Backslash SecurityBackslash
|
EmboldEmbold Technologies
|
|||||
Related Products
|
||||||
About
Ensure the security of your code and open sources. Identify externally reachable data flows and vulnerabilities for effective risk mitigation. By identifying genuine attack paths to reachable code, we enable you to fix only the code and open-source software that is truly in use and reachable. Avoid unnecessary overloading of development teams with irrelevant vulnerabilities. Prioritize risk mitigation efforts more effectively, ensuring a focused and efficient security approach. Reduce the noise CSPM, CNAPP, and other runtime tools create by removing unreachable packages before running your applications. Meticulously analyze your software components and dependencies, identifying any known vulnerabilities or outdated libraries that could pose a threat. Backslash analyzes both direct and transitive packages, ensuring 100% reachability coverage. It outperforms existing tools that solely focus on direct packages, accounting for only 11% of packages.
|
About
Get a deeper understanding of your software with Embold's profound analysis and intuitive visuals. Visually comprehend the size and quality of every component and fully understand the state of your software at a glance. Understand issues on a component level with rich annotations and see where they are located in your code. View and navigate through all ingoing and outgoing dependencies of your software components and learn how they influence each other. Quickly understand how to refactor and split complex components by using our innovative partitioning algorithms. The EMBOLD SCORE, calculated from four dimensions, tells you which components have the biggest impact on the overall quality and need to be solved first. Analyze your code’s structural design with the help of our unique set of anti-patterns on a class, functional, and method level. Embold utilizes several metrics ranging from cyclomatic complexity to coupling between objects to measure the quality of software systems.
|
|||||
Platforms Supported
Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook
|
Platforms Supported
Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook
|
|||||
Audience
Teams wanting a solution to manage and ensure their infrastructure security
|
Audience
Developers interested in a next level static code analysis tool
|
|||||
Support
Phone Support
24/7 Live Support
Online
|
Support
Phone Support
24/7 Live Support
Online
|
|||||
API
Offers API
|
API
Offers API
|
|||||
Screenshots and Videos |
Screenshots and Videos |
|||||
Pricing
No information available.
Free Version
Free Trial
|
Pricing
No information available.
Free Version
Free Trial
|
|||||
Reviews/
|
Reviews/
|
|||||
Training
Documentation
Webinars
Live Online
In Person
|
Training
Documentation
Webinars
Live Online
In Person
|
|||||
Company InformationBackslash
Founded: 2022
Israel
www.backslash.security/
|
Company InformationEmbold Technologies
Founded: 2009
Germany
embold.io
|
|||||
Alternatives |
Alternatives |
|||||
|
|
|
|||||
|
|
||||||
Categories |
Categories |
|||||
Application Security Features
Analytics / Reporting
Open Source Component Monitoring
Source Code Analysis
Third-Party Tools Integration
Training Resources
Vulnerability Detection
Vulnerability Remediation
Cloud Security Features
Antivirus
Application Security
Behavioral Analytics
Encryption
Endpoint Management
Incident Management
Intrusion Detection System
Threat Intelligence
Two-Factor Authentication
Vulnerability Management
Static Application Security Testing (SAST) Features
Application Security
Dashboard
Debugging
Deployment Management
IDE
Multi-Language Scanning
Real-Time Analytics
Source Code Scanning
Vulnerability Scanning
|
||||||
Integrations
Bitbucket
GitHub
Jira
.NET
Amazon Web Services (AWS)
Android Studio
C#
C++
GitLab
Go
|
Integrations
Bitbucket
GitHub
Jira
.NET
Amazon Web Services (AWS)
Android Studio
C#
C++
GitLab
Go
|
|||||
|
|
|