Alternatives to Nucleus
Compare Nucleus alternatives for your business or organization using the curated list below. SourceForge ranks the best alternatives to Nucleus in 2026. Compare features, ratings, user reviews, pricing, and more from Nucleus competitors and alternatives in order to make an informed decision for your business.
-
1
Aikido Security
Aikido Security
Secure your code, cloud, and runtime in one central system. Aikido’s all-in-one security platform is loved by developers and security teams alike with full security visibility, insight in what matters most, and fast/automatic vulnerability fixes. Teams get security done with Aikido thanks to: - False-positive reduction - AI Autotriage & AI Autofix - Deep integration into the dev workflow (from IDEs and task managers to CI/CD gating) - AI Pentests - Automated Compliance Aikido covers the entire Software Development Lifecycle (SDLC), including: static application security testing (SAST), dynamic application security testing (DAST), infrastructure-as-code (IaC), container scanning, secrets detection, open source license scanning (SCA), cloud posture management (CSPM), runtime protection, AI pentests, and more. -
2
Axe Credit Portal
Axe Finance
Founded in 2004, Axe Finance is a global market-leading software provider focused on credit risk automation for lenders looking to offer an efficient, competitive, and seamless omnichannel financing journey. Axe Finance developed Axe Credit Portal – ACP – a future-proof, AI-driven solution that automates the loan process from KYC to servicing, including scoring, automatic decisioning, limit management, and collateral management. ACP is a locally hosted or cloud-based solution designed to help lenders deliver an efficient, competitive, and seamless omnichannel financing experience across all client segments (Retail, Commercial, Corporate, Sovereign, FIs, microfinance, embedded financing, Islamic finance, green loans, etc.) Axe Finance is the trusted partner of leading global banking institutions such as Société Générale, OTP Bank, APS Bank, Arab National Bank, Al Rajhi Bank, QNB, ADCB, FAB, BBK, Bangkok Bank, Vietcombank, VIB, Fidelity Bank, Polaris Bank, among many others. -
3
Vulcan Cyber
Vulcan Cyber
At Vulcan Cyber we’re changing the way businesses reduce cyber risk through vulnerability remediation orchestration. We help IT security teams go beyond remedial vulnerability management to help them drive vulnerability remediation outcomes. The Vulcan platform consolidates vulnerability and asset data, with threat intelligence and customizable risk parameters to deliver risk-based vulnerability prioritization insights. But we don't stop there. Vulcan remediation intelligence takes the vulnerabilities that matter to your business and attaches the remedies and fixes needed to mitigate the threat. Then Vulcan orchestrates and measures the rest of the remediation process with integrations and inputs into application security, DevSecOps, patch management, configuration management, and cloud security tools, teams and functions. From scan to fix, Vulcan Cyber delivers the unique ability to orchestrate the entire vulnerability remediation process to GET FIX DONE at scale.Starting Price: $999 / month -
4
Finite State
Finite State
Finite State manages risk across the software supply chain with comprehensive SCA and SBOMs for the connected world. By providing end-to-end SBOM solutions, Finite State enables Product Security teams to meet regulatory, customer, and security demands. Finite State's best-in-class binary SCA creates visibility into any-party software that enables Product Security teams to understand their risk in context and shift right on vulnerability detection. With visibility, scalability, and speed, Finite State correlates data from all of your security tools into a single pane of glass for maximum visibility. -
5
Cyberint Argos Platform
Cyberint
Cyberint is a global threat intelligence provider focusing on helping its clients to proactively protect their businesses against cyber threats coming from beyond the traditional security perimeters. Manage exposure, prioritize threats, and reduce cyber risk with Argos, Cyberint’s Impactful Intelligence platform. Protect your organization from an array of external cyber risks with a single comprehensive solution. Continuously uncover known and unknown vulnerabilities and weaknesses. From exposed web Interfaces and cloud Storage exposure to email security issues and open ports, Argos’ autonomous discovery maps out your external exposures and prioritize for impactful remediation. Cyberint serves leading brands worldwide including Fortune 500 companies across industries such as finance, retail, ecommerce, gaming, media, and more. -
6
SanerNow
SecPod Technologies
SecPod SanerNow is the world's best unified endpoint security & management platform that powers IT/Security Teams automate cyber hygiene practices. It works on an intelligent agent-server model to execute effective endpoint management and security. It gives you accurate vulnerability management with scanning, detection, assessment, prioritization, and remediation capabilities. SanerNow is available on both cloud and on-premise, whose integrated patch management automates patching across all major OSs like Windows, MAC, Linux, and a vast collection of 3rd party software patches. What makes it unique? You can now access other salient features like security compliance management, IT asset management, endpoint management, software deployment, application & device control, and endpoint threat detection and response, all on a single platform. With SanerNow, you can remotely perform and automate these tasks to secure your systems from the emerging wave of cyberattacks.Starting Price: $50/year/device -
7
Apiiro
Apiiro
Complete risk visibility with every change, from design to code to cloud. Industry-first Code Risk Platform™ A 360° view of security & compliance risks across applications, infrastructure, developers’ knowledge & business impact. Data-driven decisions are better decisions. Understand your security & compliance risks with a real-time inventory of apps & infra code behavior, devs knowledge, 3rd-party security alerts & business impact. From design to code to cloud. Security architects don’t have time to review every change & investigate every alert. Make the most of their expertise by analyzing context across developers, code & cloud to identify risky material changes & automatically build an actionable workplan. No one likes manual risk questionnaires, security & compliance reviews - they’re tedious, inaccurate & not synced with the code. When the code is the design, we must do better - trigger contextual & automatic workflows. -
8
OX Security
OX Security
Automatically block risks introduced into the pipeline and ensure the integrity of each workload, all from a single location. Full visibility and end to end traceability over your software pipeline security from cloud to code. Manage your findings, orchestrate DevSecOps activities, prevent risks and maintain software pipeline integrity from a single location. Remediate risks based on prioritization and business context. Automatically block vulnerabilities introduced into your pipeline. Immediately identify the “right person” to take action on any security exposure. Avoid known security risks like Log4j and Codecov. Prevent new attack types based on proprietary research and threat intel. Detect anomalies like GitBleed. Ensure the security and integrity of all cloud artifacts. Undertake security gap analysis and identify any blind spots. Auto-discovery and mapping of all applications.Starting Price: $25 per month -
9
Ivanti
Ivanti
Ivanti offers integrated IT management solutions designed to automate and secure technology across organizations. Their Unified Endpoint Management platform provides intuitive control from a single console to manage any device from any location. Ivanti’s Enterprise Service Management delivers actionable insights to streamline IT operations and improve employee experiences. The company also provides comprehensive network security and exposure management tools to protect assets and prioritize risks effectively. Trusted by over 34,000 customers worldwide, including Conair and City of Seattle, Ivanti supports secure, flexible work environments. Their solutions enable businesses to boost productivity while maintaining strong security and operational visibility. -
10
ArmorCode
ArmorCode
Centralize all AppSec findings (SAST, DAST, SCA, etc) and correlate with infrastructure and cloud security vulnerabilities to get a 360o view of you application security posture. Normalize, de-dup and correlate findings to improve risk mitigation efficiency and prioritize the findings that impact the business. A single source of truth for findings and remediations from across tools, teams and applications. AppSecOps is the process of identifying, prioritizing, remediating and preventing Security breaches, vulnerabilities and risks - fully integrated with existing DevSecOps workflows, teams and tools An AppSecOps platform enables security teams to scale their ability to successfully identify, remediate and prevent high-priority application level security, vulnerability, and compliance issues, as well as identify and eliminate coverage gaps. -
11
Phoenix Security
Phoenix Security
Phoenix Security enables security, developers, and businesses to all talk the same language. We help security professionals focus on the vulnerabilities that matter most across cloud, infrastructure, and application security. Laser focuses on the 10% of vulnerabilities that matter today, and reduces risk faster with prioritized contextualized vulnerabilities. Threat intelligence automatically in the risk improves efficiency enabling fast reaction. Threat intelligence automatically in the risk improves efficiency enabling fast reaction. Aggregate, correlate and contextualize multiple security tools and data sources, providing your business with unprecedented visibility. Break down the silos between application security, operational security, and the business.Starting Price: $3,782.98 per month -
12
Ivanti Neurons
Ivanti
Power and protect your teams from cloud to edge with Ivanti Neurons, the hyperautomation platform for the Everywhere Workplace. Delivering the power of self-healing has never been so simple. What if you could discover and fix issues automatically before your users even know about them? Ivanti Neurons does just that. Powered by machine-learning and deep intelligence, it lets you remediate issues preemptively before they slow your productivity. Take troubleshooting off your agenda and deliver better experiences, everywhere your business works. Ivanti Neurons fuels your IT with real-time intelligence you can act on, enables devices to self-heal and self-secure, and provides users with a personalized self-service experience. Empower your users, your team and your business to do more, everywhere, with Ivanti Neurons. Ivanti Neurons delivers value from day one by providing real-time insights that let you thwart risks and prevent breaches in seconds, not minutes. -
13
Faraday
Faraday
In today’s dynamic world, security is no longer about fortifying rigid structures. It’s about keeping watch and securing change. Carry out a continuous evaluation of your attack surface with techniques and methodologies used by real attackers. Always keep track of your dynamic attack surface to guarantee constant coverage. Full coverage requires using several scanners. Let us pinpoint crucial data from an overwhelming amount of results. Our Technology allows you to define and execute your own actions from different sources with your own schedule and automatically import outputs into your repository. With +85 plugins, an easy-to-use Faraday-Cli, a RESTful API, and a flexible scheme to develop your own agents, our platform brings a unique alternative to creating your own automated and collaborative ecosystem.Starting Price: $640 per month -
14
Maverix
Maverix
Maverix blends itself into the existing DevOps process, brings all required integrations with software engineering and application security tools, and manages the application security testing process end to end. AI-based automation for security issues management including detection, grouping, prioritization, filtration, synchronization, control of fixes, and support of mitigation rules. Best-in-class DevSecOps data warehouse for full visibility into application security improvements over time and team efficiency. Security issues can be easily tracked, triaged, and prioritized – all from a single user interface for the security team, with integrations to third-party products. Gain full visibility into application production readiness and application security improvements over time. -
15
Boman.ai
Boman.ai
Boman.ai can be integrated in your CI/CD pipeline with few commands and minimum configuration. No planning or expertise is needed. Boman.ai brings SAST, DAST, SCA, and secret scans all packaged in one integration. It can support multiple development languages. Boman.ai minimizes your application security expenses by utilizing open-source scanners. You don’t need to buy expensive application security tools. Boman.ai is powered by AI/ML that removes false positives and correlates results to help you in prioritization and fixes. The SaaS platform presents a dashboard for all your scan results in one place. Correlate the results and get insights for better application security. Manage vulnerabilities reported by the scanner. The platform helps to prioritize, triage, and remediate vulnerabilities. -
16
Rezilion
Rezilion
Automatically detect, prioritize and remediate software vulnerabilities with Rezilion’s Dynamic SBOM. Focus on what matters, eliminate risk quickly, and free up time to build. In a world where time is of the essence, why sacrifice security for speed when you can have both? Rezilion is a software attack surface management platform that automatically secures the software you deliver to customers, giving teams time back to build. Rezilion is different from other security tools that create more remediation work. Rezilion reduces your vulnerability backlogs. It works across your stack, helping you to know what software is in your environment, what is vulnerable, and what is actually exploitable, so you can focus on what matters and remediate automatically. Create an instant inventory of all of the software components in your environment. Know which of your software vulnerabilities are exploitable, and which are not, through runtime analysis. -
17
Tenable One
Tenable
Tenable One radically unifies security visibility, insight and action across the attack surface, equipping modern organizations to isolate and eradicate priority cyber exposures from IT infrastructure to cloud environments to critical infrastructure and everywhere in between. The world’s only AI-powered exposure management platform. See every asset across your entire attack surface—from cloud environments to operational technologies, infrastructure to containers, and remote workers to modern web-apps with Tenable's market-leading vulnerability management sensors. With more than 20 trillion aspects of threat, vulnerability, misconfiguration and asset information, Tenable’s machine-learning powered predictions reduce remediation efforts by enabling you to focus first on the risks that matter most. Drive improvements required to reduce the probability of a business-impacting cyber event from occurring by communicating objective measures of risk. -
18
Enso
Enso Security
Enso is transforming application security by empowering organizations to build, manage and scale their AppSec programs. Its Application Security Posture Management (ASPM) platform easily deploys into an organization’s environment to create an actionable, unified inventory of all application assets, their owners, security posture and associated risk. With Enso Security, AppSec teams gain the capacity to manage the tools, people and processes involved in application security, enabling them to build a simplified, agile and scalable application security program without interfering with development. Enso has been recognized with numerous awards including the 2022 Excellence Awards, Globee Awards, and Forbes Top 20 Cybersecurity Startups to Watch. -
19
Kondukto
Kondukto
The Kondukto platform’s flexible design allows you to create custom workflows for responding to risks quickly and efficiently. Take advantage of more than 25 built-in open-source tools ready to run SAST, DAST, SCA, and Container Image scans within minutes without a need for installation, maintenance, or updates. Protect your corporate memory from changes in employees, scanners, or DevOps tools. All security data, statistics, and activities in one place for you to own. Avoid vendor lock or loss of historical data when you need to change an AppSec tool. Verify fixes automatically to ensure better collaboration and less distraction. Boost efficiency by eliminating redundant conversations between AppSec and development teams.Starting Price: $12,000 per annually -
20
Nucleus
Momentive Software
Your members create a treasure trove of data. How are you mining it? Association analytics allow you to track and act on your organization’s most important KPIs by centralizing, blending, and analyzing your data all in one place with Nucleus. Set goals, measure the impact of your programs, and make informed decisions that delight your constituents and advance your mission. Unlike complex tools that end up sitting on a shelf, Nucleus encourages widespread engagement and adoption. It’s quick to implement, requires no training, and demonstrates value almost immediately. Nucleus is for everyone, providing association analytics to everyone from the marketing intern to the executive director. With Nucleus, analytics for associations is easy and comprehensive, combining out-of-the-box member industry data visualizations with unlimited flexibility. -
21
BoostSecurity
BoostSecurity
BoostSecurity® enables early detection and remediation of security vulnerabilities at DevOps velocity while ensuring the continuous integrity of the software supply chain at every step from keyboard to production. Get visibility into the security vulnerabilities in code, cloud and CI/CD pipeline misconfigurations in your software supply chain in minutes. Fix security vulnerabilities in code, cloud and CI/CD pipeline misconfigurations as you code, in pull requests, before they sneak into production. Create & govern policies consistently and continuously across code, cloud and CI/CD organizationally to prevent classes of vulnerabilities from re-occurring. Consolidate tool and dashboard sprawl through a single control plane for trusted visibility into the risks of your software supply chain. Build and amplify trust between developers & security for scalable DevSecOps through high fidelity, zero friction SaaS automation. -
22
Wabbi
Wabbi
Automatically assign security policies based on project attributes and your risk profile for each application, version, environment, and asset. Then, translate those policies into orchestrated workflows from ticket creation to scheduled scans, approvals and controls – all from one platform. Manage and orchestrate the full lifecycle of vulnerabilities from triggering scans proactively based on SDLC events and schedules, or reactively in response to security events to correlating and consolidating, rescoring based on application risk, and monitoring fix SLAs to ensure no vulnerability falls in the cracks. End-to-end management of the complete application security program as an integrated part of the SDLC ensures continuous security compliance, prioritization, and analysis throughout the lifecycle of the application as your single control point to reduce friction, scale AppSec and improve secure code quality.Starting Price: $8 per user per month -
23
Nucleus RTOS
Siemens Digital Industries Software
Nucleus® RTOS enables system developers to address the complex requirements demanded by today’s advanced embedded designs. Nucleus brings together kernel-rich functionality and tooling features ideal for applications where a scalable footprint, connectivity, security, power management, and deterministic performance are essential. Nucleus RTOS is a proven, reliable, and fully optimized RTOS. Nucleus has been successfully deployed in highly demanding markets with rigorous safety and security requirements such as industrial systems, medical devices, airborne systems, automotive and more. Stable deterministic kernel with a small memory footprint. A lightweight process model for optimized memory partitioning. Dynamically load and unload processes for greater modularity of applications. -
24
Oxeye
Oxeye
Oxeye is designed to expose vulnerable flows in distributed cloud native application code. We incorporate next-generation SAST, DAST, IAST, and SCA capabilities to ensure verification of risks in both Dev and Runtime environments. Built for developers and AppSec teams, Oxeye helps to shift-left security while accelerating development cycles, reducing friction, and eliminating vulnerabilities. We deliver reliable results with high accuracy. Oxeye analyzes code vulnerabilities across microservices delivering contextualized risk assessment enriched with infrastructure configuration data. With Oxeye developers can easily track and resolve vulnerabilities. We deliver the vulnerability visibility flow, steps to reproduce, and the exact line of code. Oxeye offers a seamless integration as Daemonset with a single deployment that doesn’t require performing changes in the code. We deliver frictionless security to your cloud-native apps. -
25
Qualys VMDR
Qualys
The industry's most advanced, scalable and extensible solution for vulnerability management. Fully cloud-based, Qualys VMDR provides global visibility into where your IT assets are vulnerable and how to protect them. With VMDR 2.0, enterprises are empowered with visibility and insight into cyber risk exposure - making it easy to prioritize vulnerabilities, assets, or groups of assets based on business risk. Security teams can take action to mitigate risk, helping the business measure its true risk, and track risk reduction over time. Discover, assess, prioritize, and patch critical vulnerabilities and reduce cybersecurity risk in real time and across your global hybrid IT, OT, and IoT landscape. Quantify risk across vulnerabilities, assets, and groups of assets to help your organization proactively mitigate risk exposure and track risk reduction over time with Qualys TruRisk™ -
26
Datatrial Nucleus
Datatrial
One Platform to Research, Document, and Collate your Clinical Data. Simplify your research data with the Nucleus platform. A single platform to store your study documentation, clinical datasets, submission data and compliant media. Nucleus Documents enables document management and version control for your quality documentation and media. Control, manage, and share company content with ease. Collate and control your electronic trial master file documents with ease using our centralized regulatory document management solution. Nucleus Coding enables dictionary term coding against both MedDRA and WHODrug dictionaries, either in our standalone application, or integrated into your data capture system. -
27
Tromzo
Tromzo
Tromzo builds deep environmental and organizational context from code to cloud so you can accelerate the remediation of critical risks across the software supply chain. Tromzo accelerates the remediation of risks at every layer from code to cloud. We do this by building a prioritized risk view of the entire software supply chain with context from code to cloud. This context helps our users understand which few assets are critical to the business, prevent risks from being introduced to those critical assets, and automate the remediation lifecycle of the few issues that truly matter. Contextual software asset inventory (code repos, software dependencies, SBOMs, containers, microservices, etc.), so you know what you have, who owns them, and which ones are important to the business. Understand the security posture for every team with SLA compliance, MTTR, and other custom KPIs, so you can drive risk remediation and accountability across the organization. -
28
AttackTree
Isograph
Model system vulnerability, identify weakspots and improve security using threat analysis and attack trees. Construct graphical representations of measures designed to reduce the consequences of a successful attack with mitigation trees. AttackTree allows users to define consequences and attach them to any gate within the attack tree. In this way, it is possible to model the consequences of successful attacks on the target system. Mitigation trees may be used to model the effects of mitigating measures on the consequences resulting from a successful attack. Our software has been in continuous development since the 1980s and is the recognized standard for safety and reliability professionals. Analyze threats according to standards such as ISO 26262, ISO/SAE 21434 and J3061. Identify where your system is vulnerable to an attack. Improve the security of your assets and IT systems. Model consequence mitigation. -
29
ActiveState
ActiveState
ActiveState provides software development teams with the world's most comprehensive library of secure and trusted open source, over 79 million vetted components across all major language ecosystems (e.g., Java, Javascript, Python, R, Go, etc.), including transitive dependencies and OS-level libraries. By building everything from source, we ensure that every component is what it says it is, contains the fewest amount of vulnerabilities, and is continuously remediated. Companies can consume this open source where and when they need it - through their existing artifact repositories, as container images or managed distributions, or via IDPs. When teams transfer their open source responsibility to ActiveState, developers and security teams break free from the endless cycle of vulnerability management. Developers gain confidence knowing their code will make it to production faster and with less friction. Security gains assurance that policy and compliance standards are met by default. -
30
Dazz
Dazz
Unified remediation for code, clouds, applications, and infrastructure. We help security and dev teams accelerate remediation and reduce exposure with one remediation solution for everything developed and run in their environments. Dazz connects security tools and pipelines, correlates insights from code to cloud, and shrinks alert backlog into root causes, so your team can remediate smarter and faster. Shrink your risk window from weeks to hours. Prioritize the vulnerabilities that matter most. Say goodbye to chasing and triaging alerts manually, and hello to automation that reduces exposure. We help security teams triage and prioritize critical fixes with context. Developers get insight into root causes and backlog relief. With less friction, your teams truly could become BFFs. -
31
Brinqa
Brinqa
Present a complete and accurate picture of your IT and security ecosystem with Brinqa Cyber Risk Graph. Deliver actionable insights, intelligent tickets, and timely notifications to all your stakeholders. Protect every attack surface with solutions that evolve with your business. Build a stable, robust, and dynamic cybersecurity foundation that supports and enables true digital transformation. Experience the power of Brinqa Risk Platform with a free trial - discover unparalleled risk visibility and improved security posture within minutes. The Cyber Risk Graph is a real-time representation of an organization’s infrastructure and apps, delineation of interconnects between assets and to business services, and the knowledge source for organizational cyber risk. -
32
Bionic
Bionic
Bionic uses an agentless approach to collect all of your application artifacts and provides a deeper level of application visibility that your CSPM tool cannot. Bionic continuously collects your application artifacts and creates an inventory of all of your applications, services, message brokers, and databases. Bionic integrates as a step in CI/CD pipelines and detects critical risks in the application layer and code, so teams can validate security posture in production. Bionic analyzes your code, performing checks for critical CVEs, and provides deeper insights into the blast radius of potential attacks surfaces. Bionic prioritizes code vulnerabilities based on the context of the overall application architecture. Create customized policies to prioritize architecture risk based on your company's security standards. -
33
Nucleus One
Ademero
Nucleus One is an all-in-one collaboration platform for modern businesses. Combining project management, document management, digital signatures, forms automation, public portals, an advanced workflow engine, and an AI assistant, it streamlines productivity and enhances team efficiency. Manage tasks seamlessly, store and access files easily, expedite approvals, create a professional online presence, and automate routine tasks with no-code setup. The AI assistant provides support, insights, and suggestions to help you make informed decisions. Experience unparalleled productivity and collaboration with Nucleus One.Starting Price: $10/month/user -
34
Hexway ASOC
Hexway
Hexway ASOC is a universal DevSecOps platform designed to simplify vulnerability management. A comprehensive solution to assess, analyze, and assign vulnerabilities, ensuring a secure and controlled environment. With Hexway ASOC, you can: Aggregate and Orchestrate Security Outputs: All the outputs from various security tools like SAST, DAST, and IAST are transformed into actionable data. No Duplicated Findings: Identify and merge duplicate security findings. Automate and Control Remediation: Integrate with Jira to unify remediation control processes. 360° DevSecOps Control: Gain control over the entire development lifecycle with real-time updates and analytics SDLC-Ready: Long-term analytics, CI/CD automation, progress tracking, and real-time notifications. Better Than Open Source: Reliable solution with quick support, user-friendly design, and stability. -
35
HackerOne
HackerOne
HackerOne empowers the world to build a safer internet. As the world’s most trusted hacker-powered security platform, HackerOne gives organizations access to the largest community of hackers on the planet. Armed with the most robust database of vulnerability trends and industry benchmarks, the hacker community mitigates cyber risk by searching, finding, and safely reporting real-world security weaknesses for organizations across all industries and attack surfaces. Customers include The U.S. Department of Defense, Dropbox, General Motors, GitHub, Goldman Sachs, Google, Hyatt, Intel, Lufthansa, Microsoft, MINDEF Singapore, Nintendo, PayPal, Qualcomm, Slack, Starbucks, Twitter, and Verizon Media. HackerOne was ranked fifth on the Fast Company World’s Most Innovative Companies list for 2020. Headquartered in San Francisco, HackerOne has a presence in London, New York, the Netherlands, France, Singapore, and over 70 other locations across the globe. -
36
Uppwise CWM
Uppwise
Uppwise CWM offers a powerful user-configurable and role-based dashboarding module which helps to assess the status of work at individual, team or project level. Leverage on advanced BI features to build real-time dashboards and reports to share progress and status updates at any organization level. According to Gartner collaborative work management plays a prominent role in the new work nucleus. The New Work Nucleus (NWN) is a collection of ever-changing, multivendor, SaaS-based personal and team productivity applications that replaces decades-old on-premises applications centered around Microsoft Office. -
37
Legit Security
Legit Security
Legit Security protects software supply chains from attack by automatically discovering and securing the pipelines, infrastructure, code and people so that businesses can stay safe while releasing software fast. Automatically discover security issues, remediate threats and ensure the integrity and compliance of software releases. Comprehensive, visual SDLC inventory that's continually updated. Reveal unknown, misconfigured and vulnerable SDLC systems and infrastructure. Centralized visibility over location, coverage and configuration of your existing security tools and scanners. Catch insecure build actions before they can embed vulnerabilities downstream. Centralized, early prevention of sensitive data leaks, secrets and PII, before being pushed into the SDLC. Track security trends across teams and product lines to improve security posture and incentivize behavior. Get security posture at-a-glance with Legit Security Scores, Integrate your own alert and ticketing tools or use ours. -
38
Arnica
Arnica
Put your software supply chain security on autopilot. Actively mitigate anomalies & risks in your development ecosystem, protect developers, and trust their code commits. Automate developer access management. Behavior-based developer access management with self-service provisioning in Slack or Teams. Continuously monitor and mitigate anomalous developer behavior. Identify hardcoded secrets. Validate and mitigate before they land in production. Go beyond SBOM and get visibility into all open-source licenses, infrastructure, vulnerabilities, and OpenSSF scorecards across your organization in minutes. Arnica is a behavior-based software supply chain security platform for DevOps. Arnica proactively protects your software supply chain by automating the day-to-day security operations and empowering developers to own security without incurring risks or compromising velocity. Arnica enables you to automate constant progress toward the least-privilege for developer permissions.Starting Price: Free -
39
Conviso Platform
Conviso Platform
Gain a complete view of your application security. Increase security maturity in your secure development process, and reduce the risks associated with your products. Application Security Posture Management (ASPM) solutions play a crucial role in the ongoing management of application risks, addressing security issues from the development phase to deployment. Efficiently managing an AppSec program, dealing with a growing number of products, and lacking a comprehensive view of vulnerabilities are typically significant challenges for the development team. We enhance the evolution of maturity by supporting the implementation of AppSec programs, monitoring established and executed actions, KPIs, and much more. We enable security to be incorporated into the early stages of development by defining requirements, processes, and policies and optimizing resources and time invested in additional testing or validations.Starting Price: $20.99 per asset -
40
Armis Centrix
Armis
Armis Centrix™ is a comprehensive cyber exposure management platform that provides continuous, real-time visibility and protection across IT, OT, IoT, and IoMT environments. Powered by the Armis AI-driven Asset Intelligence Engine, it identifies every connected device, assesses cyber risk, and monitors vulnerabilities across an organization’s entire digital attack surface. The platform automates risk scoring, streamlines compliance reporting, and supports rapid incident response through deep asset intelligence. With capabilities that span asset management, OT/IoT security, medical device protection, and early warning threat detection, Armis Centrix™ enhances operational resilience for modern enterprises. VIPR Pro adds advanced prioritization and remediation to connect findings directly to actionable fixes. Designed as a cloud-native, frictionless platform, Armis Centrix™ empowers organizations to reduce exposure, strengthen security posture, and maintain continuity at scale. -
41
Nucleus
Nucleus
Nucleus is a data management platform designed to streamline and automate the handling of customer and operational data across various systems. It enables users to connect and link similar records through smart matching, utilizing exact and fuzzy matching techniques with customizable auto-match thresholds. It allows for the definition of trigger-based rules to automatically address data conflicts, duplications, and the emergence of new or missing records, ensuring consistent and reliable data across integrations. Nucleus supports the development of automations that update or send notifications based on detailed contact and revenue criteria, aiding in the maintenance of a comprehensive data strategy. It also facilitates the management of data loading and large-scale updates, aligning with multiple integration sources.Starting Price: $160 per month -
42
Bizzy
Cyberwise
Detecting potential vulnerabilities, aggregating, enriching, and prioritizing them, and taking rapid action is critical in today's world to enhance our resilience against cyber threats. This capability should also be continuous. Bizzy platform reinforces cyber security resilience through prioritization, automation, Big Data analytics, machine learning, and vulnerability management capabilities, enabling continuous, rapid, and precise actions. Today, in order to increase our resilience against cyber attacks, we are able to be informed quickly about the vulnerabilities, bringing them together, It is important that we have the ability to relate and take quick action. carries. This ability should also carry continuity. Bizzy platform with prioritization, automation, and Big Data analysis is continuous, fast, and accurate actionable vulnerability management features It contributes to increasing the security resilience. -
43
NucleusLabs
NucleusLabs
Our team thoroughly understands your day-to-day workflow, terminology, documentation, and the important relationships between your staff, the people you serve, and the community you live in. We value what you do and work hard to make things better for front-line staff and management alike. NucleusLabs works closely with over 500 programs in more than 150 locations across Canada. We got our start in case of management by deploying creative, client-centered solutions for child development and intervention programs. The solutions enable clinicians and multi-disciplinary teams to manage their clinical workflow from referral to discharge with a focus on clinical outcomes. We work with agencies serving at-risk and vulnerable youth within the community to create solutions that support the work happening in the community. These tools allow youth workers to capture the information needed to ensure youth get access to necessary services, navigate stressors and find stability. -
44
Nucleus
Bizerba
We are market leaders of Factory Data Capture and Food Traceability systems. By linking to your back office system or by using the Nucleus office package or mobile applications we can offer a suite of reports that allow you to analyze the profitability of all of your processes. At the very core of Nucleus the standard modules developed for each industry type. Meat Processing, Fish Processing, Formulation Software and Food Traceability. We are able to tailor these so that you, the customer end up with a system bespoke to your business but with the reassurance of a stable, tried and tested platform. Furthermore the Food Traceabilty System and Data Capture software is fully backed by Bizerba service and support. An additional layer of guarantee that the system will support your business not only now but far into the future. In addition to adhere to current legislation and compliance required globally. The food traceability system ticks all the boxes. -
45
SecurityHive Vulnerability Management
SecurityHive
Discover and monitor weak spots in your network according to your company's policies. SecurityHive's Vulnerability Management guides and provides you with information. Learn more about 1 of 4 solutions in our platform. SecurityHive Vulnerability Management allows you to easily discover vulnerabilities in your network. It gives you advice on how to solve these weak spots and secure your environment without installing agents. Security is a continuous process, our software enables you to log the actions you take to solve vulnerabilities. It will also show when vulnerabilities were found or solved. Having an audit trail helps you in your next audit or when an incident occurs. Perform a scan on your internal network from network appliances to endpoints and more. Get to know how a hacker sees your network from the outside and discover how vulnerable you are. Scan and manage according to your company's policies. Let us help you to become compliant. -
46
Q-scout
Quokka
Q-scout enables security teams to vet mobile apps while substantiating their decisions with precise, data driven insights. It provides evidence needed to confidently approve or block apps, ensuring compliance, safeguarding privacy, and protecting organizational assets from mobile threats. Q-scout seamlessly integrates with MDMs, giving security teams real-time visibility into the mobile apps installed across MDM-managed devices. App inventories are automatically ingested into Q-scout and continuously updated, allowing each app to be analyzed for security and privacy risks as soon as it is added, updated, or removed. This ensures that administrators always have an up-to-date, actionable view of mobile app exposure without manual effort. Q-scout enables organizations to: • Pre-vet apps before risk hits the device • Set enforceable, risk-based app policies • Meet security & compliance standards • MDM & MTD Integration • Agentless deployment • Scale security visibility -
47
Frontline Vulnerability Manager is more than a just a network vulnerability scanner or vulnerability assessment. It's a proactive, risk-based vulnerability and threat management solution that is a vital part of any cyber risk management program. Its robust features set it apart from other VM solutions, providing vital security information in a centralized, easily understood format so you can protect your business-critical assets efficiently and effectively. More than ever, cyber attackers are looking for vulnerabilities they can exploit in a company’s network. So having a vulnerability management solution in place is critical. A vulnerability management program is far more than just a vulnerability assessment, vulnerability scanner, or patch management. The best vulnerability management solutions use an ongoing process that regularly identifies, evaluates, reports and prioritizes vulnerabilities in network systems and software.
-
48
SAINTcloud
Carson & SAINT Corporations
The cost of defending your most critical technology resources and information rises every year. Increased threats and tight budgets challenge even the most robust risk-management program. Carson & SAINT developed SAINTcloud vulnerability management to provide all of the power and capability offered in our fully-integrated vulnerability management solution, SAINT Security Suite, without the need to implement and maintain on-premise infrastructure and software. This means you can spend more time reducing risks and less time managing the tools you use. No software to install – set up and running in minutes. Full vulnerability scanning, penetration testing, social engineering, configuration, compliance, and reporting in one product. Role-based access controls for separation of duties and accountability. Internal host and remote site scans from the cloud. -
49
XRATOR
XRATOR
Our unified proactive cybersecurity platform combines tech and non-tech methods to drive personalized, automated cyber risk management solutions. Cyber risk management is complex and demanding. With our role-tailored, unified platform, overcome resource constraints and knowledge gaps. XRATOR simplifies the process, empowering you to focus on business objectives. With our platform, you're not juggling multiple tools. Everything you need is all in one place, for all roles involved in your organization. With evolving regulatory landscapes, maintaining compliance can be a complex process. Our solution automates compliance tasks, freeing you to focus on strategic initiatives. Witness how XRATOR AutoComply seamlessly integrates with your systems to monitor, identify and address potential compliance issues before they escalate. -
50
ThreadFix
Denim Group
ThreadFix 3.0 provides a comprehensive view of your risk from applications and their supporting infrastructure. Skip the spreadsheets and PDFs forever. From Application Security Managers to CISOs, ThreadFix helps increase efficiency across teams and provides powerful reporting to upper management. Explore the powerful benefits of ThreadFix, the industry leading application vulnerability management platform. Automatically consolidate, de-duplicate, and correlate vulnerabilities in applications to the infrastructure assets that support them using results from commercial and open source application and network scanning tools. Knowing which vulnerabilities exist is important, but it’s just a start. With ThreadFix, you will quickly spot vulnerability trends and make smart remediation decisions based on data in a centralized view. When vulnerabilities are discovered, it can be tough to go back and fix them.Starting Price: $2000 per month