Introducing G2.ai, the future of software buying.Try now

Compare Aikido Security and JFrog

Save
    Log in to your account
    to save comparisons,
    products and more.
At a Glance
Aikido Security
Aikido Security
Star Rating
(104)4.6 out of 5
Market Segments
Small-Business (76.5% of reviews)
Information
Pros & Cons
Entry-Level Pricing
Free
Free Trial is available
Browse all 5 pricing plans
JFrog
JFrog
Star Rating
(105)4.2 out of 5
Market Segments
Enterprise (51.0% of reviews)
Information
Pros & Cons
Entry-Level Pricing
Starting at $150.00 Per Month
Free Trial is available
Browse all 3 pricing plans
AI Generated Summary
AI-generated. Powered by real user reviews.
  • G2 reviewers report that Aikido Security excels in user experience, with many praising its intuitive dashboard and straightforward suggestions for improvement. Users find it significantly easier to identify security issues in their codebase compared to JFrog, which has received mixed feedback regarding its usability.
  • Users say that Aikido Security's low-noise feedback is a game changer for day-to-day development, allowing engineers to focus on critical issues without being overwhelmed by alerts. In contrast, JFrog's feedback can sometimes be less targeted, making it harder for teams to prioritize their responses.
  • Reviewers mention that Aikido Security's implementation process is notably smooth, with many users highlighting its ease of setup. JFrog, while scalable for larger teams, has faced some challenges in configuration that can complicate the onboarding experience for new users.
  • According to verified reviews, Aikido Security's support quality stands out, with users appreciating the responsive assistance they receive. JFrog's support, while generally good, has not garnered the same level of praise, indicating a potential area for improvement.
  • G2 reviewers highlight that Aikido Security is particularly well-suited for small businesses, as evidenced by its strong market presence in that segment. JFrog, on the other hand, is more favored by enterprise users, which may limit its appeal for smaller teams looking for a more tailored solution.
  • Users report that Aikido Security's focus on practical, actionable insights during code reviews feels like having a senior engineer guiding them, which enhances their development process. JFrog, while effective for certain tasks, may not provide the same level of personalized guidance, leading to a less engaging user experience.
Pricing
Entry-Level Pricing
Aikido Security
Free (forever)
Free
Browse all 5 pricing plans
JFrog
PRO
Starting at $150.00
Per Month
Browse all 3 pricing plans
Free Trial
Aikido Security
Free Trial is available
JFrog
Free Trial is available
Ratings
Meets Requirements
9.0
101
8.5
77
Ease of Use
9.4
102
8.2
78
Ease of Setup
9.5
94
8.2
46
Ease of Admin
9.4
63
8.5
39
Quality of Support
9.4
84
8.4
67
Has the product been a good partner in doing business?
9.4
57
8.5
38
Product Direction (% positive)
9.4
101
8.5
71
Features by Category
Application Release OrchestrationHide 11 FeaturesShow 11 Features
Not enough data
7.6
9
Administration
Not enough data
7.1
8
Not enough data
6.9
8
Not enough data
7.7
8
Functionality
Not enough data
7.5
8
Not enough data
7.5
8
Not enough data
8.1
9
Not enough data
8.5
9
Not enough data
Feature Not Available
Processes
Not enough data
8.5
9
Not enough data
7.4
9
Not enough data
7.3
8
Not enough data
Not enough data
Administration
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Analysis
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Testing
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Static Application Security Testing (SAST)Hide 14 FeaturesShow 14 Features
8.3
57
Not enough data
Administration
8.6
56
Not enough data
Feature Not Available
Not enough data
Analysis
8.7
54
Not enough data
8.9
54
Not enough data
9.0
54
Not enough data
8.9
53
Not enough data
Testing
7.3
42
Not enough data
7.0
41
Not enough data
8.1
43
Not enough data
8.4
44
Not enough data
8.2
42
Not enough data
Feature Not Available
Not enough data
7.6
46
Not enough data
Agentic AI - Static Application Security Testing (SAST)
8.3
24
Not enough data
Dynamic Application Security Testing (DAST)Hide 13 FeaturesShow 13 Features
8.5
22
Not enough data
Administration
Feature Not Available
Not enough data
Feature Not Available
Not enough data
Analysis
9.2
21
Not enough data
9.1
21
Not enough data
9.4
21
Not enough data
9.4
21
Not enough data
9.5
20
Not enough data
Testing
6.8
17
Not enough data
Feature Not Available
Not enough data
8.5
18
Not enough data
8.0
18
Not enough data
Feature Not Available
Not enough data
6.5
18
Not enough data
8.4
37
Not enough data
Administration
8.8
36
Not enough data
8.1
34
Not enough data
9.0
34
Not enough data
8.3
32
Not enough data
Monitoring
8.6
35
Not enough data
Feature Not Available
Not enough data
Feature Not Available
Not enough data
Protection
Feature Not Available
Not enough data
8.4
33
Not enough data
Feature Not Available
Not enough data
7.6
31
Not enough data
Cloud Infrastructure AutomationHide 11 FeaturesShow 11 Features
Not enough data
8.7
5
Administration
Not enough data
8.7
5
Not enough data
8.7
5
Not enough data
9.0
5
Not enough data
9.3
5
Automation
Not enough data
Not enough data
Not enough data
Feature Not Available
Not enough data
8.7
5
Not enough data
Feature Not Available
IT Management
Not enough data
Not enough data
Not enough data
7.7
5
Not enough data
Not enough data
Not enough data
Not enough data
Deployment
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Deployment
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Management
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Operations
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Management
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Generative AI
Not enough data
Not enough data
Not enough data
Not enough data
8.0
62
Not enough data
Performance
8.7
60
Not enough data
Feature Not Available
Not enough data
7.7
58
Not enough data
8.9
59
Not enough data
Network
7.9
57
Not enough data
7.9
54
Not enough data
7.9
55
Not enough data
Application
7.2
52
Not enough data
8.8
56
Not enough data
7.9
50
Not enough data
Agentic AI - Vulnerability Scanner
7.8
24
Not enough data
7.6
24
Not enough data
Not enough data
8.1
10
Functionality
Not enough data
8.0
9
Not enough data
8.1
9
Not enough data
8.7
10
Management
Not enough data
8.3
10
Not enough data
7.4
9
Not enough data
8.2
10
Agentic AI - Continuous Delivery
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Repository ManagementHide 8 FeaturesShow 8 Features
Not enough data
6.3
8
Functionality
Not enough data
6.7
7
Not enough data
6.5
8
Not enough data
6.0
7
Not enough data
5.8
6
Management
Not enough data
7.9
8
Not enough data
6.9
7
Not enough data
4.0
5
Not enough data
6.2
7
Software Composition AnalysisHide 6 FeaturesShow 6 Features
9.0
22
Not enough data
Functionality - Software Composition Analysis
9.0
21
Not enough data
9.0
21
Not enough data
9.0
21
Not enough data
Effectiveness - Software Composition Analysis
9.0
21
Not enough data
9.0
21
Not enough data
9.1
21
Not enough data
Not enough data
7.1
10
Management
Not enough data
6.5
10
Not enough data
7.5
10
Not enough data
7.3
10
Functionality
Not enough data
6.1
9
Not enough data
7.0
10
Not enough data
6.0
10
Processes
Not enough data
8.3
9
Not enough data
7.0
10
Not enough data
8.2
10
Continuous IntegrationHide 11 FeaturesShow 11 Features
Not enough data
7.7
10
Functionality
Not enough data
8.2
10
Not enough data
8.2
10
Not enough data
7.8
9
Management
Not enough data
7.7
10
Not enough data
7.8
10
Not enough data
6.7
9
Agentic AI - Continuous Integration
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
8.8
13
Not enough data
Documentation
9.6
9
Not enough data
9.6
9
Not enough data
8.3
9
Not enough data
Security
7.9
12
Not enough data
8.9
11
Not enough data
8.3
10
Not enough data
Cloud Security Posture Management (CSPM)Hide 11 FeaturesShow 11 Features
8.2
23
Not enough data
Configuration
6.8
19
Not enough data
7.8
20
Not enough data
7.7
19
Not enough data
Feature Not Available
Not enough data
8.3
20
Not enough data
Visibility
8.6
23
Not enough data
7.9
20
Not enough data
Vulnerability Management
Feature Not Available
Not enough data
8.8
21
Not enough data
8.8
21
Not enough data
9.1
22
Not enough data
Software Supply Chain Security ToolsHide 7 FeaturesShow 7 Features
8.3
15
Not enough data
Security
Feature Not Available
Not enough data
9.0
14
Not enough data
Feature Not Available
Not enough data
8.9
15
Not enough data
Tracking
7.9
12
Not enough data
7.3
11
Not enough data
8.5
13
Not enough data
Application Security Posture Management (ASPM)Hide 11 FeaturesShow 11 Features
8.4
20
Not enough data
Risk management - Application Security Posture Management (ASPM)
9.0
20
Not enough data
8.5
19
Not enough data
8.9
19
Not enough data
8.3
18
Not enough data
Integration and efficiency - Application Security Posture Management (ASPM)
9.1
18
Not enough data
8.9
18
Not enough data
Reporting and Analytics - Application Security Posture Management (ASPM)
8.3
19
Not enough data
8.5
19
Not enough data
7.7
19
Not enough data
Agentic AI - Application Security Posture Management (ASPM)
7.5
6
Not enough data
7.5
6
Not enough data
Software Bill of Materials (SBOM)Hide 6 FeaturesShow 6 Features
Not enough data
Not enough data
Functionality - Software Bill of Materials (SBOM)
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Management - Software Bill of Materials (SBOM)
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Cloud-Native Application Protection Platform (CNAPP)Hide 11 FeaturesShow 11 Features
Not enough data
Not enough data
Security - Cloud-Native Application Protection Platform (CNAPP)
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Artificial Intelligence - Cloud-Native Application Protection Platform (CNAPP)
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Cloud Configuration Management - Cloud-Native Application Protection Platform (CNAPP)
Not enough data
Not enough data
Not enough data
Not enough data
Agentic AI - Cloud-Native Application Protection Platform (CNAPP)
Not enough data
Not enough data
Not enough data
Not enough data
AI AppSec AssistantsHide 6 FeaturesShow 6 Features
Not enough data
Not enough data
Performance - AI AppSec Assistants
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Integration - AI AppSec Assistants
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Cloud Visibility
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Security
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Identity
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Reviews
Reviewers' Company Size
Aikido Security
Aikido Security
Small-Business(50 or fewer emp.)
76.5%
Mid-Market(51-1000 emp.)
21.6%
Enterprise(> 1000 emp.)
2.0%
JFrog
JFrog
Small-Business(50 or fewer emp.)
16.0%
Mid-Market(51-1000 emp.)
33.0%
Enterprise(> 1000 emp.)
51.0%
Reviewers' Industry
Aikido Security
Aikido Security
Computer Software
37.3%
Information Technology and Services
17.6%
Hospital & Health Care
6.9%
Computer & Network Security
5.9%
Retail
3.9%
Other
28.4%
JFrog
JFrog
Information Technology and Services
32.0%
Computer Software
14.0%
Financial Services
8.0%
Computer & Network Security
6.0%
Internet
3.0%
Other
37.0%
Alternatives
Aikido Security
Aikido Security Alternatives
Snyk
Snyk
Add Snyk
SonarQube
SonarQube
Add SonarQube
GitLab
GitLab
Add GitLab
Wiz
Wiz
Add Wiz
JFrog
JFrog Alternatives
GitLab
GitLab
Add GitLab
GitHub
GitHub
Add GitHub
Jenkins
Jenkins
Add Jenkins
Red Hat Ansible Automation Platform
Red Hat Ansible Automation Platform
Add Red Hat Ansible Automation Platform
Discussions
Aikido Security
Aikido Security Discussions
Monty the Mongoose crying
Aikido Security has no discussions with answers
JFrog
JFrog Discussions
Monty the Mongoose crying
JFrog has no discussions with answers
Aikido Security
Aikido Security
Optimized for quick response
JFrog
JFrog
Optimized for quick response