Introducing G2.ai, the future of software buying.Try now
Inactive Profile: Need Admin Access?
No one has managed this profile for over a year.
If you work at Legit Security, reclaim access to make changes.
Product Avatar Image
Legit Security

By Legit Security

Re-claim Profile

Re-claim your company’s G2 profile

This profile hasn’t been active for over a year.
If you work at Legit Security, you can re-claim it to keep your company’s information up to date and make the most of your G2 presence.

    Once approved, you can:

  • Update your company and product details

  • Boost your brand's visibility on G2, search and LLMs

  • Access insights on visitors and competitors

  • Respond to customer reviews

  • We’ll verify your work email before granting access.

Re-claim
0 out of 5 stars

How would you rate your experience with Legit Security?

Legit Security Pricing Overview

Legit Security has not provided pricing information for this product or service. This is common practice for software sellers and service providers. Contact Legit Security to obtain current pricing.

Legit Security Alternatives Pricing

The following is a quick overview of editions offered by other Software Supply Chain Security Solutions

Snyk
FREE - Limited Tests, Unlimited Developers
Free
For individual developers and small teams looking to secure while they build. Unlimited Developers.
  • 200 Open Source tests per month
  • 100 Container tests per month
  • 300 IaC tests per month
  • 100 Snyk Code tests per month
SonarQube
Cloud - based: Free
Free
For developers wanting to try SonarQube.
  • Scan of private projects limited to 50k lines of code
  • Users limited to max. 5
  • Architecture management
Aikido Security
Free (forever)
Free
For developers and curious minds
  • Up to 2 users, 10 repos, 2 container images, 1 domain, 1 cloud account, 2 AI AutoFixes/mo & 250k protected requests/mo
  • Dependency Scanning (SCA)
  • SAST & AI SAST
  • Secrets Detection
  • Cloud

Various alternatives pricing & plans

Pricing information for the above various Legit Security alternatives is supplied by the respective software provider or retrieved from publicly accessible pricing materials. Final cost negotiations to purchase any of these products must be conducted with the seller.
Product Avatar Image
Product Avatar Image
Legit Security