Save to My Lists

SOOS Features

What are the features of SOOS?

Analysis

  • Reporting and Analytics
  • Issue Tracking
  • Vulnerability Scan

Testing

  • Detection Rate

Functionality - Software Composition Analysis

  • Language Support
  • Integration
  • Transparency

Effectiveness - Software Composition Analysis

  • Remediation Suggestions
  • Continuous Monitoring
  • Thorough Detection

Filter for Features

Administration

API / Integrations

Application Programming Interface Specification for how the application communicates with other software. APIs typically enable integration of data, logic, objects, etc. with other software applications.

Not enough data

Extensibility

Provides the ability to extend the platform to include additional features and functionalities

Not enough data

Risk Scoring

Provides risk scoring for suspicious activity, vulnerabilities, and other threats.

Not enough data

Secrets Management

Provides tools for managing authentication credentials such as keys and passwords.

Not enough data

Security Auditing

Analyzes data associated with security configurations and infrastructure to provide vulnerability insights and best practices.

Not enough data

Configuration Management

Monitors configuration rule sets and policy enforcement measures and document changes to maintain compliance.

Not enough data

Analysis

Reporting and Analytics

Based on 12 SOOS reviews. Tools to visualize and analyze data.
76%
(Based on 12 reviews)

Issue Tracking

Based on 11 SOOS reviews. Track issues as vulnerabilities are discovered. Documents activity throughout the resolution process.
86%
(Based on 11 reviews)

Static Code Analysis

Examines application source code for security flaws without executing it.

Not enough data

Vulnerability Scan

Based on 13 SOOS reviews. Scans applications and networks for known vulnerabilities, holes and exploits.
90%
(Based on 13 reviews)

Code Analysis

Scans application source code for security flaws without executing it.

Not enough data

Testing

Test Automation

Runs pre-scripted security tests without requiring manual work.

Not enough data

Black-Box Scanning

Scans functional applications externally for vulnerabilities like SQL injection or XSS.

Not enough data

Detection Rate

Based on 11 SOOS reviews. The rate at which scans accurately detect all vulnerabilities associated with the target.
89%
(Based on 11 reviews)

False Positives

The rate at which scans falsely indicate detection of a vulnerability when no vulnerabilitiy legitimately exists.

Not enough data

Monitoring

Continuous Image Assurance

Provides image verification features to establish container approval requirements and continuously monitor for policy violations to identify containers with known vulnerabilities, malware, and other threats.

Not enough data

Behavior Monitoring

Constantly monitors acivity related to user behavior and compares activity to benchmarked patterns and fraud indicators.

Not enough data

Observability

Generate insights across IT systems utilizing event metrics, logging, traces, and metadata.

Not enough data

Protection

Dynamic Image Scanning

Scans application and image source code for security flaws without executing it in a live environment

Not enough data

Runtime Protection

Monitors container activities and detects threats across containers, networks, and cloud service providers.

Not enough data

Workload Protection

Protects compute resources across a networks and cloud service providers. Serves as Firewall and prompts additional authentication for suspicious users.

Not enough data

Network Segmentation

Allows administrative control over network components, mapping, and segmentation.

Not enough data

Functionality - Software Composition Analysis

Language Support

Supports a useful and wide variety of programming languages. This feature was mentioned in 10 SOOS reviews.
95%
(Based on 10 reviews)

Integration

Integrates seamlessly with the build environment and development tools like repositories, package managers, etc. 17 reviewers of SOOS have provided feedback on this feature.
95%
(Based on 17 reviews)

Transparency

Based on 14 SOOS reviews. Grants comprehensive user-friendly insight into all open source components.
94%
(Based on 14 reviews)

Effectiveness - Software Composition Analysis

Remediation Suggestions

Provides relevant and helpful suggestions for vulnerability remediation upon detection. This feature was mentioned in 14 SOOS reviews.
90%
(Based on 14 reviews)

Continuous Monitoring

Based on 15 SOOS reviews. Monitors open source components proactively and continuously.
93%
(Based on 15 reviews)

Thorough Detection

As reported in 15 SOOS reviews. Comprehensively identifies all open source version updates, vulnerabilities, and compliance issues.
91%
(Based on 15 reviews)

API Management

API Discovery

Detects new and undocumented assets as they enter a network and add them to asset inventory.

Not enough data

API Monitoring

Detects anomalies in functionality, user accessibility, traffic flows, and tampering.

Not enough data

Reporting

Provides results of the simulation and reveals potential security gaps or vulnerabilitites.

Not enough data

Change Management

Tools to track and implement required security policy changes.

Not enough data

Security Testing

Compliance Monitoring

Monitors data quality and send alerts based on violations or misuse.

Not enough data

API Verification

Allows users to set customizable API verification settings to improve security requirements.

Not enough data

API Testing

Runs pre-scripted security tests without requiring manual work.

Not enough data

Security Management

Security and Policy Enforcement

Abilities to set standards for network, application, and API security risk management.

Not enough data

Anomoly Detection

Constantly monitors activity related to user behavior and compares activity to benchmarked patterns.

Not enough data

Bot Detection

Monitors for and rids systems of bots suspected of committing fraud or abusing applications.

Not enough data

Security

Tampering

Ability to detect any attempts to tamper with the software during the development or deployment stages

Not enough data

Malicious Code

Scans for malicious code

Not enough data

Verification

Verifies authenticity of third-party components

Not enough data

Security Risks

Tracks potential security risks

Not enough data

Tracking

Bill of Materials

Offers a software bill of materials to keep track of components

Not enough data

Audit Trails

Tracks audit trails

Not enough data

Monitoring

Provides automated and continuous monitoring of various components

Not enough data

Functionality - Software Bill of Materials (SBOM)

Format Support

Supports relevant SBOM formats such as cycloneDX and SPDX.

Not enough data

Annotations

Provides robust, industry standard SBOM annotation functionality.

Not enough data

Attestation

Generates thorough evidence of compliance including component relationships, licenses, and more.

Not enough data

Management - Software Bill of Materials (SBOM)

Monitoring

Automatically and continuously monitors components to alert users of noncompliant elements.

Not enough data

Dashboards

Presents a transparent and easy to use dashboard for performing SBOM management.

Not enough data

User Provisioning

Includes controls for role-based access permissions.

Not enough data