2026 Best Software Awards are here!See the list

Best Software Supply Chain Security Solutions - Page 2

Adam Crivello
AC
Researched and written by Adam Crivello

Software supply chain security tools provide automated and continuous monitoring of the various components and stages of the software development process. This includes analyzing the source code, identifying potential security risks, scanning for malicious code, and verifying the authenticity of third-party components and dependencies.

Software supply chain security refers to the process of securing the software development lifecycle from start to finish. It involves safeguarding against any potential vulnerabilities or threats to the software supply chain that could compromise the integrity of the software.

These tools can also detect any attempts to tamper with the software during the development or deployment stages. They help ensure that only trusted and validated software components are included in the final product, thereby minimizing the risk of introducing any vulnerabilities or malware into the software supply chain. Software supply chain security solutions are often used alongside tools such as static code analysis tools to seek out and protect against potential vulnerabilities.

To qualify for inclusion in the Software Supply Chain Security category, a product must:

Provide automated and continuous monitoring of various components of the development process
Detect attempts to tamper with the software during the development or deployment stages
Scan for malicious code and security risks
Verify authenticity of third-party components
Show More
Show Less

Featured Software Supply Chain Security Solutions At A Glance

Free Plan Available:
Aikido Security
Sponsored
Highest Performer:
Easiest to Use:
Top Trending:
Show LessShow More
Highest Performer:
Easiest to Use:
Top Trending:

G2 takes pride in showing unbiased reviews on user satisfaction in our ratings and reports. We do not allow paid placements in any of our ratings, rankings, or reports. Learn about our scoring methodologies.

No filters applied
32 Listings in Software Supply Chain Security Tools Available
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Cycode’s AI-Native Application Security Platform unites security and development teams with actionable context from code to runtime to identify, prioritize, and fix the software risks that matter.

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 67% Mid-Market
    • 33% Enterprise
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Cycode
    Year Founded
    2019
    HQ Location
    New York, New York, United States
    LinkedIn® Page
    www.linkedin.com
    159 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Cycode’s AI-Native Application Security Platform unites security and development teams with actionable context from code to runtime to identify, prioritize, and fix the software risks that matter.

Users
No information available
Industries
No information available
Market Segment
  • 67% Mid-Market
  • 33% Enterprise
Seller Details
Seller
Cycode
Year Founded
2019
HQ Location
New York, New York, United States
LinkedIn® Page
www.linkedin.com
159 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    ReversingLabs is the trusted name in file and software security. We provide the modern cybersecurity platform to verify and deliver safe binaries. Trusted by the Fortune 500 and leading cybersecurity

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 89% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • ReversingLabs Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Accuracy of Information
    2
    Customer Support
    2
    Ease of Use
    2
    Easy Setup
    2
    Efficiency
    2
    Cons
    Complex Querying
    1
    Confusing Interface
    1
    Difficult Learning Curve
    1
    Difficulty for Beginners
    1
    Lack of Clarity
    1
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2009
    HQ Location
    Cambridge, US
    Twitter
    @ReversingLabs
    6,948 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    328 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

ReversingLabs is the trusted name in file and software security. We provide the modern cybersecurity platform to verify and deliver safe binaries. Trusted by the Fortune 500 and leading cybersecurity

Users
No information available
Industries
No information available
Market Segment
  • 89% Small-Business
ReversingLabs Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Accuracy of Information
2
Customer Support
2
Ease of Use
2
Easy Setup
2
Efficiency
2
Cons
Complex Querying
1
Confusing Interface
1
Difficult Learning Curve
1
Difficulty for Beginners
1
Lack of Clarity
1
Seller Details
Year Founded
2009
HQ Location
Cambridge, US
Twitter
@ReversingLabs
6,948 Twitter followers
LinkedIn® Page
www.linkedin.com
328 employees on LinkedIn®
G2 Advertising
Sponsored
G2 Advertising
Get 2x conversion than Google Ads with G2 Advertising!
G2 Advertising places your product in premium positions on high-traffic pages and on targeted competitor pages to reach buyers at key comparison moments.
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Sonatype Repository Firewall helps protect your software supply chain by blocking open source malware and other high-risk components before they enter your artifact repositories and development workfl

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Mid-Market
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Sonatype
    Year Founded
    2008
    HQ Location
    Fulton, US
    Twitter
    @sonatype
    10,670 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    523 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Sonatype Repository Firewall helps protect your software supply chain by blocking open source malware and other high-risk components before they enter your artifact repositories and development workfl

Users
No information available
Industries
No information available
Market Segment
  • 100% Mid-Market
Seller Details
Seller
Sonatype
Year Founded
2008
HQ Location
Fulton, US
Twitter
@sonatype
10,670 Twitter followers
LinkedIn® Page
www.linkedin.com
523 employees on LinkedIn®
Entry Level Price:Free
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    ZeroPath (YC S24) is the first AI-native application security platform that fundamentally reimagines how organizations find and fix vulnerabilities. Unlike deterministic SAST tools that bolt AI onto l

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 33% Small-Business
    • 22% Mid-Market
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    ZeroPath
    Company Website
    Year Founded
    2024
    HQ Location
    San Francisco, US
    LinkedIn® Page
    www.linkedin.com
    7 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

ZeroPath (YC S24) is the first AI-native application security platform that fundamentally reimagines how organizations find and fix vulnerabilities. Unlike deterministic SAST tools that bolt AI onto l

Users
No information available
Industries
No information available
Market Segment
  • 33% Small-Business
  • 22% Mid-Market
Seller Details
Seller
ZeroPath
Company Website
Year Founded
2024
HQ Location
San Francisco, US
LinkedIn® Page
www.linkedin.com
7 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Apiiro is the leader in application security posture management (ASPM), unifying risk visibility, prioritization, and remediation with deep code analysis and runtime context. Get complete applicatio

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Mid-Market
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Apiiro
    Year Founded
    2019
    HQ Location
    New York, New York, United States
    Twitter
    @apiiroSecurity
    7,458 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    120 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Apiiro is the leader in application security posture management (ASPM), unifying risk visibility, prioritization, and remediation with deep code analysis and runtime context. Get complete applicatio

Users
No information available
Industries
No information available
Market Segment
  • 100% Mid-Market
Seller Details
Seller
Apiiro
Year Founded
2019
HQ Location
New York, New York, United States
Twitter
@apiiroSecurity
7,458 Twitter followers
LinkedIn® Page
www.linkedin.com
120 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    AppSec360 is a platform for AI-driven software development to become Secure-by-Design.

    We don't have enough data from reviews to share who uses this product. Leave a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Appsec360
    Year Founded
    2020
    HQ Location
    Melbourne, AU
    LinkedIn® Page
    www.linkedin.com
    3 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

AppSec360 is a platform for AI-driven software development to become Secure-by-Design.

We don't have enough data from reviews to share who uses this product. Leave a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
Seller Details
Seller
Appsec360
Year Founded
2020
HQ Location
Melbourne, AU
LinkedIn® Page
www.linkedin.com
3 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    The Conviso Platform is a complete Application Security Posture Management (ASPM) solution that centralizes visibility, correlation, and prioritization of vulnerabilities across the software developme

    We don't have enough data from reviews to share who uses this product. Leave a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2008
    HQ Location
    Curitiba, BR
    LinkedIn® Page
    www.linkedin.com
    81 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

The Conviso Platform is a complete Application Security Posture Management (ASPM) solution that centralizes visibility, correlation, and prioritization of vulnerabilities across the software developme

We don't have enough data from reviews to share who uses this product. Leave a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
Seller Details
Year Founded
2008
HQ Location
Curitiba, BR
LinkedIn® Page
www.linkedin.com
81 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Gauntlet mitigates risks like security breaches, data theft, and compliance violations with Generative AI (GenAI), enhancing efficiency by accelerating time-to-fix by 60%. Its core pillars include Clo

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Gauntlet Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Customer Success
    1
    Remediation Guidance
    1
    Reporting
    1
    Cons
    Inefficient Alert System
    1
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    HQ Location
    N/A
    LinkedIn® Page
    www.linkedin.com
    1 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Gauntlet mitigates risks like security breaches, data theft, and compliance violations with Generative AI (GenAI), enhancing efficiency by accelerating time-to-fix by 60%. Its core pillars include Clo

Users
No information available
Industries
No information available
Market Segment
  • 100% Small-Business
Gauntlet Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Customer Success
1
Remediation Guidance
1
Reporting
1
Cons
Inefficient Alert System
1
Seller Details
HQ Location
N/A
LinkedIn® Page
www.linkedin.com
1 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Enable enterprise level enforcement and management of model security to block unsafe models from entering your environment.

    We don't have enough data from reviews to share who uses this product. Leave a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2005
    HQ Location
    Santa Clara, CA
    Twitter
    @PaloAltoNtwks
    127,829 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    18,396 employees on LinkedIn®
    Ownership
    NYSE: PANW
Product Description
How are these determined?Information
This description is provided by the seller.

Enable enterprise level enforcement and management of model security to block unsafe models from entering your environment.

We don't have enough data from reviews to share who uses this product. Leave a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
Seller Details
Year Founded
2005
HQ Location
Santa Clara, CA
Twitter
@PaloAltoNtwks
127,829 Twitter followers
LinkedIn® Page
www.linkedin.com
18,396 employees on LinkedIn®
Ownership
NYSE: PANW
0 ratings
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    CodeEye's IRIS is a next-generation application security posture management (ASPM) platform, offers an all-in-one solution with real-time, AI-powered vulnerability and threat detection, correlation, p

    We don't have enough data from reviews to share who uses this product. Leave a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    CodeEye
    Year Founded
    2015
    HQ Location
    Toronto, CA
    Twitter
    @CodeEyeAI
    6 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    18 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

CodeEye's IRIS is a next-generation application security posture management (ASPM) platform, offers an all-in-one solution with real-time, AI-powered vulnerability and threat detection, correlation, p

We don't have enough data from reviews to share who uses this product. Leave a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
Seller Details
Seller
CodeEye
Year Founded
2015
HQ Location
Toronto, CA
Twitter
@CodeEyeAI
6 Twitter followers
LinkedIn® Page
www.linkedin.com
18 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Legit Security provides an application security posture management platform that secures application delivery from code to cloud and protects an organization's software supply chain from attacks. The

    We don't have enough data from reviews to share who uses this product. Leave a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    HQ Location
    Boston, Massachusetts, United States
    LinkedIn® Page
    www.linkedin.com
    99 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Legit Security provides an application security posture management platform that secures application delivery from code to cloud and protects an organization's software supply chain from attacks. The

We don't have enough data from reviews to share who uses this product. Leave a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
Seller Details
HQ Location
Boston, Massachusetts, United States
LinkedIn® Page
www.linkedin.com
99 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Proactive monitoring and Threat Detection for GitHub CI Workflows

    We don't have enough data from reviews to share who uses this product. Leave a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    HQ Location
    N/A
    LinkedIn® Page
    www.linkedin.com
    1 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Proactive monitoring and Threat Detection for GitHub CI Workflows

We don't have enough data from reviews to share who uses this product. Leave a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
Seller Details
HQ Location
N/A
LinkedIn® Page
www.linkedin.com
1 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    NPMSCan is a security analysis platform for JavaScript and Node.js ecosystems that helps developers and teams identify supply chain risks in npm packages. The platform scans npm dependencies to detec

    We don't have enough data from reviews to share who uses this product. Leave a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    HQ Location
    N/A
    LinkedIn® Page
    www.linkedin.com
    1 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

NPMSCan is a security analysis platform for JavaScript and Node.js ecosystems that helps developers and teams identify supply chain risks in npm packages. The platform scans npm dependencies to detec

We don't have enough data from reviews to share who uses this product. Leave a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
Seller Details
HQ Location
N/A
LinkedIn® Page
www.linkedin.com
1 employees on LinkedIn®
0 ratings
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Phylum defends applications at the perimeter of the open-source ecosystem and the tools used to build software. Its automated analysis engine scans third-party code as soon as it’s published into the

    We don't have enough data from reviews to share who uses this product. Leave a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Phylum
    Year Founded
    2006
    HQ Location
    Burlington, Massachusetts, United States
    Twitter
    @Phylum_IO
    333 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    541 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Phylum defends applications at the perimeter of the open-source ecosystem and the tools used to build software. Its automated analysis engine scans third-party code as soon as it’s published into the

We don't have enough data from reviews to share who uses this product. Leave a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
Seller Details
Seller
Phylum
Year Founded
2006
HQ Location
Burlington, Massachusetts, United States
Twitter
@Phylum_IO
333 Twitter followers
LinkedIn® Page
www.linkedin.com
541 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Automatically detect, prioritize and remediate software risk - without an agent - to relieve security bottlenecks and free developer resources to build.

    We don't have enough data from reviews to share who uses this product. Leave a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    rezilion
    Year Founded
    2018
    HQ Location
    Be'er Sheva, Israel
    Twitter
    @rezilion_
    202 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    6 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Automatically detect, prioritize and remediate software risk - without an agent - to relieve security bottlenecks and free developer resources to build.

We don't have enough data from reviews to share who uses this product. Leave a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
Seller Details
Seller
rezilion
Year Founded
2018
HQ Location
Be'er Sheva, Israel
Twitter
@rezilion_
202 Twitter followers
LinkedIn® Page
www.linkedin.com
6 employees on LinkedIn®