2026 Best Software Awards are here!See the list
BINARLY

By BINARLY

Re-claim Profile

Re-claim your company’s G2 profile

This profile hasn’t been active for over a year.
If you work at BINARLY, you can re-claim it to keep your company’s information up to date and make the most of your G2 presence.

    Once approved, you can:

  • Update your company and product details

  • Boost your brand's visibility on G2, search and LLMs

  • Access insights on visitors and competitors

  • Respond to customer reviews

  • We’ll verify your work email before granting access.

Re-claim
0 out of 5 stars

How would you rate your experience with BINARLY?

This product hasn't been reviewed yet! Be the first to share your experience.
Leave a Review

BINARLY Reviews & Product Details

Product Avatar Image

Have you used BINARLY before?

Answer a few questions to help the BINARLY community

BINARLY Reviews (0)

G2 reviews are authentic and verified.

There are not enough reviews of BINARLY for G2 to provide buying insight. Below are some alternatives with more reviews:

1
SonarQube Logo
SonarQube
4.4
(138)
SonarQube is a code quality and vulnerability solution for development teams that integrates with CI/CD pipelines to ensure the software you produce is secure, reliable, and maintainable.
2
Snyk Logo
Snyk
4.5
(126)
Snyk is a security solution designed to find and fix vulnerabilities in Node.js and Ruby apps.
3
Mend.io Logo
Mend.io
4.3
(112)
Mend.io delivers the first AI native application security platform built for software created by both humans and machines. It empowers organizations to secure AI generated code and embedded AI components like models, agents, MCPs, and RAG pipelines. The unified platform brings together comprehensive capabilities including AI security, SAST, SCA, container scanning, and Mend Renovate providing development and security teams complete visibility into risks across their codebase. With AI powered remediation and prioritization workflows, teams are enabled to quickly resolve issues and reduce risk. With a simple, predictable price model, eliminating per-module costs and minimal reliance on expensive professional services Mend.io is a scalable, proactive, developer-friendly platform for modern AppSec—all in a single platform.
4
JFrog Logo
JFrog
4.2
(107)
The JFrog Platform is an end-to-end, hybrid, and universal binary-centric solution that continuously manages and secures your entire software supply chain from source to edge. We empower developers to be more efficient using JFrog’s services, Artifactory, Xray, Distribution, Pipelines, and Connect on a single unified platform. The JFrog Platform is an enterprise-grade solution that handles the scale of the largest development organizations in the world. The JFrog family of products includes: JFrog Artifactory: -Provides definitive artifact management for flexible development and trusted delivery at any scale. The industry leader. JFrog Xray: -The industry’s only DevOps-Centric Security solution offers protection across your supply chain and is integrated seamlessly with Artifactory and the other JFrog products for a single point of management and security. JFrog Pipelines: -Integrates with the leading CI/CD tools to manage all software pipelines in a single place with additional event triggers and easy-to-use templates. JFrog Distribution and JFrog PDN: -Creates trusted software releases and gets them where they need to be, fast. Handles the highest scale of throughput and consumption. JFrog Connect: -A comprehensive solution for updating, managing and monitoring software applications on Linux-based edge and IoT devices. JFrog Mission Control & Insights: -Enhances control over your JFrog Platform deployment with access to key metrics.
5
CAST Highlight Logo
CAST Highlight
4.5
(90)
Rapid application portfolio analysis. Automated source code analysis of hundreds of applications in a week for Cloud Readiness, Open Source risks, Resiliency, Agility. Objective software insights combined with qualitative surveys for business context.
6
Aqua Security Logo
Aqua Security
4.2
(57)
Aqua Security protects every cloud native application from code to cloud to prompt. As the pioneer in container security and vulnerability management, Aqua delivers full protection across the application lifecycle in real time. Our unified CNAPP combines agentless and agent-based controls with industry-leading runtime security for cloud, on-prem, hybrid, multi-cloud, VM and mainframe environments. The Aqua Platform provides best-in-class security agents and advanced contextual analysis to reduce noise and accelerate remediation. Founded in 2015, Aqua is headquartered in Boston, MA and Ramat Gan, Israel and secures more than 40% of the Fortune 100. Learn more at aquasec.com.
7
OX Security Logo
OX Security
4.8
(51)
OX Security helps teams focus on the 5% of issues that really matter, ensuring developers fix the most critical problems first. By consolidating all your security data into one clear view and seamlessly integrating into existing workflows, OX provides actionable insights to improve app security, reduce complexity, and resolve issues faster—all without slowing down development.
8
SOOS Logo
SOOS
4.6
(42)
SOOS is the affordable, easy-to-integrate Software Composition Analysis solution for your whole team. Scan your open source software for vulnerabilities, control the introduction of new dependencies, exclude unwanted license-types, generate SBOMs, and fill out your compliance worksheets with confidence–all for one low monthly price.
9
MergeBase Logo
MergeBase
4.5
(20)
rusted by security and development teams at top enterprises, MergeBase provides security and development teams with visibility to the real risk in their applications from vulnerable open source components at every stage of the software development lifecycle with CodeGreen, BuildGreen, and RunGreen. MergeBase accelerates triage by minimizing false positives and deemphasizing vulnerabilities in unused code. It automates remediation during development and can block attacks on vulnerable components in production.
10
Cybeats Logo
Cybeats
4.4
(15)
Cybeats' Runtime Device Self Protection (RDSP is an integrated security platform designed to safeguard high-value connected devices throughout their lifecycle. By embedding a microagent directly into device firmware, RDSP continuously monitors device behavior, instantly detecting and mitigating cyber threats without causing downtime. This proactive approach ensures devices remain secure and operational, even in the face of evolving cyberattacks. Key Features and Functionality: - Device Threat Model Identification: During development, RDSP analyzes potential vulnerabilities, including software weaknesses and insecure network operations, ensuring devices are secure before deployment. - Real-time Trusted Device Profiles: By establishing a baseline of normal device behavior, RDSP identifies and addresses anomalies in real-time, allowing immediate remediation without interrupting device functionality. - Continuous Threat Intelligence: RDSP provides ongoing security updates, enabling devices to adapt to new threats and maintain robust protection over time. - Efficient Performance: With a minimal footprint of approximately 600KB, RDSP operates efficiently, ensuring minimal impact on device performance and hardware requirements. - API Integration: RDSP offers a REST API for seamless integration with existing systems, facilitating comprehensive device management and security oversight. Primary Value and Problem Solved: RDSP addresses the critical need for continuous, real-time security in connected devices, particularly in sectors where device downtime is unacceptable, such as critical infrastructure, healthcare, and smart buildings. Traditional cybersecurity solutions often require quarantining compromised devices, leading to operational disruptions. In contrast, RDSP's embedded approach allows for immediate threat detection and mitigation without removing devices from service, ensuring uninterrupted operations and enhanced security. This solution empowers device manufacturers and operators to build, deploy, and maintain secure devices efficiently, meeting regulatory standards and reducing the risk of cyberattacks.
Show More

No Discussions for This Product Yet

Be the first to ask a question and get answers from real users and experts.

Start a discussion
Pricing

Pricing details for this product isn’t currently available. Visit the vendor’s website to learn more.