Cycode vs Legit Security comparison

 

Comparison Buyer's Guide

Executive Summary
 

Categories and Ranking

Cycode
Ranking in Software Supply Chain Security
9th
Ranking in Application Security Posture Management (ASPM)
4th
Average Rating
0.0
Number of Reviews
0
Ranking in other categories
Static Application Security Testing (SAST) (33rd), Software Composition Analysis (SCA) (19th)
Legit Security
Ranking in Software Supply Chain Security
7th
Ranking in Application Security Posture Management (ASPM)
3rd
Average Rating
10.0
Number of Reviews
4
Ranking in other categories
No ranking in other categories
 

Mindshare comparison

As of June 2024, in the Software Supply Chain Security category, the mindshare of Cycode is 20.5%, down from 20.8% compared to the previous year. The mindshare of Legit Security is 9.1%, down from 18.1% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Software Supply Chain Security
Unique Categories:
Static Application Security Testing (SAST)
0.3%
Software Composition Analysis (SCA)
1.2%
 

Featured Reviews

Karl Mattson - PeerSpot reviewer
Oct 24, 2023
Great visibility, excellent support, and integrates well with other tools
We're a start-up. We only had about 40 or 50 developers at the time we started with Legit - and essentially, we didn't have a well-defined SDLC. We performed scanning and penetration testing, however, we didn't really have a process from start to finish to ensure the integrity of the software and to track the remediation of findings and those kinds of tasks. Legit was a green field for us in terms of selecting a technology and then to some degree designing our policy and process around it. The most important feature is the surfacing out of the noise of other scanning technologies. We’re getting out of the noisy platforms and focusing our developers on the remediation of the actual most high-risk findings. It's really focused on our efficiency in those areas. It also serves as identification of those individual instances where a developer made a mistake, where they might include hard-coded credentials or what appears to be production data used in a test script. Those are the breadcrumbs to a breach. Legit is paying for itself time and time again by finding those, and allowing us to remediate those quickly. We have it connected to over 100+ repos. The visibility is excellent. It is the primary and the only visibility that we need into the development. The reports at the end of the pipeline are great. It's complete in that sense. It's the only tool that I've seen that can put all the pieces together in terms of visibility, policy enforcement, and vulnerability identification under one pane of glass. It’s important for our organization to have this unified application security control. We are a software company, so this is the primary crown jewel of security control. Our primary risk factor to consider is the security of the software. That is the centerpiece of our attention. The unified application security control plans and risk-scoring comparisons of teams and pipelines are useful. It gives us a certain direction and, in the macro sense, I value it. Personally, I don't put a lot of weight behind the scores except for their directionality. We get a sense over time of direction, and that's very useful. For example, when a 67 goes up to a 90, I know that's a good thing, and we're making progress, or vice versa. We integrate Legit with other application tools. It's integrated with a handful of tools. We use it with our single sign-on through Okta, and then also with our code repositories, CI/CD pipelines, and ticketing systems. The incidents all go to our SEIM. Legit's ability to integrate with AppSec implications and tools somewhere else is easy. Once we've established those API connections, there is little maintenance. It’s helped our organization shift the security left. It just makes shift left executable, enabling us to shift the security controls left as far as possible is absolutely necessary. Legit helped our organization reduce the risk of attacks. Particularly, when we see things like a developer mistake or major coding error. Those are the breachable moments that Legit picks up on, and we can remediate very quickly. Legit has had a positive effect on our overall security posture. We have a very healthy posture, which importantly starts just by having completeness of visibility, knowing exactly what we have - and knowing exactly what our vulnerabilities are, and having trust in the process. On any given day there are always going to be vulnerabilities. To have that procedural integrity of the software development process, that's huge.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pricing and Cost Advice

Information not available
"The pricing is reasonable."
report
Use our free recommendation engine to learn which Software Supply Chain Security solutions are best for your needs.
787,779 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Manufacturing Company
15%
Financial Services Firm
10%
Computer Software Company
9%
Insurance Company
6%
Computer Software Company
22%
Financial Services Firm
11%
Pharma/Biotech Company
11%
University
10%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
No data available
No data available
 

Questions from the Community

Ask a question
Earn 20 points
What do you like most about Legit Security?
The true value proposition of Legit lies not in its features but in its ability to support our product security program's focus on creating guardrails instead of toll gates.
What needs improvement with Legit Security?
Legit Security's secret detection works. However, there are some limitations to its effectiveness. One issue is that engineering teams don't always embed secrets in the same way, making it difficul...
 

Comparisons

 

Learn More

Video not available
Video not available
 

Overview

 

Sample Customers

Information Not Available
Google, NYSE, Kraft-Hienz, Takeda Pharmaceuticals, and many other large enterprise and Fortune 500 customers. Learn more by going to: https://www.legitsecurity.com/...
Find out what your peers are saying about Mend.io, Sonatype, JFrog and others in Software Supply Chain Security. Updated: June 2024.
787,779 professionals have used our research since 2012.