Show rating breakdown
Save to My Lists
Claimed
Claimed

Top Rated Cycode Alternatives

3 Cycode Reviews

4.0 out of 5
The next elements are filters and will change the displayed results once they are selected.
Search reviews
Hide FiltersMore Filters
The next elements are filters and will change the displayed results once they are selected.
The next elements are filters and will change the displayed results once they are selected.
3 Cycode Reviews
4.0 out of 5
3 Cycode Reviews
4.0 out of 5

Cycode Pros and Cons

How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Cons
G2 reviews are authentic and verified.
J P.
JP
Business Owner
Mid-Market(51-1000 emp.)
More Options
Validated Reviewer
Review source: G2 invite
Incentivized Review
(Original )Information
What do you like best about Cycode?

I've found CyCode to be an easy tool to use and integrate into our environment. I look forward to completing my work onboarding the tool into our production. we internally discussed the risk of exposing a system that actively provides easy access to secrets and shortly thereafter we noticed a new feature that allows us to limit this exposure through the use of roles. Review collected by and hosted on G2.com.

What do you dislike about Cycode?

lacks integrations with many AWS services to make it easy to track application vulnerabilities in terms of the systems hosting our applications rather than just the code & artifacts. Review collected by and hosted on G2.com.

Sachin P.
SP
Devops Consultant
Enterprise(> 1000 emp.)
More Options
Validated Reviewer
Review source: G2 invite
Incentivized Review
What do you like best about Cycode?

1) Product setup is extremely quick.

2) Cycode defaults provide immediate value by highlighting improper storage secrets in source control and data leakage visibility, i.e. Violations - Asset mapping in knowledge graphs.

3) The new workflow functionality enhances the user experience, as custom behavior is now easily implemented from a central point in the system. Review collected by and hosted on G2.com.

What do you dislike about Cycode?

1) The violations which need manual re-scan have to be improved.

2) Display the proper error message when the queries for an extensive knowledge graph are in progress. Review collected by and hosted on G2.com.

Dipak P.
DP
Data Analyst
Mid-Market(51-1000 emp.)
More Options
Validated Reviewer
Review source: G2 invite
Incentivized Review
(Original )Information
Business partner of the seller or seller's competitor, not included in G2 scores.
What do you like best about Cycode?

Easy to understand and hadel all tools for use.intrrfaceeasy to use. Review collected by and hosted on G2.com.

What do you dislike about Cycode?

Littel bit complicated to extensively work on that. Review collected by and hosted on G2.com.

There are not enough reviews of Cycode for G2 to provide buying insight. Below are some alternatives with more reviews:

1
GitLab Logo
GitLab
4.5
(823)
An open source web interface and source control platform based on Git.
2
GitHub Logo
GitHub
4.7
(2,195)
GitHub is the best place to share code with friends, co-workers, classmates, and complete strangers. Over two million people use GitHub to build amazing things together.
3
Wiz Logo
Wiz
4.7
(698)
Wiz is a CNAPP that consolidates CSPM, KSPM, CWPP, vulnerability management, IaC scanning, CIEM, DSPM, and container and Kubernetes security into a single platform.
4
Lacework Logo
Lacework
4.3
(381)
Lacework offers the data-driven security platform for the cloud, and is the leading cloud-native application protection platform (CNAPP) solution. The Polygraph Data Platform is purpose-built with a single detection engine, user interface, and API framework. With the Platform, your team only needs to learn one system for all of your cloud and workload protections, leading to tool consolidation, greater organizational efficiencies, and cost savings. Only Lacework can collect, analyze, and accurately correlate data — without requiring manually written rules — across your organizations' AWS, Azure, Google Cloud, and Kubernetes environments, and narrow it down to the handful of security events that matter. By taking a data-driven approach to security, the more data you put in, the smarter the Platform gets. This automated intelligence drives better efficacy and a higher return on your investment. Security and DevOps teams around the world trust Lacework to secure cloud-native applications across the full lifecycle from code to cloud.
5
Microsoft Defender for Cloud Logo
Microsoft Defender for Cloud
4.4
(301)
Azure Security Center provides security management and threat protection across your hybrid cloud workloads. It allows you to prevent, detect, and respond to security threats with increased visibility.
6
GitGuardian Logo
GitGuardian
4.8
(211)
Level up your code security with GitGuardian: Scan your Git Repos in Real-Time for Secrets ✔️ Free Trial ✔️ Used by 200k+ developers ✔️ Enterprise Software
7
Orca Security Logo
Orca Security
4.6
(218)
Get workload-level visibility into AWS, Azure, and GCP without the operational costs of agents. You could buy three tools instead… but why? Orca replaces legacy vulnerability assessment tools, CSPM, and CWPP. Deploys in minutes, not months.
8
AlgoSec Logo
AlgoSec
4.5
(189)
AlgoSec is a business-driven security management solution.
9
Hybrid Cloud Security Logo
Hybrid Cloud Security
4.5
(175)
Hybrid Cloud Security solution, powered by XGen security, delivers a blend of cross-generational threat defense techniques that have been optimized to protect physical, virtual, and cloud workloads.
10
Qualys VMDR Logo
Qualys VMDR
4.4
(166)
Discover, assess, prioritize, and patch critical vulnerabilities in real time and across your global hybrid-IT landscape — all from a single solution.
Show More