Home / Application and API Security / Software Development Lifecycle (SDLC) Security

Software Development Lifecycle (SDLC) Security

Secure your software from code to deployment with SDLC security best practices.

Try these 313 AI Software Development Lifecycle (SDLC) Security Tools

Haechi Audit
Free

Haechi Audit View Haechi Audit

Haechi Audit is a premier smart contract security audit firm renowned for delivering robust security solutions and expert development services to a global clientele. Backed by incubation from Samsung Electronics and prestigious grants from the Ethereum Foundation and Ethereum Community Fund, we are the trusted partner for industry leaders seeking to safeguard their blockchain innovations. Our comprehensive approach ensures the highest standards of smart contract integrity and secure development practices.

Expert Smart Contract Auditing
Secure Smart Contract Development
Blockchain Security Consulting
Hardenite
Free

Hardenite View Hardenite

Hardenite provides a cutting-edge DevSecOps solution built on an innovative Linux OS, enabling continuous, automated, and comprehensive security management. This solution empowers organizations to efficiently detect and remediate security vulnerabilities, from CVEs and hardening to network security, across the entire product lifecycle. Hardenite is designed to assist R&D, DevOps, and IT teams in effectively managing security risks and hardening efforts for any Linux OS-based product in diverse industries like Automotive, IoT, and Medical Devices, offering a highly productive and cost-effective approach.

Continuous, automated security detection and remediation
Comprehensive security coverage (CVEs, Hardening, Network)
Linux OS-centric DevSecOps solution
Harness
Free

Harness View Harness

Harness is the world's first AI-native software delivery platform designed to empower engineering teams and elevate developer experience. By providing an end-to-end solution, Harness enables organizations to achieve peak engineering excellence and drive critical outcomes through intelligent automation and advanced AI capabilities.

AI-powered software delivery automation
End-to-end platform for continuous delivery
Enhanced developer productivity and experience
Hex-Rays
Free

Hex-Rays View Hex-Rays

Hex-Rays, a Belgian company founded in 2005, is a leader in developing advanced binary analysis and reverse engineering tools for the IT security market. Their flagship IDA Pro is the industry standard for software disassembly, complemented by the Hex-Rays Decompiler plugin. This powerful plugin significantly enhances the productivity of security researchers by providing high-quality C/C++ decompilation of real-world binaries, built upon over a decade of proprietary research and innovative algorithms.

Industry-leading software disassembler (IDA Pro)
Advanced C/C++ binary decompilation
Enhanced researcher productivity
HiddenLayer
Free

HiddenLayer View HiddenLayer

HiddenLayer offers the industry's first comprehensive security platform specifically designed for the protection of AI and machine learning systems. Our patent-pending technology safeguards ML models, algorithms, and the data pipelines that power them, addressing the sophisticated threats posed by adversarial AI attacks. Leveraging the MITRE ATLAS framework, HiddenLayer provides organizations with the proactive defenses needed to secure their critical AI investments against emerging vulnerabilities.

AI/ML Model Protection
Adversarial Attack Detection & Prevention
Data Pipeline Security
Hunter2
Free

Hunter2 View Hunter2

Hunter2 is a cutting-edge platform designed to elevate the application security posture of engineering teams. Through engaging, interactive labs, developers gain practical experience in identifying and remediating vulnerabilities within realistic web applications. By working with codebases built in their specific technology stacks, your developers will acquire the essential skills to proactively defend against modern cyber threats.

Interactive, hands-on web application security labs
Real-world exploitation and patching exercises
Curriculum tailored to modern tech stacks
Huntr
Free

Huntr View Huntr

Huntr is the premier bug bounty platform specifically designed for the unique challenges of AI/ML applications. It offers security researchers a streamlined, centralized hub to discover and report vulnerabilities, thereby fortifying the security and stability of AI/ML systems, inclusive of those leveraging Open Source Software (OSS). Backed by Protect AI, Huntr is at the forefront of advancing MLSecOps and enhancing overall AI security.

Dedicated AI/ML vulnerability reporting
Centralized submission portal
Enhances AI/ML application security and stability
IAR Systems
Free

IAR Systems View IAR Systems

IAR Systems is a leading provider of embedded development tools, empowering engineers to create secure and innovative IoT solutions. We enable the development of smarter, more connected products while addressing the critical security challenges inherent in the rapidly evolving IoT landscape. Our commitment lies in democratizing security and advancing a more robust, trustworthy connected future.

Comprehensive Embedded Development Toolchain
Advanced Debugging and Analysis Capabilities
Highly Optimized Compiler Technology
ImmuneBytes
Free

ImmuneBytes View ImmuneBytes

ImmuneBytes is a premier cybersecurity firm dedicated to fortifying the Web3 ecosystem through expert smart contract auditing and comprehensive security solutions. Since our inception in the mid-2020s, we have empowered over 175 Web 3.0 projects and secured approximately $4.1 billion in assets, demonstrating our commitment to establishing a secure and dependable blockchain environment. Headquartered in New Delhi and serving a global clientele, we specialize in uncovering vulnerabilities and providing robust protection against sophisticated cyber threats for businesses and startups worldwide.

Expert Smart Contract Auditing
Comprehensive Web3 Security Solutions
Vulnerability Assessment and Mitigation
Immunefi
Free

Immunefi View Immunefi

Immunefi is the premier bug bounty platform dedicated to securing Web3 and smart contract projects. We offer comprehensive services including program design, management, and hosting to incentivize ethical hackers to discover and responsibly disclose vulnerabilities. By fostering a robust security ecosystem, Immunefi empowers projects to proactively identify and mitigate risks, ensuring a safer environment for the entire decentralized landscape and facilitating the largest bounties and payouts in the industry.

Industry-leading bug bounty program management
Dedicated consultation for Web3 security initiatives
Platform for hosting and managing bug bounty programs
Indium Software
Free

Indium Software View Indium Software

Indium Software is a distinguished global Independent Software Testing Service Provider offering specialized security testing solutions across diverse domains. With a strategic presence in the USA, Malaysia, and India, Indium integrates comprehensive security testing throughout the entire Software Development Life Cycle (SDLC). Our proactive approach ensures early detection of vulnerabilities and threats, safeguarding your cloud applications and sensitive data through robust, unified security measures.

End-to-end SDLC security testing integration
Cloud application security assurance
Proactive threat and vulnerability detection
Instil Software
Free

Instil Software View Instil Software

Instil Software empowers technology brands to lead market transformation and innovation through category-defining software products. Our expertise spans developing cutting-edge solutions that redefine user interaction and ensuring robust cyber security to protect against evolving threats. We partner with you to achieve market disruption via secure, resilient, and forward-thinking software.

Category-Defining Software Product Development
Market Transformation and Innovation Strategy
Cyber Security Preparedness and Protection
Intland Software
Free

Intland Software View Intland Software

Intland Software's codeBeamer ALM is a comprehensive Application Lifecycle Management platform designed to holistically integrate requirements, development, and testing across your entire product lifecycle. It empowers organizations to streamline complex development processes, significantly reduce costs, and elevate product quality through seamless traceability and powerful, end-to-end lifecycle management capabilities.

Holistically Integrated ALM Platform
All-Round Requirements Management
Comprehensive Development Functionality
Invariant Labs
Free

Invariant Labs View Invariant Labs

Invariant Labs, now part of Snyk, specializes in fortifying AI systems for the agentic era. Their flagship Invariant Guardrails provides a state-of-the-art, contextual guardrailing solution designed to make complex AI applications, including MCP and agentic systems, robust, reliable, and secure. By addressing the critical security needs of increasingly interconnected AI, Invariant Labs empowers organizations to confidently leverage advanced AI capabilities.

State-of-the-art guardrailing system for AI applications
Contextual guardrailing for enhanced AI safety
Ensures robustness and reliability of AI systems
IriusRisk
Free

IriusRisk View IriusRisk

IriusRisk is a leading open platform for automated threat modeling, designed to embed security seamlessly into the software development lifecycle. By automating threat model creation at the design phase and providing actionable risk mitigation recommendations, IriusRisk empowers organizations to manage security risks effectively throughout the entire SDLC. Its robust architectural diagramming and customization capabilities foster collaboration among all stakeholders, ensuring comprehensive security integration.

Automated threat model generation
Design-time security analysis
Actionable risk mitigation recommendations
ISTQB
Free

ISTQB View ISTQB

The International Software Testing Qualifications Board (ISTQB) is a globally recognized, not-for-profit organization dedicated to advancing the software testing profession. Since its founding in 2002, ISTQB has established the leading global certification standard for software testing competencies with its 'Certified Tester' scheme. This initiative is driven by the collaborative efforts of hundreds of international testing experts, ensuring a robust and continually evolving framework for software quality assurance.

World-leading software testing certification
Globally recognized standard
Not-for-profit organization
Iterasec
Free

Iterasec View Iterasec

Iterasec offers comprehensive security services dedicated to hacker-proofing your products and embedding security into the software engineering lifecycle. Founded in 2019, our boutique firm unites deep cybersecurity expertise with extensive software engineering knowledge to provide a holistic approach to product and application security. We empower businesses to build resilient software through secure-by-design principles and robust engineering processes.

Application Security Testing
Secure Software Development Lifecycle (SSDLC) Integration
Code Review and Vulnerability Assessment
JFrog
Free

JFrog View JFrog

JFrog enables Continuous Updates through its Liquid Software vision, empowering development teams to build, secure, and distribute high-quality applications seamlessly to end-users with zero downtime. As the world's first Universal Artifact Management platform, JFrog acts as the central hub for all software artifacts, automating and streamlining the entire software release lifecycle.

Universal Artifact Management
Continuous Integration/Continuous Delivery (CI/CD) Orchestration
Artifact Security Scanning and Compliance
Jscrambler
Free

Jscrambler View Jscrambler

Jscrambler provides comprehensive security solutions for JavaScript and web applications, safeguarding them against tampering and reverse-engineering. As a leader in client-side security, its flagship product offers self-defensive capabilities, making applications resilient in over 130 countries and trusted by tens of thousands of organizations globally, including Fortune 500 enterprises.

Client-side RASP protection
JavaScript obfuscation and security
Web application resilience
Kiuwan
Free

Kiuwan View Kiuwan

Kiuwan offers robust application security solutions, seamlessly integrating Static Application Security Testing (SAST) and Software Composition Analysis (SCA) into your DevOps workflows. Achieve compliance with leading security and code quality standards by leveraging objective data to make informed decisions on application security, productivity, costs, effort, efficiency, and dependencies. Partner with Kiuwan for enhanced application intelligence and risk mitigation.

DevOps-integrated SAST and SCA
Comprehensive source-code analysis
Compliance with major security standards
Kodem Security
Free

Kodem Security View Kodem Security

Kodem Security offers the world's first dynamic software composition analysis (DSCA) platform, simplifying application security with runtime intelligence. By observing applications in their live environment, Kodem precisely identifies active components, data flows, and exploitable vulnerabilities. This approach eliminates noise, enabling teams to effectively prioritize risks, improve performance, enhance security posture, and ensure compliance with actionable, developer-friendly remediation steps.

First dynamic software composition analysis (DSCA) platform
Runtime intelligence for accurate risk assessment
Real-time visibility into application behavior and component usage
Kontra
Free

Kontra View Kontra

Kontra offers an engaging and interactive application security training experience designed specifically for developers. Moving beyond traditional methods, Kontra focuses on real-world enterprise scenarios and practical skill translation, utilizing storytelling, active engagement, and sophisticated simulations to build true application security expertise. Now part of Security Compass, Kontra provides a dynamic approach to upskilling development teams in secure coding practices.

Interactive, hands-on learning modules
Real-life enterprise security scenarios
Focus on practical skill development
Kusari
Free

Kusari View Kusari

Address burgeoning software supply chain risks with Kusari, a platform designed to provide comprehensive visibility into your software's security posture. While many tools generate SBOMs and vulnerability reports, Kusari goes further by ingesting this metadata and mapping complex relationships between software artifacts. This graph-based approach, powered by GUAC (Graph for Understanding Artifact Composition), empowers organizations to fully understand their attack surface and proactively mitigate vulnerabilities.

Comprehensive software supply chain security
Graph-based artifact relationship mapping
Ingests SBOMs, vulnerability reports, and attestations
Legit Security
Free

Legit Security View Legit Security

Legit Security fortifies your entire software factory, safeguarding pipelines, infrastructure, code, and personnel to accelerate and secure your software release lifecycle. Our comprehensive SaaS platform provides end-to-end software supply chain security for both cloud and on-premises environments. Through automated discovery, advanced analysis, and a vast library of security policies, Legit Security proactively detects vulnerabilities, quantifies risks, and guides remediation, ensuring continuous assurance against application threats.

End-to-end software supply chain security
Automated discovery and analysis
Comprehensive security policy management