App store for web apps

Find the right software and services.

WebCatalog Desktop

Turn websites into desktop apps with WebCatalog Desktop, and access a wealth of exclusive apps for Mac, Windows. Use spaces to organize apps, switch between multiple accounts with ease, and boost your productivity like never before.

Top Software Composition Analysis Tools - United States

Software Composition Analysis (SCA) tools allow users to analyze and manage the open-source components in their applications. Companies and developers use these tools to ensure proper licensing and evaluate vulnerabilities in each open-source element. More comprehensive than traditional vulnerability scanners, SCA tools automatically review all open-source components for policy and license compliance, security risks, and version updates. Additionally, SCA software offers actionable insights to address any vulnerabilities found, typically provided in the reports generated after a scan.

Submit New App


GitHub

GitHub

github.com

GitHub is a platform for hosting and collaborating on software development projects, offering version control, project management, and social coding features.

GitLab

GitLab

about.gitlab.com

GitLab is a web-based tool for managing code repositories, issue tracking, and CI/CD pipelines, supporting collaboration throughout the software development lifecycle.

Wiz

Wiz

wiz.io

Wiz is a cloud security platform that enhances vulnerability management and security posture across cloud environments with agentless scanning and risk prioritization.

Snyk

Snyk

snyk.io

Snyk is a developer security platform that helps identify and fix vulnerabilities in code, open source, containers, and cloud infrastructure.

Semgrep

Semgrep

semgrep.dev

Semgrep is a customizable security platform that scans code for vulnerabilities, integrates with development workflows, and provides actionable results for developers.

SOOS

SOOS

soos.io

Application Security Posture Management Platform Your organization’s application security posture should be more than just a checklist. SOOS’s ASPM is a dynamic, comprehensive approach to safeguarding your application infrastructure from vulnerabilities across the Software Development Life Cycle (SDLC) and live deployments. All in one dashboard.

Bytesafe

Bytesafe

bytesafe.dev

Bytesafe is a platform for end-to-end software supply chain security - a firewall for your dependencies. The platform consists of: - Dependency Firewall - Package Management - Software Composition Analysis - License Compliance

The Code Registry

The Code Registry

thecoderegistry.com

The Code Registry is the world's first AI-powered code intelligence and insights platform, designed to safeguard and optimize software assets for businesses. By providing an independent, secure replication of code repositories and delivering in-depth analysis and reporting, The Code Registry empowers business leaders and senior IT experts to manage their development teams and software budgets more effectively. With a focus on security, efficiency, and transparency, The Code Registry is setting a new standard in code management and analysis. By signing up to any of our subscription tiers you will have complete access to; > Independent secure automated Code Vault back-ups > Full code security scans > Open Source dependency and licence detection > Code Complexity Analysis > AI Quotient™ > Full Git History > Proprietary 'code-to-replicate' code valuation > Automated comparison reporting. The Code Registry. Know Your Code™

Endor Labs

Endor Labs

endorlabs.com

The Endor Labs Software Supply Chain Security Platform addresses three key software supply chain security pain points and outcomes: Open Source Code Security: Endor Labs helps engineers improve application performance and minimize attack surface by selecting and maintaining secure & high quality dependencies across the SDLC. Endor Labs replaces the existing breed of SCA solutions that lack context on code usage, thereby cutting ~80% of SCA noise so teams can focus on what matters. CI/CD Pipeline Security: Endor Labs helps you discover pipelines and shadow engineering, ensure consistent security tool coverage, monitor the posture of repositories, and implement build integrity verification, all through a single hook and policy-as-code framework integrated into your pipeline. Compliance & SBOMs: Endor Labs helps teams adhere to standards and regulations by detecting legal risk, generating and ingesting SBOMs/VEX, code signing, and align with NIST SSDF and CIS frameworks.

Apiiro

Apiiro

apiiro.com

Apiiro is the leader in application security posture management (ASPM), unifying risk visibility, prioritization, and remediation with deep code analysis and runtime context. Get complete application and risk visibility: Apiiro takes a deep, code-based approach to ASPM. Its Cloud Application Security Platform analyzes source code and pulls in runtime context to build a continuous, graph-based inventory of application and software supply chain components. Prioritize with code-to-runtime context: With its proprietary Risk Graph™️, Apiiro contextualizes security alerts from third-party tools and native security solutions based on the likelihood and impact of risk to uniquely minimize alert backlogs and triage time by 95%. Fix faster and prevent risks that matter: By tying risks to code owners, providing LLM-enriched remediation guidance, and embedding risk-based guardrails directly into developer tools and workflows, Apiiro improves remediation times (MTTR) by up to 85%. Apiiro's native security solutions include API security testing in code, secrets detection and validation, software bill of materials (SBOM) generation, sensitive data exposure prevention, software composition analysis (SCA), and CI/CD and SCM security.

Xygeni

Xygeni

xygeni.io

Secure your Software Development and Delivery! Xygeni Security specializes in Application Security Posture Management (ASPM), using deep contextual insights to effectively prioritize and manage security risks while minimizing noise and overwhelming alerts. Our innovative technologies automatically detect malicious code in real-time upon new and updated components publication, immediately notifying customers and quarantining affected components to prevent potential breaches. With extensive coverage spanning the entire Software Supply Chain—including Open Source components, CI/CD processes and infrastructure, Anomaly detection, Secret leakage, Infrastructure as Code (IaC), and Container security—Xygeni ensures robust protection for your software applications. Trust Xygeni to protect your operations and empower your team to build and deliver with integrity and security.

OX Security

OX Security

ox.security

Security should be an integral part of the software development process, not an afterthought. Founded by Neatsun Ziv and Lion Arzi, two former Check Point executives, OX is the first and only Active Application Security Posture Management (ASPM) Platform, consolidating disparate application security tools (ASPM+AST and SSC) into a single console. By merging best practices from risk management and cybersecurity with a user-centric approach tailored for developers, it offers complete security, prioritization, and automated remediation of security issues throughout the development cycle, enabling organizations to release secure products quickly.

Cycode

Cycode

cycode.com

Cycode is the only end-to-end software supply chain (SSC) security solution to provide visibility, security, and integrity across all phases of the SDLC. Cycode integrates with all of your software delivery pipeline tools and infrastructure providers to enable complete visibility and hardened security posture through consistent governance and security policies. Cycode further reduces the risk of breaches with a series of scanning engines that look for issues like hardcoded secrets, IAC misconfigurations, code leaks and more. Cycode’s patented knowledge graph tracks code integrity, user activity, and events across the SDLC to find anomalies and prevent code tampering.

Aikido Security

Aikido Security

aikido.dev

Aikido Security is a developer-centric software security platform, providing advanced code scanning and cloud vulnerability assessments. Our platform prioritizes real threats, reduces false-positives and makes Common Vulnerabilities and Exposures (CVEs) easily understandable. With Aikido, ensuring the security of your product is made simple, allowing you to focus on what you do best: writing code.

GuardRails

GuardRails

guardrails.io

GuardRails is an end-to-end security platform that makes AppSec easier for both security and development teams. We scan, detect, and provide real-time guidance to fix vulnerabilities early. Trusted by hundreds of teams around the world to build safer apps, GuardRails integrates seamlessly into the developers’ workflow, quietly scans as they code, and shows how to fix security issues on the spot via Just-in-Time training. GuardRails commits to keeping the noise low and only reporting high-impact vulnerabilities that are relevant to your organization. GuardRails helps organizations shift security everywhere and build a strong DevSecOps pipeline, so they can go faster to market without risking security.

JFrog

JFrog

jfrog.com

Deliver Trusted Software with Speed. The only software supply chain platform to give you end-to-end visibility, security, and control for automating the delivery of trusted releases. The massively scalable, hybrid JFrog Platform is open, flexible, and integrated with all the package technologies and tools comprising the software supply chain. Organizations benefit from full traceability to any type of release and deployment environment including ML models, software that runs on the edge, and software deployed in production data centers.

Panoptica

Panoptica

panoptica.app

Panoptica is Cisco’s powerful cloud native application protection platform that uncovers and remediates vulnerabilities during development through to production, ensuring your applications are secure and compliant. Through graph-based technology, the platform is able to unlock visual insights, critical attack paths, and speed up remediation to safeguard your modern apps across multiple hybrid cloud platforms. Visit https://www.panoptica.app Key Features: - Visibility and Context: Panoptica offers clear visibility and context by identifying attack paths and prioritizing risks, helping you make informed decisions. - Holistic and Complete Coverage: Manage your cloud-native environments effortlessly through Panoptica's integrated security platform, reducing gaps often caused by using separate siloed solutions. - Advanced Analysis: Utilize advanced attack path and root cause analysis techniques to spot potential risks from an attacker's perspective. - Agentless Scanning: Panoptica's agentless technology scans any cloud environment—Azure, AWS, GCP, Kubernetes, or a combination thereof. - Comprehensive Visualization: Map assets and relationships onto an advanced graph database for a complete visual representation of your cloud stack. Benefits - Advanced CNAPP: Panoptica enhances Cloud Native Application Protection Platform capabilities. - Multi-Cloud Compliance: Ensure compliance across various cloud platforms. - End-to-End Visualization: Gain insights into your entire cloud application stack. - Dynamic Remediation: Employ dynamic techniques to resolve issues effectively. - Increased Efficiency: Streamline security processes and reduce response times. - Reduced Overheads: Minimize resource expenditure while optimizing security.

Aqua Security

Aqua Security

aquasec.com

Aqua Security is a cloud-native security platform that protects applications throughout their lifecycle, ensuring vulnerability management and compliance in dynamic environments.

Debricked

Debricked

debricked.com

Debricked's SCA-tool allows you to manage your open source in an easy, smart and efficient manner. Automatically find, fix and prevent vulnerabilities, avoid non compliant licenses and evaluate the health of your dependencies - all in one tool. Security - Your developers shouldn't have to be security experts in order to write secure code. Debricked helps your developers automate open source security in their own pipelines and generate fixes with a button click. License Compliance - Make open source compliance a non issue by automating the prevention of non compliant licenses. Set customizable pipeline rules and make sure to be ready for launch year round. Community Health - Help your developers make informed decisions when choosing what open source to use. Search for name or functionality and easily compare similar projects side by side on a set of health metrics.

Arnica

Arnica

arnica.io

Arnica is a behavior-based software supply chain security platform for DevOps . Arnica proactively protects your software supply chain by automating the day-to-day security operations and empowering developers to own security without incurring risks or compromising velocity.

Fossa

Fossa

fossa.com

Fossa automates open source license scanning and vulnerability management, integrating into CI/CD pipelines to ensure compliance and enhance software security.

© 2025 WebCatalog, Inc.