Browse Software
List Your Product
Loading...
Refine Results Clear All
Artificial Intelligence
  • (1)
Starting Price
  • (1)
  • (11)
Deployment
  • (4)
  • (3)
  • (32)
Customer Types
  • (2)
  • (3)
  • (30)
  • (32)
  • (30)
Pricing Model
  • (12)
  • (8)
  • (1)
  • (3)
  • (11)
  • (28)
Integrated With
  • (4)
  • (3)
  • (3)
  • (3)
  • (2)
  • (2)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
Showing 1 - 20 of 32 Products

Top 5 GitGuardian Alternatives

Snyk logo
A Tool to Fix vulnerabilities in minutes 4.7 Based on 129 Ratings
Visit Website + Add to Compare

What is Snyk and how does it work?

Snyk software is a platform used to Identify container image vulnerabilities and auto-upgrade to the most secure base image. Monitor applications dependencies to automatically find and fix new vulnerabilities. Manage License compliance with legal risk associated with your dependencies and drive license compliance throughout your SDLC. It integrates with Jira, GitHub, GitLab, and more. For Developers, Small, Medium and Large companies make use of the software.

Read more

Snyk Pricing

  • Free Trial Not Available
  • Starts at $98.00. Offers Free-forever and Custom plan.
Hivecode logo
Detect Data Leaks and Unauthorised Software Usage 5 Based on 1 Ratings
Visit Website + Add to Compare

What is Hivecode and how does it work?

Hivecode lets its users track their data and software usage and ensures data leak detection. Hivecode tracks if somebody else is using the user's sensitive data. It also tracks any unauthorized usage of user's custom software and prepares detailed information about its usage. It is targeted managers and business owners, IT companies, freelancers, Web studios, marketing companies, and developers. Hivecode generates code or data to insert into the user's application or database. The inserted code will send Hivecode information about any relevant information, although it does not require access to the user's database. It offers integration, according to their website, with any programming language and any database. It also provides custom integrations with WebHooks. It provides instant notifications if unauthorised use of user's assets is encountered, in the form of SMS notifications, Slack notifications, WhatsApp notifications and Email notifications. Other leading features include data leak detection, usage monitoring, and instant messaging.

Read more

SW Score Breakdown The SW Score breakdown shows individual score for product features.Read more

  • Features 60%
  • Reviews 83%
  • Momentum 60%
  • Popularity 62%

Hivecode Pricing

  • Free Trial Available
  • Starts at $24.00. Offers Free-forever plan.

81% SW Score The SW Score ranks the products within a particular category on a variety of parameters, to provide a definite ranking system. Read more

CodeShield logo
Detect Security Vulnerabilities in Minutes Write a Review
Visit Website + Add to Compare

What is CodeShield and how does it work?

CodeShield software is a platform used to reveals hidden connections, and vulnerabilities to move within cloud and reach critical assets. Privilege escalation and attack scenario used to identify escalation and prioritize them. Build a complete graph of AWS resources and IAM policies into a single graph to automate workflows. It integrates with Jira, GitHub, GitLab.

Read more

SW Score Breakdown The SW Score breakdown shows individual score for product features.Read more

  • Features 88%
  • Reviews 60%
  • Momentum 65%
  • Popularity 74%

CodeShield Pricing

  • Free Trial Not Available
  • Starts at $99.00. Offers Free-forever and Custom plan.
GetSecured logo
Comprehensive Enterprise Data Protection Program Write a Review
Visit Website + Add to Compare

What is GetSecured and how does it work?

GetSecured is a security scanning tool that can be used to find breached data, web app vulnerabilities, data leakage, whether the employees' emails are breached somewhere or not and many more. Our tool can be easily understood by a non-technical person also. We have a super cool dashboard in which you can view all your previous scan details like from which country the asset is located and many more.

Read more

GetSecured Pricing

  • Free Trial Not Available
  • Starts at $199.00. Offers Custom plan.

83% SW Score The SW Score ranks the products within a particular category on a variety of parameters, to provide a definite ranking system. Read more

Visual Guard logo
Security for your applications Write a Review
Visit Website + Add to Compare

What is Visual Guard and how does it work?

Organizations can control fine-grained permissions inside their apps, monitor sensitive operations, detect security breaches, and raise a scalable shield in the case of a cyberattack with Visual Guard, which tackles today's Cybersecurity issues. Your application complies with rules such as CCPA, HIPAA, SOX, or GDPR, which protect personal, financial, and medical data, thanks to traceability and security audit features. Visual Guard is a powerful application security framework with a rich API and ready-to-use security management features. Visual Guard fulfills the most complex requirements with cheap cost, high security, and agility features, when most programs barely handle permissions. Visual Guard was created for a big banking organization in the 1990s. It has continued to improve since then to meet modern security requirements. It is now utilized by a wide range of medium and big businesses, as well as numerous software manufacturers around the world. For user provisioning and maintenance, powerful user account management functions and a user-friendly administration console are available. Visual Guard allows you to keep an eye on your application.

Read more

SW Score Breakdown The SW Score breakdown shows individual score for product features.Read more

  • Features 95%
  • Reviews 60%
  • Momentum 60%
  • Popularity 67%

Visual Guard Pricing

  • Free Trial Not Available
  • Visual Guard Offers Custom plan.

Products Similar to GitGuardian

71% SW Score The SW Score ranks the products within a particular category on a variety of parameters, to provide a definite ranking system. Read more

ClawBack logo
Protect your data and save them from attackers Write a Review
Visit Website + Add to Compare

What is ClawBack and how does it work?

ClawBack is a data breach detection tool that helps users to monitor any events of a data leakage including codes, configurations, documents, API keys, credentials and confidential information. The protocols of the software are designed to offer you a world-class security platform that is easy-to-use and set up. It is a cloud-based software that offers you the flexibility to fight risks of a data leak, thus making the online world more reliable for you. This SaaS platform offers protection to your data from various spam attacks like insider threats, accidental exposures and data leaks caused due to sharing codes, configurations, and others. ClawBack monitors common websites that contain code and configuration data and files. With this tool, you can also set custom definitions of the type of files that are important to you depending on your business, such as IP addresses, project names, codes, and credentials. The app performs immediate searches to detect prior leaks of data and content as well as analyses any possible chances of emerging issues. It allows the user to take quick actions to mitigate your exposures and remove all leaked data. You will even receive email notifications and alerts which you can export to CSV.

Read more

SW Score Breakdown The SW Score breakdown shows individual score for product features.Read more

  • Features 79%
  • Reviews 60%
  • Momentum 60%
  • Popularity 60%

ClawBack Pricing

  • Free Trial Available
  • Starts at $99.00.
Sqreen logo
An infusing security management software 5 Based on 1 Ratings
Visit Website + Add to Compare

What is Sqreen and how does it work?

Sqreen is an application security management software that allows users to shield their microservices, applications, and APIs from mischievous attacks. Sqreen diligently discovers attacks on applications and traces them promptly from the line of code to the network requests down, which keenly averts the negative behavior and allows security responders across the development and operation team to determine the root cause instantly. Sqreen is a cloud-based security software tool that shields your application directly. After installing this Sqreen tool, it analyzes your application promptly to discover the amenabilities in the user's configurations or code. It can façade threats and enables users to configure their own threat detection rules. They can promptly receive notifications on any malicious attacks that happen and get detailed info about that attack. Sqreen offers smart and advanced features, making it hard for users to not opt for it. It provides visibility into application security. Users can see the status in their dashboards and get instant alerts on critical anomalies attacks.

Read more

SW Score Breakdown The SW Score breakdown shows individual score for product features.Read more

  • Features 60%
  • Reviews 82%
  • Momentum 60%
  • Popularity 68%

Sqreen Pricing

  • Free Trial Available
  • Starts at $499.00. Offers Free-forever and Custom plan.
Detectify logo
Automated web application security 5 Based on 1 Ratings
Visit Website + Add to Compare

What is Detectify and how does it work?

Detectify automate the work of hundreds of ethical hackers to help keep your web apps secure. Scan for the latest critical vulnerabilities daily and continuously monitor your web application security.

Read more

Detectify Pricing

  • Free Trial Available
  • Starts at $85.00. Offers Custom plan.
IBM QRadar logo
Top graded security and privacy 4.4 Based on 516 Ratings
Visit Website + Add to Compare

What is IBM QRadar and how does it work?

IBM QRadar is a Security Information and Event Management software, helping out business corporations detect network breaches and cybersecurity attacks, eliminating potential damage. Teams can focus on patching the essential asset vulnerabilities and in reviewing anomalous conditions in real-time. The software is capable of running detailed analysis through the network, asset, endpoint, threat and vulnerability data, detecting out known and unknown threats. Enterprises no longer need to hire data science professionals, as built-in analytics within IBM QRadar are capable of shortening time to value. The particular offers 450+ out of the box integrations with SDK ad APIs helping out enterprises enhance the value of their existing solutions. The scalable software help organizations, get the particular customized as per their changing needs without compromising on security, risk levels and privacy. It is capable of detecting both advanced threats and insider threats, besides using machine learning algorithms and advanced analytics to get them resolved.

Read more

IBM QRadar Pricing

  • Free Trial Available
  • Starts at $800.00.
LepideAuditor Suite logo
The ideal data security platform 4 Based on 1 Ratings
Visit Website + Add to Compare

What is LepideAuditor Suite and how does it work?

Lepide Auditor Suite is an advanced data security platform that provides unrivalled risk reduction and behavioral analysis. The Lepide Data Security Platform helps you protect your data, comply with regulations, and respond to attacks. Whether on-premises or in the cloud, Lepide uses Data-Centric Audit & Protection to provide advanced-level insights into your surrounding and data systems. With Lepide, you can discover, analyze, and safeguard sensitive information. Even the changes to sensitive data and your hybrid environment can be audited, reported on, and alerted to with Lepide. You can additionally keep track of all changes and alterations that users make to important files and directories. Users can identify which people are most likely to pose insider threats by running specific reports for individuals with excessive rights. They can additionally scan, find, and classify data automatically at the moment of generation to keep track of where their sensitive data is stored. To keep on top of your most sensitive data, you can also categorize and evaluate it based on monetary worth, compliance, incidence, risk and much more.

Read more

LepideAuditor Suite Pricing

  • Free Trial Available
  • LepideAuditor Suite Offers Custom plan.
VMware AppDefense logo
Workload Protection Software 4.5 Based on 2 Ratings
Visit Website + Add to Compare

What is VMware AppDefense and how does it work?

VMware AppDefense is a new approach to workload protection that models intended application behavior and identifies anomalous activity. Enable application control and allow listing and patch risky software sooner by continuously scanning workloads to highlight vulnerabilities in the OS, hypervisor, or application software. Ensure OS integrity, and provide reputation scores for every process. Provide additional workload context to NSX to assist in the definition of micro-segments, and enable faster and more granular responses to risky workload behavior, by pushing into NSX policies for actions such as quarantining, activity logging, etc.

Read more

VMware AppDefense Pricing

  • Free Trial Not Available
  • VMware AppDefense Offers Custom plan.
Cisco ACI logo
Facilitates application agility and data center automation 4.5 Based on 20 Ratings
Visit Website + Add to Compare

What is Cisco ACI and how does it work?

Cisco ACI is an online-based Data Center Security Software. The Cisco ACI application-driven policy framework automates provisioning and managing of resources, thereby delivering a network that is deployed, monitored, and managed in a fashion that supports DevOps and rapid application change. Take a holistic, systems-based approach to data center security with Cisco Application Centric Infrastructure Security Solutions. These solutions provide a common policy-based operational model across ACI-ready networks. As a result, you can reduce cost and complexity without compromising data center functionality.

Read more

Cisco ACI Pricing

  • Free Trial Available
  • Cisco ACI Offers Custom plan.
Symantec Data Center Security logo
Complete server protection, monitoring, and workload micro-segmentation 4.5 Based on 12 Ratings
Visit Website + Add to Compare

What is Symantec Data Center Security and how does it work?

Symantec Data Center Security is an online-based Data Center Security Software. Optimize security performance in VMware environments with agentless antimalware protection, network intrusion prevention, and file reputation services. ICDx simplifies product integrations and accelerates customer time to value across the Symantec enterprise portfolio and the industry’s largest partner ecosystem. Prepare higher quality cyber data to forward to SIEM and other SOC tools enhancing analytics and alert speed responses to critical incidents with orchestrated actions targeting multiple Symantec products.

Read more

Symantec Data Center Security Pricing

  • Free Trial Not Available
  • Symantec Data Center Security Offers Custom plan.
ServerProtect for Linux logo
Stops malware from spreading through Linux Servers 3 Based on 1 Ratings
Visit Website + Add to Compare

What is ServerProtect for Linux and how does it work?

Trend Micro ServerProtect™ for Linux 3.0 offers comprehensive real-time protection for enterprise web servers and file servers, preventing them from spreading viruses, spyware, and other Web threats to internal or external endpoints. Real-time, on-demand and scheduled scanning use the latest multi-threaded scanning engine for the highest performance while kernel-level scanning minimizes performance degradation. Enables central management of attack information, policy deployment, pattern file and scan engine deployment, and reports on policy implementation.

Read more

ServerProtect for Linux Pricing

  • Free Trial Available
  • ServerProtect for Linux Offers Custom plan.
HashiCorp Vault logo
Store and Secure Your Valuable Data in A Vault 4.6 Based on 119 Ratings
Visit Website + Add to Compare

What is HashiCorp Vault and how does it work?

HashiCorp Vault securely controls, protects, and secures access to passwords, certificates, tokens, encryption keys for secrets and other user-sensitive data using a UI, CLI or HTTP API. It uses a dynamic infrastructure, which has multiple clouds and private data centers without a clear network perimeter. Vault is API driven, it enables automation and CI/CD use cases while allowing the policy to protect, codify, and govern access to secrets. Value-added features of this infrastructure are low trust networks in public clouds, unknown network perimeter across clouds, and security enforced by identity. It tightly controls access to encryption keys and secrets by authenticating against trusted sources of identity such as Active Directory, CloudFoundry, LDAP, Kubernetes, and cloud platforms. Users can leverage any trusted identity provider such as cloud IAM platforms, Active Directory, Kubernetes or authenticate Vault. HashiCorp Vault enables fine-grained authorization to secrets and encryption keys that users and applications are permitted access to keys and secrets.

Read more

HashiCorp Vault Pricing

  • Free Trial Not Available
  • Starts at $0.03. Offers Custom plan.
FireEye Data Center Security logo
Protecting the data center from cyber attacks Write a Review
Visit Website + Add to Compare

What is FireEye Data Center Security and how does it work?

FireEye cybersecurity products and solutions enable organizations to prevent, detect and respond to advanced malware and other cyber attacks targeting the data center that routinely bypass conventional signature-reliant defenses. Shield data centers from advanced persistent threats (APTs) and sophisticated malware found in content stores, web and application servers, and common file shares. Protect your key assets and prevent attacks with products and services that work together and share threat intelligence.

Read more

FireEye Data Center Security Pricing

  • Free Trial Not Available
  • FireEye Data Center Security Offers Custom plan.
Aaronis Cyberprotect Cloud logo
Prevent client downtime and data loss Write a Review
Visit Website + Add to Compare

What is Aaronis Cyberprotect Cloud and how does it work?

Acronis Cyber Protect Cloud is the ultimate solution for service providers, offering unified backup and next-generation AI-based anti-malware and antivirus protection management. By integrating and automating these processes, service providers can significantly reduce complexity and increase productivity while also cutting operating costs. The advanced AI-based behavioral detection engine provides the best protection against malware, ransomware, and zero-day attacks on client workloads. Additionally, full-image and file-level backup and recovery capabilities ensure that workloads on more than 20 platforms are safeguarded with near-zero Recovery Point Objectives and Recovery Time Objectives.

Read more

Aaronis Cyberprotect Cloud Pricing

  • Free Trial Not Available
  • Aaronis Cyberprotect Cloud Offers Custom plan.
ManageEngine OpManager Plus logo
IT Operations Management Write a Review
Visit Website + Add to Compare

What is ManageEngine OpManager Plus and how does it work?

OpManager Plus is a powerful, integrated solution that streamlines the process of IT operations management, eliminating the need for multiple monitoring tools. This holistic tool provides greater visibility across your IT infrastructure, helping you to remove operational bottlenecks, optimize performance and gain the maximum output from your IT infrastructure. With advanced IT operations monitoring and management capabilities, OpManager Plus offers four layers of visibility into an organization's IT operations - IT infrastructure security, IT infrastructure application performance, server and storage IT operations, and network performance. This multi-level visibility into IT operations helps IT admins identify and troubleshoot faults at various levels easily, thereby ensuring greater SLA compliance, proactive IT fault management, greater customer service and consistent IT infrastructure performance.

Read more
Datto SaaS Defense logo
Advanced Threat Protection for Microsoft 365 Write a Review
Visit Website + Add to Compare

What is Datto SaaS Defense and how does it work?

Datto SaaS Defense is the perfect solution for MSPs to protect their clients from the latest malware, business email compromise (BEC), and phishing attacks targeting Microsoft Exchange, OneDrive, SharePoint, and Teams. Armed with the latest AI-driven threat detection capabilities, Datto SaaS Defense can detect zero-day threats as soon as they appear, so clients don’t have to suffer the consequences of waiting days or even weeks to discover an attack. The security solution is designed to be data-independent, so it can easily be integrated into existing Microsoft 365 environments and keep data safe without disrupting the user experience. Its advanced proactive protection capabilities are tailored to detect and prevent ransomware, malware, phishing attempts and BEC attacks, while also providing reliable security for OneDrive, SharePoint, and Teams data.

Read more

Datto SaaS Defense Pricing

  • Free Trial Not Available
  • Datto SaaS Defense Offers Custom plan.
Hitachi Content Intelligence logo
Intelligent data discovery and transformation Write a Review
Visit Website + Add to Compare

What is Hitachi Content Intelligence and how does it work?

Hitachi Content Intelligence maximizes data value to deliver the information you need to make the smartest business decisions. Mitigate your industry’s data growth and sprawl and easily find the data you need. Enrich your data to deliver the most relevant information that your business needs to stay informed. Aggregate data from any sources, surface new insights and boost productivity with robust searches.

Read more

Hitachi Content Intelligence Pricing

  • Free Trial Not Available
  • Hitachi Content Intelligence Offers Custom plan.

We understand SaaS better

SaaSworthy helps stakeholders choose the right SaaS platform based on detailed product information, unbiased reviews, SW score and recommendations from the active community.

icon

Buyers

Looking for the right SaaS

We can help you choose the best SaaS for your specific requirements. Our in-house experts will assist you with their hand-picked recommendations.

icon

Makers

Want more customers?

Our experts will research about your product and list it on SaaSworthy for FREE.

Get Listed