search
Join or Log In

License Compliance

Browse 9 cybersecurity tools tagged with "License Compliance"

Offensive 360

Offensive 360

language

API Security

Offensive 360 on SecurityListing: SAST tool using virtual compilers to analyze source code for vulnerabilities

4.8(3)
DerSecur Software Composition Analysis (SCA)

DerSecur Software Composition

language

Risk Assessment

DerSecur Software Composition Analysis (SCA) on SecurityListing: SCA tool for SBOM generation, dependency analysis, and open-source risk mgmt.

4.8(3)
BoostSecurity Cloud-speed Compliance

BoostSecurity Cloud-speed Compliance

language

Compliance Management

BoostSecurity Cloud-speed Compliance on SecurityListing: Compliance and license management platform for regulatory requirements

4.5(1)
FossID Software Composition Analysis

FossID Software Composition

language

Software Composition Analysis

FossID Software Composition Analysis on SecurityListing: SCA tool for code scanning, license identification, and SBOM generation

4.5(1)
Offensive 360 O360

Offensive 360 O360

language

Static Application Security Testing

Offensive 360 O360 on SecurityListing: SAST tool using virtual compilers to analyze source code for vulnerabilities

4.5(1)
Flyingduck Code Security Intelligence

Flyingduck Code Security

language

Software Composition Analysis

Flyingduck Code Security Intelligence on SecurityListing: SAST tool that detects logical flaws and business logic vulnerabilities

3.8(1)
Anchore Enforce

Anchore Enforce

language

Container Security

Anchore Enforce on SecurityListing: Policy enforcement & compliance mgmt for container security across SDLC

3.8(1)
SCANOSS Geo Provenance Dataset

SCANOSS Geo Provenance

language

Risk Assessment

SCANOSS Geo Provenance Dataset on SecurityListing: Identifies geographic origin and authorship of open source code components

SonarSource Advanced Security

SonarSource Advanced Security

language

Software Composition Analysis

SonarSource Advanced Security on SecurityListing: SAST and SCA platform for code security analysis with taint analysis