Try our new research platform with insights from 80,000+ expert users

GitGuardian Platform vs Ixia BreakingPoint comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Jul 28, 2025

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

GitGuardian Platform
Ranking in Static Application Security Testing (SAST)
4th
Average Rating
8.8
Reviews Sentiment
7.3
Number of Reviews
32
Ranking in other categories
Application Security Tools (9th), Data Loss Prevention (DLP) (6th), Threat Intelligence Platforms (TIP) (5th), Software Supply Chain Security (6th), DevSecOps (3rd), Non-Human Identity Management (NHIM) (3rd)
Ixia BreakingPoint
Ranking in Static Application Security Testing (SAST)
34th
Average Rating
8.4
Reviews Sentiment
7.3
Number of Reviews
8
Ranking in other categories
No ranking in other categories
 

Mindshare comparison

As of October 2025, in the Static Application Security Testing (SAST) category, the mindshare of GitGuardian Platform is 0.7%, up from 0.4% compared to the previous year. The mindshare of Ixia BreakingPoint is 0.4%, up from 0.2% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Static Application Security Testing (SAST) Market Share Distribution
ProductMarket Share (%)
GitGuardian Platform0.7%
Ixia BreakingPoint0.4%
Other98.9%
Static Application Security Testing (SAST)
 

Featured Reviews

Ney Roman - PeerSpot reviewer
Facilitates efficient secret management and improves development processes
Regarding the exceptions in GitGuardian Platform, we know that within the platform we have a way to accept a path or a directory from a repository, but it is not that visible at the very beginning. You have to figure out where to search for it, and once you have it, it is really good, but it is not that visible at the beginning. This should be made more exposed. The documentation could be better because it was not that comprehensively documented. When we started working with GitGuardian Platform, it was difficult to find some specific use cases, and we were not aware of that. It might have improved now, but at that time, it was not something we would recommend.
Sai Prasad - PeerSpot reviewer
Works better for testing traffic, mix profile, and enrollment scenarios than other solutions
Once, when I raised a ticket regarding a hardware or software issue, the solution's support team visited our company to discuss and find out ways to solve the problem. Sometimes, they asked us to send several photos from the back and front end to identify the issue. It was time-consuming as we were occupied with some other testing simultaneously. Instead, it would have been great if they could have visited our company and rectified the problem.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"GitGuardian public leak detection significantly enhances our organization's data security by continuously monitoring public repositories."
"The most valuable feature is the general incident reporting system."
"A high number of our exposures are remediated by developers before security needs to step in, as the self-healing playbook process engages them automatically. This results in issues being resolved within minutes, saving significant effort from the security team in tracking down or communicating with developers."
"The most valuable feature is the alerts when secrets are leaked and we can look at particular repositories to see if there are any outstanding problems. In addition, the solution's detection capabilities seem very broad. We have no concerns there."
"The entire GitGuardian solution is valuable. The product is doing its job and showing us many things. We get many false positives, but the ability to automatically display potential leaks when developers commit is valuable. The dashboards show you recent and historical commits, and we have a full scan that shows historical leaked secrets."
"Some of our teams have hundreds of repositories, so filtering by team saves a lot of time and effort."
"The stability of the GitGuardian Platform is excellent."
"GitGuardian has many features that fit our use cases. We have our internal policies on secret exposure, and our code is hosted on GitLab, so we need to prevent secrets from reaching GitLab because our customers worry that GitLab is exposed. One of the great features is the pre-receive hook. It prevents commits from being pushed to the repository by activating the hook on the remotes, which stops the developers from pushing to the remote. The secrets don't reach GitLab, and it isn't exposed."
"I like that we can test cloud applications."
"The DDoS testing module is useful and quick to use."
"The solution has many protocols and options, making it very flexible."
"There is a virtual version of the product which is scaled to 100s of virtual testing blades."
"It is a scalable solution."
"We use Ixia BreakingPoint for Layer 7 traffic generation. That's what we like."
"The most valuable feature of Ixia BreakingPoint is the ransomware and malware database for simulated attacks."
 

Cons

"GitGuardian could have more detailed information on what software engineers can do. It only provides some highly generic feedback when a secret is detected. They should have outside documentation. We send this to our software engineers, who are still doing the commits. It's the wrong way to work, but they are accustomed to doing it this way. When they go into that ticket, they see a few instructions that might be confusing. If I see a leaked secret committed two years ago, it's not enough to undo that commit. I need to go in there, change all my code to utilize GitHub secrets, and go on AWS to validate my key."
"The main disadvantage I feel they should improve upon is that apart from flagging credential issues or secrets, they could incorporate something else to make it more dynamic."
"The analytics in GitGuardian Platform have a significant opportunity to better reflect the value provided to security teams and demonstrate actual activity occurring. While the self-healing capability and proactive developer actions are important features, the analytics do not provide information around this activity."
"I would like to see improvement in some of the user interface features... When one secret is leaked in multiple files or multiple repositories, it will appear on the dashboard. But when you click on that secret, all the occurrences will appear on the page. It would be better to have one secret per occurrence, directly, so that we don't have to click to get to the list of all the occurrences."
"If a developer commits code into their repo, it generates an alert. The alert comes into Slack, but by the time someone looks at it through the Slack alerting channel, the developer might have gone and already fixed or closed the issue. There's no sort of feedback loop to come back into the notification channel to show that it's been addressed."
"The documentation could be improved because when we started working with GitGuardian, it was difficult to find specific use cases."
"One improvement that I'd like to see is a cleaner for Splunk logs. It would be nice to have a middle man for anything we send or receive from Splunk forwarders. I'd love to see it get cleaned by GitGuardian or caught to make sure we don't have any secrets getting committed to Splunk logs."
"The analytics in GitGuardian Platform have a significant opportunity to better reflect the value provided to security teams and demonstrate actual activity occurring."
"I would appreciate some preconfigured network neighborhoods, which are predefined settings for testing networks."
"The solution originally was hard to configure; I'm not sure if they've updated this to make it simpler, but if not, it's something that could be streamlined."
"The production traffic simulations are not realistic enough for some types of DDoS attacks."
"The integration could improve in Ixia BreakingPoint."
"The price could be better."
"The quality of the traffic generation could be improved with Ixia BreakingPoint, i.e. to get closer to being accurate in what a real user will do."
"They should improve UI mode packages for the users."
 

Pricing and Cost Advice

"You get what you pay for. It's one of the more expensive solutions, but it is very good, and the low false positive rate is a really appealing factor."
"I compared the solution to a couple of other solutions, and I think it is very competitively priced."
"We don't have a huge number of users, but its yearly rate was quite reasonable when compared to other per-seat solutions that we looked at... Having a free plan for a small number of users was really great. If you're a small team, I don't see why you wouldn't want to get started with it."
"The internal side is cheap per user. It is annual pricing based on the number of users."
"GitGuardian is on the pricier side."
"With GitGuardian, we didn't need any middlemen."
"It's not cheap, but it's not crazy expensive either."
"It's competitively priced compared to others. Overall, the secret detection sector is expensive, but we are very happy with the value we get."
"or us, the pricing is somewhere around $12,000 a year. I'm unsure as to what new licenses now cost."
"We have a one year subscription license for $25,000 US Dollars."
"There is no differentiation in licenses for Breaking Point. For one license, you will get all the features. There is no complexity in that."
"The price is high. We pay for the license monthly."
"The price of the solution is expensive."
"The solution is expensive."
report
Use our free recommendation engine to learn which Static Application Security Testing (SAST) solutions are best for your needs.
869,566 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Government
19%
Computer Software Company
18%
Financial Services Firm
8%
Comms Service Provider
7%
Manufacturing Company
15%
Computer Software Company
12%
Financial Services Firm
11%
Comms Service Provider
7%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business10
Midsize Enterprise9
Large Enterprise13
By reviewers
Company SizeCount
Small Business7
Large Enterprise3
 

Questions from the Community

What do you like most about GitGuardian Internal Monitoring ?
It's also worth mentioning that GitGuardian is unique because they have a free tier that we've been using for the first twelve months. It provides full functionality for smaller teams. We're a smal...
What is your experience regarding pricing and costs for GitGuardian Internal Monitoring ?
It's competitively priced compared to others. Overall, the secret detection sector is expensive, but we are happy with the value we get.
What needs improvement with GitGuardian Internal Monitoring ?
GitGuardian Platform does what it is designed to do, but it still generates many false positives. We utilize the automated playbooks from GitGuardian Platform, and we are enhancing them. We will pr...
Ask a question
Earn 20 points
 

Also Known As

GitGuardian Internal Monitoring, GitGuardian Public Monitoring
No data available
 

Overview

 

Sample Customers

Widely adopted by developer communities, GitGuardian is used by over 600 thousand developers and leading companies, including Snowflake, Orange, Iress, Mirantis, Maven Wave, ING, BASF, and Bouygues Telecom.
Corsa Technology
Find out what your peers are saying about GitGuardian Platform vs. Ixia BreakingPoint and other solutions. Updated: September 2025.
869,566 professionals have used our research since 2012.