Introducing G2.ai, the future of software buying.Try now

Best Application Security Posture Management (ASPM) Software - Page 2

Lauren Worth
LW
Researched and written by Lauren Worth

Application security posture management (ASPM) is a comprehensive cybersecurity solution that focuses on safeguarding software applications from potential threats. The process involves continuously assessing, monitoring, and enhancing an organization's application security posture. ASPM encompasses various technologies to identify and mitigate security risks in software applications. It helps companies with visibility, risk identification, and remediation recommendations. This software aids security teams, DevOps, and IT administration to manage compliance, prioritize risks, and handle vulnerabilities.

Application security posture management (ASPM) solutions offer unique capabilities that distinguish them from other cybersecurity tools like security information and event management (SIEM) systems and vulnerability scanners. Unlike these tools, which identify, assess, and mitigate security risks, ASPM is specifically tailored to the security of software applications. It provides a holistic picture of application security health and integrates with the development lifecycle for proactive security measures.

To qualify for inclusion in the ASPM category, a product must:

Help prioritize and address the most critical security issues and recommend how to remediate vulnerabilities and weaknesses
Scan and analyze software applications to identify vulnerabilities, misconfigurations, and weaknesses in the code, libraries, and configurations
Actively monitor applications for signs of malicious activity and potential security breaches, using techniques such as behavioral analysis and anomaly detection
Help organizations ensure that their applications adhere to industry standards and compliance requirements by assessing and reporting on security posture against these benchmarks
Show More
Show Less

Featured Application Security Posture Management (ASPM) Software At A Glance

Free Plan Available:
Aikido Security
Sponsored
Highest Performer:
Easiest to Use:
Top Trending:
Show LessShow More
Highest Performer:
Easiest to Use:
Top Trending:

G2 takes pride in showing unbiased reviews on user satisfaction in our ratings and reports. We do not allow paid placements in any of our ratings, rankings, or reports. Learn about our scoring methodologies.

Coming Soon
Get Trending Application Security Posture Management (ASPM) Products in Your Inbox

A weekly snapshot of rising stars, new launches, and what everyone's buzzing about.

Sample Trending Products Newsletter
No filters applied
32 Listings in Application Security Posture Management (ASPM) Available
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Plexicus offers a groundbreaking AI-driven Application Security Posture Management (ASPM) solution, designed to revolutionize how organizations manage cybersecurity vulnerabilities. Our intelligent AI

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Mid-Market
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    PLEXICUS
    Year Founded
    2025
    HQ Location
    Bilbao, ES
    LinkedIn® Page
    www.linkedin.com
    10 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Plexicus offers a groundbreaking AI-driven Application Security Posture Management (ASPM) solution, designed to revolutionize how organizations manage cybersecurity vulnerabilities. Our intelligent AI

Users
No information available
Industries
No information available
Market Segment
  • 100% Mid-Market
Seller Details
Seller
PLEXICUS
Year Founded
2025
HQ Location
Bilbao, ES
LinkedIn® Page
www.linkedin.com
10 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Secure your Software Development and Delivery! Xygeni Security specializes in Application Security Posture Management (ASPM), using deep contextual insights to effectively prioritize and manage secur

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 60% Small-Business
    • 40% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Xygeni Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Comprehensive Security
    2
    Prioritization
    2
    Risk Management
    2
    Security
    2
    Cloud Integration
    1
    Cons
    Difficult Setup
    1
    Learning Curve
    1
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2021
    HQ Location
    Madrid, ES
    Twitter
    @xygeni
    189 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    30 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Secure your Software Development and Delivery! Xygeni Security specializes in Application Security Posture Management (ASPM), using deep contextual insights to effectively prioritize and manage secur

Users
No information available
Industries
No information available
Market Segment
  • 60% Small-Business
  • 40% Mid-Market
Xygeni Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Comprehensive Security
2
Prioritization
2
Risk Management
2
Security
2
Cloud Integration
1
Cons
Difficult Setup
1
Learning Curve
1
Seller Details
Year Founded
2021
HQ Location
Madrid, ES
Twitter
@xygeni
189 Twitter followers
LinkedIn® Page
www.linkedin.com
30 employees on LinkedIn®

This is how G2 Deals can help you:

  • Easily shop for curated – and trusted – software
  • Own your own software buying journey
  • Discover exclusive deals on software
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Automatically build Python, Perl and Tcl runtimes for Windows, Linux and Mac, or download one of our popular pre-built ActivePython, ActivePerl or ActiveTcl distributions. ActiveState has been cre

    Users
    No information available
    Industries
    • Computer & Network Security
    • Computer Software
    Market Segment
    • 53% Small-Business
    • 26% Mid-Market
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1997
    HQ Location
    Vancouver, BC
    Twitter
    @ActiveState
    4,036 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    69 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Automatically build Python, Perl and Tcl runtimes for Windows, Linux and Mac, or download one of our popular pre-built ActivePython, ActivePerl or ActiveTcl distributions. ActiveState has been cre

Users
No information available
Industries
  • Computer & Network Security
  • Computer Software
Market Segment
  • 53% Small-Business
  • 26% Mid-Market
Seller Details
Year Founded
1997
HQ Location
Vancouver, BC
Twitter
@ActiveState
4,036 Twitter followers
LinkedIn® Page
www.linkedin.com
69 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Arnica simplifies and effectively automates source code security, while maintaining or improving development velocity. Arnica uses rich tooling integration, deep learning, and behavioral analytics to

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 60% Enterprise
    • 20% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Arnica Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Accuracy of Findings
    1
    Actionable Recommendations
    1
    Ease of Use
    1
    Easy Setup
    1
    Remediation Solutions
    1
    Cons
    Paid Features
    1
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Arnica
    Year Founded
    2021
    HQ Location
    Alpharetta, Georgia
    Twitter
    @arnicaio
    123 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    44 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Arnica simplifies and effectively automates source code security, while maintaining or improving development velocity. Arnica uses rich tooling integration, deep learning, and behavioral analytics to

Users
No information available
Industries
No information available
Market Segment
  • 60% Enterprise
  • 20% Mid-Market
Arnica Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Accuracy of Findings
1
Actionable Recommendations
1
Ease of Use
1
Easy Setup
1
Remediation Solutions
1
Cons
Paid Features
1
Seller Details
Seller
Arnica
Year Founded
2021
HQ Location
Alpharetta, Georgia
Twitter
@arnicaio
123 Twitter followers
LinkedIn® Page
www.linkedin.com
44 employees on LinkedIn®
0 ratings
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Bionic is an agentless Application Security Posture Management (ASPM) platform that provides unique visibility into the security, data privacy, and operational risk of applications running in producti

    We don't have enough data from reviews to share who uses this product. Leave a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Bionic
    Year Founded
    2011
    HQ Location
    Remote, Oregon, United States
    LinkedIn® Page
    www.linkedin.com
    10,347 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Bionic is an agentless Application Security Posture Management (ASPM) platform that provides unique visibility into the security, data privacy, and operational risk of applications running in producti

We don't have enough data from reviews to share who uses this product. Leave a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
Seller Details
Seller
Bionic
Year Founded
2011
HQ Location
Remote, Oregon, United States
LinkedIn® Page
www.linkedin.com
10,347 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Boman.ai is a plug-n-play DevSecOps product, that can bring continuous application security to the DevOps pipeline. It brings SAST(Static Application Security Testing), DAST(Dynamic Application Secur

    We don't have enough data from reviews to share who uses this product. Leave a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Boman.ai
    LinkedIn® Page
    www.linkedin.com
    1 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Boman.ai is a plug-n-play DevSecOps product, that can bring continuous application security to the DevOps pipeline. It brings SAST(Static Application Security Testing), DAST(Dynamic Application Secur

We don't have enough data from reviews to share who uses this product. Leave a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
Seller Details
Seller
Boman.ai
LinkedIn® Page
www.linkedin.com
1 employees on LinkedIn®
0 ratings
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    The Dazz Unified Remediation Platform maps your code-to-cloud environment and overlays it with everything you need to know about security.

    We don't have enough data from reviews to share who uses this product. Leave a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Dazz
    LinkedIn® Page
    www.linkedin.com
Product Description
How are these determined?Information
This description is provided by the seller.

The Dazz Unified Remediation Platform maps your code-to-cloud environment and overlays it with everything you need to know about security.

We don't have enough data from reviews to share who uses this product. Leave a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
Seller Details
Seller
Dazz
LinkedIn® Page
www.linkedin.com
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Implement Fluid Attacks' comprehensive, AI-powered solution into your SDLC and develop secure software without delays. As an all-in-one solution, Fluid Attacks accurately finds and helps you remediate

    We don't have enough data from reviews to share who uses this product. Leave a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2001
    HQ Location
    San Francisco, US
    LinkedIn® Page
    www.linkedin.com
    136 employees on LinkedIn®
    Phone
    +14154042154
Product Description
How are these determined?Information
This description is provided by the seller.

Implement Fluid Attacks' comprehensive, AI-powered solution into your SDLC and develop secure software without delays. As an all-in-one solution, Fluid Attacks accurately finds and helps you remediate

We don't have enough data from reviews to share who uses this product. Leave a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
Seller Details
Year Founded
2001
HQ Location
San Francisco, US
LinkedIn® Page
www.linkedin.com
136 employees on LinkedIn®
Phone
+14154042154
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Heeler empowers application security teams to shift left with the context they need to reduce noise, accelerate remediation, and move beyond traditional vulnerability management. By combining ASPM, SC

    We don't have enough data from reviews to share who uses this product. Leave a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2023
    HQ Location
    N/A
    LinkedIn® Page
    www.linkedin.com
    20 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Heeler empowers application security teams to shift left with the context they need to reduce noise, accelerate remediation, and move beyond traditional vulnerability management. By combining ASPM, SC

We don't have enough data from reviews to share who uses this product. Leave a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
Seller Details
Year Founded
2023
HQ Location
N/A
LinkedIn® Page
www.linkedin.com
20 employees on LinkedIn®
0 ratings
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    CodeEye's IRIS is a next-generation application security posture management (ASPM) platform, offers an all-in-one solution with real-time, AI-powered vulnerability and threat detection, correlation, p

    We don't have enough data from reviews to share who uses this product. Leave a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    CodeEye
    Year Founded
    2015
    HQ Location
    Toronto, CA
    Twitter
    @CodeEyeAI
    6 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    18 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

CodeEye's IRIS is a next-generation application security posture management (ASPM) platform, offers an all-in-one solution with real-time, AI-powered vulnerability and threat detection, correlation, p

We don't have enough data from reviews to share who uses this product. Leave a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
Seller Details
Seller
CodeEye
Year Founded
2015
HQ Location
Toronto, CA
Twitter
@CodeEyeAI
6 Twitter followers
LinkedIn® Page
www.linkedin.com
18 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Kodem is an application security platform powered by Runtime Intelligence. Kodem secures the software supply chain and the underlying cloud infrastructure throughout its lifecycle from development to

    We don't have enough data from reviews to share who uses this product. Leave a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2021
    HQ Location
    Tel Aviv, IL
    LinkedIn® Page
    www.linkedin.com
    43 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Kodem is an application security platform powered by Runtime Intelligence. Kodem secures the software supply chain and the underlying cloud infrastructure throughout its lifecycle from development to

We don't have enough data from reviews to share who uses this product. Leave a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
Seller Details
Year Founded
2021
HQ Location
Tel Aviv, IL
LinkedIn® Page
www.linkedin.com
43 employees on LinkedIn®
Entry Level Price:Starting at $12,000.00
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    It is an application security orchestration platform that automates work across scanning tools, centralizes vulnerability management and improves security posture with risk-based metrics and security

    We don't have enough data from reviews to share who uses this product. Leave a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Kondukto
    Year Founded
    2019
    HQ Location
    Wilmington, US
    LinkedIn® Page
    www.linkedin.com
    14 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

It is an application security orchestration platform that automates work across scanning tools, centralizes vulnerability management and improves security posture with risk-based metrics and security

We don't have enough data from reviews to share who uses this product. Leave a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
Seller Details
Seller
Kondukto
Year Founded
2019
HQ Location
Wilmington, US
LinkedIn® Page
www.linkedin.com
14 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Legit Security provides an application security posture management platform that secures application delivery from code to cloud and protects an organization's software supply chain from attacks. The

    We don't have enough data from reviews to share who uses this product. Leave a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    HQ Location
    Boston, Massachusetts, United States
    LinkedIn® Page
    www.linkedin.com
    99 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Legit Security provides an application security posture management platform that secures application delivery from code to cloud and protects an organization's software supply chain from attacks. The

We don't have enough data from reviews to share who uses this product. Leave a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
Seller Details
HQ Location
Boston, Massachusetts, United States
LinkedIn® Page
www.linkedin.com
99 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Oxeye is an application security solution that was developed to address the unique architecture of cloud native applications. We combine static analysis with runtime flow tracing and infrastructure an

    We don't have enough data from reviews to share who uses this product. Leave a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Oxeye
    HQ Location
    Tel Aviv, IL
    LinkedIn® Page
    www.linkedin.com
    8 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Oxeye is an application security solution that was developed to address the unique architecture of cloud native applications. We combine static analysis with runtime flow tracing and infrastructure an

We don't have enough data from reviews to share who uses this product. Leave a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
Seller Details
Seller
Oxeye
HQ Location
Tel Aviv, IL
LinkedIn® Page
www.linkedin.com
8 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    RiskApp proves your app is secure — before and after it ships

    We don't have enough data from reviews to share who uses this product. Leave a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    RiskApp
    HQ Location
    New York, US
    LinkedIn® Page
    www.linkedin.com
    6 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

RiskApp proves your app is secure — before and after it ships

We don't have enough data from reviews to share who uses this product. Leave a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
Seller Details
Seller
RiskApp
HQ Location
New York, US
LinkedIn® Page
www.linkedin.com
6 employees on LinkedIn®