition analysis (SCA) platform designed to secure applications by automating dependency management and vulnerability monitoring. It provides real-time alerts and in-depth analytics to help developers identify and fix security risks across the software development lifecycle (SDLC). With features like automated patching, customizable policies, and SBOM (Software Bill of Materials) management, Sonatype helps businesses integrate secure open-source components without compromising speed. The platform enhances DevOps workflows by offering insights into dependencies, minimizing risks, and ensuring compliance, all while speeding up development. -
26
Seeker
Black Duck
Seeker® is an interactive application security testing (IAST) solution that provides unparalleled visibility into your web application's security posture. It identifies vulnerability trends against compliance standards such as OWASP Top 10, PCI DSS, GDPR, CAPEC, and CWE/SANS Top 25. Seeker enables security teams to track sensitive data, ensuring it is handled securely and not stored in log files or databases without proper encryption. Its seamless integration into DevOps CI/CD workflows allows for continuous application security testing and verification. Unlike other IAST solutions, Seeker not only identifies security vulnerabilities but also verifies their exploitability, providing developers with a prioritized list of confirmed issues to address. By employing patented methods, Seeker processes extensive HTTP(S) requests swiftly, reducing false positives to near zero and enhancing productivity while minimizing business risk. -
27
Ozone
Ozone
Ozone platform helps enterprises to ship modern applications quickly, securely and reliably. Ozone removes the unwanted headache of managing too many DevOps tools and makes it super easy for anyone to deploy applications on Kubernetes clusters. Just integrate all your existing DevOps tools and automate your application delivery process end-to-end. Accelerate deployments with automated pipeline workflows and on demand infrastructure management with zero downtime. Prevent business losses by enforcing governance and compliance policy for app deployments at scale. Single pane of glass where engineering, DevOps and Security teams can collaborate on application releases in realtime. -
28
HostAccess
Perforce
HostAccess is PC terminal emulation software. It offers a suite of terminal emulation tools for Microsoft Windows users. This allows secure access to various platforms, including Linux, Unix, IBM, Windows, etc. The main usage of the HostAccess is to connect to PICK (multivalue) system, such as UniVerse, UniData, D3, ONware, etc., and use own package of programs written in PICK Basic. These programs provide APIs for data exchange and expansive GUI capabilities. Produce reports quickly and integrate data with Windows applications. Connect to multiple systems within one integrated environment. HostAccess offers all the key terminal emulation software features you need in a single page. So, whether you’re looking for asynchronous/synchronous connections, server-based administration, concurrent users, or multiple session access, HostAccess is an ideal solution for you. -
29
Kubermatic Kubernetes Platform
Kubermatic
Kubermatic Kubernetes Platform (KKP) helps enterprises successfully drive digital transformation by automating their cloud operations anywhere. KKP enables operations and DevOps teams to centrally manage VMs and containerized workloads across hybrid-cloud, multi-cloud, and edge environments with an intuitive self-service developer and operations portal. Kubermatic Kubernetes Platform is open source. Automate operations of thousands of Kubernetes clusters across multi-cloud, on-prem, and edge environments with unparalleled density and resilience. Setup and run your multicloud self service Kubernetes platform with the shortest time to market. Empower your developers and operations team to deploy their clusters in less than three minutes on any infrastructure. Centrally manage your workloads from a single dashboard with a consistent experience from cloud to on-prem to edge. Manage your cloud native stack at scale with enterprise level governance. -
30
ActiveState
ActiveState
ActiveState provides software development teams with the world's most comprehensive library of secure and trusted open source, over 79 million vetted components across all major language ecosystems (e.g., Java, Javascript, Python, R, Go, etc.), including transitive dependencies and OS-level libraries. By building everything from source, we ensure that every component is what it says it is, contains the fewest amount of vulnerabilities, and is continuously remediated. Companies can consume this open source where and when they need it - through their existing artifact repositories, as container images or managed distributions, or via IDPs. When teams transfer their open source responsibility to ActiveState, developers and security teams break free from the endless cycle of vulnerability management. Developers gain confidence knowing their code will make it to production faster and with less friction. Security gains assurance that policy and compliance standards are met by default. -
31
Maverix
Maverix
Maverix blends itself into the existing DevOps process, brings all required integrations with software engineering and application security tools, and manages the application security testing process end to end. AI-based automation for security issues management including detection, grouping, prioritization, filtration, synchronization, control of fixes, and support of mitigation rules. Best-in-class DevSecOps data warehouse for full visibility into application security improvements over time and team efficiency. Security issues can be easily tracked, triaged, and prioritized – all from a single user interface for the security team, with integrations to third-party products. Gain full visibility into application production readiness and application security improvements over time. -
32
Fianu
Fianu
Fianu monitors activity throughout your DevOps toolchain and generates an immutable, context-aware ledger of attestations that tells the story of your software leading up to production. Capture key security data points using pre-built integrations with your favorite security tools. Monitor and enforce best practices such as code review, branching strategy, and versioning scheme. Ensure software meets necessary functional, performance, and accessibility standards. Create or configure custom controls to meet the unique needs of your company. Out-of-the-box tooling to help you secure your software supply chain from development, to build, to deployment. Configurable control requirements and thresholds provide executives, managers, and stakeholders with the knobs and dials necessary to fine-tune compliance to your company's needs. -
33
DROPS
DROPS
DROPS is a release management tool designed to simplify, secure, and centralize the deployment of applications across data centers, hybrid, and multi-cloud infrastructures. It supports a wide range of platforms, integrates seamlessly with various CI/CD pipelines, and offers both agent-based and agentless operations. With features like full-stack release management, automated infrastructure provisioning, and 24/7 availability, DROPS aims to streamline deployment processes and ensure consistent, reliable delivery. The tool is flexible enough to manage both legacy and modern applications, catering to diverse enterprise needs. Select agent-based or agentless operation. No need for agent installation and management. DROPS adapts to your configuration and if agents are needed, they are provisioned automatically. Plan and organize your application deployment from the web console with no scripting needed. Ease collaboration between stakeholders and technical teams. -
34
ModelOp
ModelOp
ModelOp is the leading AI governance software that helps enterprises safeguard all AI initiatives, including generative AI, Large Language Models (LLMs), in-house, third-party vendors, embedded systems, etc., without stifling innovation. Corporate boards and C‑suites are demanding the rapid adoption of generative AI but face financial, regulatory, security, privacy, ethical, and brand risks. Global, federal, state, and local-level governments are moving quickly to implement AI regulations and oversight, forcing enterprises to urgently prepare for and comply with rules designed to prevent AI from going wrong. Connect with AI Governance experts to stay informed about market trends, regulations, news, research, opinions, and insights to help you balance the risks and rewards of enterprise AI. ModelOp Center keeps organizations safe and gives peace of mind to all stakeholders. Streamline reporting, monitoring, and compliance adherence across the enterprise. -
35
Azure Marketplace
Microsoft
Azure Marketplace is a comprehensive online store that provides access to thousands of certified, ready-to-use software applications, services, and solutions from Microsoft and third-party vendors. It enables businesses to discover, purchase, and deploy software directly within the Azure cloud environment. The marketplace offers a wide range of products, including virtual machine images, AI and machine learning models, developer tools, security solutions, and industry-specific applications. With flexible pricing options like pay-as-you-go, free trials, and subscription models, Azure Marketplace simplifies the procurement process and centralizes billing through a single Azure invoice. It supports seamless integration with Azure services, enabling organizations to enhance their cloud infrastructure, streamline workflows, and accelerate digital transformation initiatives. -
36
ThreatStryker
Deepfence
Runtime attack analysis, threat assessment, and targeted protection for your infrastructure and applications. Stay ahead of attackers and neutralize zero-day attacks. Observe attack behavior. ThreatStryker observes, correlates, learns and acts to protect your applications and keep you one step ahead of attackers. Deepfence ThreatStryker discovers all running containers, processes, and online hosts, and presents a live and interactive color-coded view of the topology. It audits containers and hosts to detect vulnerable components and interrogates configuration to identify file system, process, and network-related misconfigurations. ThreatStryker assesses compliance using industry and community standard benchmarks. ThreatStryker performs deep inspection of network traffic, system, and application behavior, and accumulates suspicious events over time. Events are classified and correlated against known vulnerabilities and suspicious patterns of behavior. -
37
ThreatMapper
Deepfence
Open source, multi-cloud platform for scanning, mapping, and ranking vulnerabilities in running containers, images, hosts, and repositories. ThreatMapper discovers the threats to your applications in production, across clouds, Kubernetes, serverless, and more. What you cannot see, you cannot secure. ThreatMapper auto-discovers your production infrastructure. It identifies and interrogates cloud instances, Kubernetes nodes, and serverless resources, discovering the applications and containers and mapping their topology in real-time. Use ThreatMapper to discover and visualize the external and internal attack surface for your applications and infrastructure. Exploiting known vulnerabilities in common dependencies is one of the easiest ways for bad actors to gain a foothold within your infrastructure. ThreatMapper scans hosts, containers, and applications for known vulnerable dependencies, taking threat feeds from over 50 different sources.
- Previous
- You're on page 1
- Next