About
Inventory your apps, APIs, and shadow assets across your global, multi-cloud environment. Establish custom policies for different types of asset groups, automate attack tools, and assess vulnerabilities. Fix security issues before going into production, making sure application and cloud data is compliant. Auto-remediation of vulnerabilities with rollback options to stop leaky data. Good security finds problems fast, but great security makes problems disappear. Data Theorem strives to make great products that automate the most challenging areas of modern application security. The core of Data Theorem is its Analyzer Engine. Utilize the Data Theorem analyzer engine & proprietary attack tools to hack and exploit application weaknesses continuously. Data Theorem has built the top open source SDK called TrustKit, used by thousands of developers. Our technology ecosystem continues to grow so that customers can continue to secure their entire Appsec stack with ease.
|
About
Continuous Security Testing for SaaS Companies - Built by Hackers
Automatically assess your security posture with continuous vulnerability assessments and on-demand pentests. Hackers don't stop testing, and neither should you.
We use a hybrid approach that combines testing methodologies built by expert hackers, a real-time reporting dashboard, and continuous delivery of high-quality results. We improve the traditional pentesting lifecycle by continually providing expert advice, remediation verification, and automated security testing throughout the entire year.
Our dedicated team of experts works with you to properly scope and review your applications, APIs, and networks to ensure in-depth testing coverage all year.
Let us help you sleep better at night.
|
About
OpenText Dynamic Application Security Testing (DAST) is an automated solution that simulates real-world attacks on live applications, APIs, and services to identify exploitable vulnerabilities. It operates on running production environments, requiring no source code or staging setup. Designed for modern DevSecOps teams, the platform prioritizes vulnerabilities for root cause analysis and integrates seamlessly through REST APIs and an intuitive user interface. OpenText DAST supports automation in CI/CD pipelines, reducing manual efforts while accelerating security feedback. It covers modern web technologies like HTML5, JSON, AJAX, JavaScript, and HTTP2 to ensure comprehensive testing. Flexible deployment options allow organizations to run the solution on public cloud, private cloud, or on-premises environments.
|
About
Enjoy the highest performance and unlimited possibilities when working with SQL Server. SQL Server Data Access Components (SDAC) is a library of components that provides native connectivity to SQL Server from Delphi and C++Builder including Community Edition, as well as Lazarus (and Free Pascal) for Windows, Linux, macOS, iOS, and Android for both 32-bit and 64-bit platforms. SDAC-based applications connect to SQL Server directly through OLE DB, which is a native SQL Server interface. SDAC is designed to help programmers develop faster and cleaner SQL Server database applications. SDAC, a high-performance, and feature-rich SQL Server connectivity solution is a complete replacement for standard SQL Server connectivity solutions and presents an efficient native alternative to the Borland Database Engine (BDE) and standard dbExpress driver for access to SQL Server. SDAC-based DB applications are easy to deploy, and do not require the installation of other data provider layers.
|
|||
Platforms Supported
Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook
|
Platforms Supported
Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook
|
Platforms Supported
Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook
|
Platforms Supported
Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook
|
|||
Audience
Development teams looking for a modern application security solution
|
Audience
SaaS and tech enabled businesses looking to find and remediate software vulnerabilities and prevent breaches
|
Audience
DevSecOps and security teams looking for automated, scalable, real-time vulnerability testing on live applications and APIs integrated into CI/CD workflows
|
Audience
Programmers in need of a tool to develop faster and cleaner SQL Server database applications
|
|||
Support
Phone Support
24/7 Live Support
Online
|
Support
Phone Support
24/7 Live Support
Online
|
Support
Phone Support
24/7 Live Support
Online
|
Support
Phone Support
24/7 Live Support
Online
|
|||
API
Offers API
|
API
Offers API
|
API
Offers API
|
API
Offers API
|
|||
Screenshots and Videos |
Screenshots and Videos |
Screenshots and Videos |
Screenshots and Videos |
|||
Pricing
No information available.
Free Version
Free Trial
|
Pricing
$6,600 per year
Free Version
Free Trial
|
Pricing
No information available.
Free Version
Free Trial
|
Pricing
$199.95 per year
Free Version
Free Trial
|
|||
Reviews/
|
Reviews/
|
Reviews/
|
Reviews/
|
|||
Training
Documentation
Webinars
Live Online
In Person
|
Training
Documentation
Webinars
Live Online
In Person
|
Training
Documentation
Webinars
Live Online
In Person
|
Training
Documentation
Webinars
Live Online
In Person
|
|||
Company InformationData Theorem
Founded: 2013
United States
www.datatheorem.com
|
Company InformationGlitchSecure
Founded: 2022
Canada
glitchsecure.com
|
Company InformationOpenText
Founded: 1991
Canada
www.opentext.com/products/dynamic-application-security-testing
|
Company InformationDevart
Founded: 1997
Czech Republic
www.devart.com/sdac/
|
|||
Alternatives |
Alternatives |
Alternatives |
Alternatives |
|||
|
|
||||||
|
|
|
|||||
|
|
|
|||||
|
|
|
|||||
Categories |
Categories |
Categories |
Categories |
|||
Application Security Features
Analytics / Reporting
Open Source Component Monitoring
Source Code Analysis
Third-Party Tools Integration
Training Resources
Vulnerability Detection
Vulnerability Remediation
Cybersecurity Features
AI / Machine Learning
Behavioral Analytics
Endpoint Management
Incident Management
IOC Verification
Tokenization
Vulnerability Scanning
Whitelisting / Blacklisting
Vulnerability Management Features
Asset Discovery
Asset Tagging
Network Scanning
Patch Management
Policy Management
Prioritization
Risk Management
Vulnerability Assessment
Web Scanning
Vulnerability Scanners Features
Asset Discovery
Black Box Scanning
Compliance Monitoring
Continuous Monitoring
Defect Tracking
Interactive Scanning
Logging and Reporting
Network Mapping
Perimeter Scanning
Risk Analysis
Threat Intelligence
Web Inspection
|
||||||
Integrations
Amazon Web Services (AWS)
ArmorCode
Azure SQL Database
Bizzy
Clarive
Conviso Platform
Delphi
FreeBSD
Google Cloud Platform
IRI FieldShield
|
Integrations
Amazon Web Services (AWS)
ArmorCode
Azure SQL Database
Bizzy
Clarive
Conviso Platform
Delphi
FreeBSD
Google Cloud Platform
IRI FieldShield
|
Integrations
Amazon Web Services (AWS)
ArmorCode
Azure SQL Database
Bizzy
Clarive
Conviso Platform
Delphi
FreeBSD
Google Cloud Platform
IRI FieldShield
|
Integrations
Amazon Web Services (AWS)
ArmorCode
Azure SQL Database
Bizzy
Clarive
Conviso Platform
Delphi
FreeBSD
Google Cloud Platform
IRI FieldShield
|
|||
|
|
|
|
|