Product Avatar Image

Cycode

Show rating breakdown
2 reviews
  • 1 profiles
  • 6 categories
Average star rating
4.0
Serving customers since
2019
Profile Type
Category

All Profiles

Profile Filters
Profile Type
Category
Product Avatar Image
You’re seeing this ad based on the product’s relevance to this page. Sponsored content does not receive preferential treatment in any of G2’s ratings.

OX Security

48 reviews

Product Description

OX Security helps teams focus on the 5% of issues that really matter, ensuring developers fix the most critical problems first. By consolidating all your security data into one clear view and seamlessly integrating into existing workflows, OX provides actionable insights to improve app security, reduce complexity, and resolve issues faster—all without slowing down development.

Profile Name

Star Rating

0
3
0
0
0

Cycode Reviews

Review Filters
Profile Name
Star Rating
0
3
0
0
0
J P.
JP
J P.
Senior Procurement Executive @ ElasticRun | MBA
05/09/2024
Validated Reviewer
Review source: G2 invite
Incentivized Review

Totally impressed with cycode

I've found CyCode to be an easy tool to use and integrate into our environment. I look forward to completing my work onboarding the tool into our production. we internally discussed the risk of exposing a system that actively provides easy access to secrets and shortly thereafter we noticed a new feature that allows us to limit this exposure through the use of roles.
Dipak P.
DP
Dipak P.
Data Analytics || Business Intelligence || Data Science || – Assisting enterprises by supporting data-driven decision-making for strategic growth
05/03/2023
Validated Reviewer
Review source: G2 invite
Incentivized Review

Best software for SDLC process

Easy to understand and hadel all tools for use.intrrfaceeasy to use.
Sachin P.
SP
Sachin P.
12/08/2022
Validated Reviewer
Review source: G2 invite
Incentivized Review

Cycode abilities

1) Product setup is extremely quick. 2) Cycode defaults provide immediate value by highlighting improper storage secrets in source control and data leakage visibility, i.e. Violations - Asset mapping in knowledge graphs. 3) The new workflow functionality enhances the user experience, as custom behavior is now easily implemented from a central point in the system.

About

Contact

HQ Location:
New York, US

Social

Details

Year Founded
2019