Introducing G2.ai, the future of software buying.Try now
Aikido Security
Sponsored
Aikido Security
Visit Website
Product Avatar Image
Cycode

By Cycode

4.0 out of 5 stars
5 star
0%
3 star
0%
2 star
0%
1 star
0%

How would you rate your experience with Cycode?

Aikido Security
Sponsored
Aikido Security
Visit Website
It's been two months since this profile received a new review
Leave a Review

Cycode Reviews & Product Details

Profile Status

This profile is currently managed by Cycode but has limited features.

Are you part of the Cycode team? Upgrade your plan to enhance your branding and engage with visitors to your profile!

Cycode Media

Cycode Demo - Cycode dashboard
Cycode's dashboard shows the top violations that require remediation to harden your software delivery pipeline.
Cycode Demo - Integrations
Cycode integrates with all your DevOps tools and infrastructure in seconds.
Product Avatar Image

Have you used Cycode before?

Answer a few questions to help the Cycode community

Cycode Reviews (3)

Reviews

Cycode Reviews (3)

4.0
3 reviews

Search reviews
Filter Reviews
Clear Results
G2 reviews are authentic and verified.
J P.
JP
Business Owner
Mid-Market (51-1000 emp.)
"Totally impressed with cycode"
What do you like best about Cycode?

I've found CyCode to be an easy tool to use and integrate into our environment. I look forward to completing my work onboarding the tool into our production. we internally discussed the risk of exposing a system that actively provides easy access to secrets and shortly thereafter we noticed a new feature that allows us to limit this exposure through the use of roles. Review collected by and hosted on G2.com.

What do you dislike about Cycode?

lacks integrations with many AWS services to make it easy to track application vulnerabilities in terms of the systems hosting our applications rather than just the code & artifacts. Review collected by and hosted on G2.com.

Sachin P.
SP
Devops Consultant
Enterprise (> 1000 emp.)
"Cycode abilities"
What do you like best about Cycode?

1) Product setup is extremely quick.

2) Cycode defaults provide immediate value by highlighting improper storage secrets in source control and data leakage visibility, i.e. Violations - Asset mapping in knowledge graphs.

3) The new workflow functionality enhances the user experience, as custom behavior is now easily implemented from a central point in the system. Review collected by and hosted on G2.com.

What do you dislike about Cycode?

1) The violations which need manual re-scan have to be improved.

2) Display the proper error message when the queries for an extensive knowledge graph are in progress. Review collected by and hosted on G2.com.

Dipak P.
DP
Data Analyst
Mid-Market (51-1000 emp.)
Business partner of the seller or seller's competitor, not included in G2 scores.
"Best software for SDLC process"
What do you like best about Cycode?

Easy to understand and hadel all tools for use.intrrfaceeasy to use. Review collected by and hosted on G2.com.

What do you dislike about Cycode?

Littel bit complicated to extensively work on that. Review collected by and hosted on G2.com.

There are not enough reviews of Cycode for G2 to provide buying insight. Below are some alternatives with more reviews:

1
GitLab Logo
GitLab
4.5
(857)
An open source web interface and source control platform based on Git.
2
GitHub Logo
GitHub
4.7
(2,263)
GitHub is the best place to share code with friends, co-workers, classmates, and complete strangers. Over two million people use GitHub to build amazing things together.
3
Wiz Logo
Wiz
4.7
(735)
Wiz is a CNAPP that consolidates CSPM, KSPM, CWPP, vulnerability management, IaC scanning, CIEM, DSPM, and container and Kubernetes security into a single platform.
4
Lacework FortiCNAPP Logo
Lacework FortiCNAPP
4.4
(384)
Lacework FortiCNAPP is a comprehensive Cloud-Native Application Protection Platform (CNAPP) that consolidates Cloud Security Posture Management (CSPM), Cloud Workload Protection (CWPP), Cloud Infrastructure Entitlement Management (CIEM), Kubernetes security, and compliance into a single solution. Using AI-based anomaly detection and behavioral analytics, FortiCNAPP continuously monitors cloud environments to identify misconfigurations, vulnerabilities, and active threats in real time. The platform supports agentless and agent-based deployment models, ensuring flexible coverage across diverse architectures. FortiCNAPP also integrates with the Fortinet Security Fabric, correlating cloud data with network and endpoint insights from FortiGuard, FortiSOAR, and more, delivering full-stack threat context, faster remediation, and unified risk management.
5
Microsoft Defender for Cloud Logo
Microsoft Defender for Cloud
4.4
(302)
Azure Security Center provides security management and threat protection across your hybrid cloud workloads. It allows you to prevent, detect, and respond to security threats with increased visibility.
6
GitGuardian Logo
GitGuardian
4.8
(234)
Level up your code security with GitGuardian: Scan your Git Repos in Real-Time for Secrets ✔️ Free Trial ✔️ Used by 200k+ developers ✔️ Enterprise Software
7
Orca Security Logo
Orca Security
4.6
(222)
Get workload-level visibility into AWS, Azure, and GCP without the operational costs of agents. You could buy three tools instead… but why? Orca replaces legacy vulnerability assessment tools, CSPM, and CWPP. Deploys in minutes, not months.
8
AlgoSec Logo
AlgoSec
4.5
(195)
AlgoSec is a business-driven security management solution.
9
Hybrid Cloud Security Logo
Hybrid Cloud Security
4.5
(187)
Hybrid Cloud Security solution, powered by XGen security, delivers a blend of cross-generational threat defense techniques that have been optimized to protect physical, virtual, and cloud workloads.
10
Check Point CloudGuard CNAPP Logo
Check Point CloudGuard CNAPP
4.5
(170)
Check Point CloudGuard CNAPP provides you with more context to drive actionable security and smarter prevention, from code-to-cloud, across the application lifecycle. CloudGuard’s prevention-first approach protects applications and workloads throughout the software development lifecycle, and includes an effective risk management engine, with automated remediation prioritization, to allow users to focus on the security risks that matter.
Show More
Pricing

Pricing details for this product isn’t currently available. Visit the vendor’s website to learn more.