Try our new research platform with insights from 80,000+ expert users
Legit Security Logo

Legit Security Reviews

5.0 out of 5

What is Legit Security?

Featured Legit Security reviews

Legit Security mindshare

As of September 2025, the mindshare of Legit Security in the Software Supply Chain Security category stands at 4.7%, up from 4.3% compared to the previous year, according to calculations based on PeerSpot user engagement data.
Software Supply Chain Security Market Share Distribution
ProductMarket Share (%)
Legit Security4.7%
JFrog Xray16.4%
Mend.io12.7%
Other66.2%
Software Supply Chain Security

PeerResearch reports based on Legit Security reviews

TypeTitleDate
CategorySoftware Supply Chain SecuritySep 3, 2025Download
ProductReviews, tips, and advice from real usersSep 3, 2025Download
ComparisonLegit Security vs Mend.ioSep 3, 2025Download
ComparisonLegit Security vs JFrog XraySep 3, 2025Download
ComparisonLegit Security vs Sonatype LifecycleSep 3, 2025Download
Suggested products
TitleRatingMindshareRecommending
Snyk4.0N/A100%48 interviewsAdd to research
GitGuardian Platform4.42.3%100%32 interviewsAdd to research
 
 
Key learnings from peers

Valuable Features

Room for Improvement

Pricing

Popular Use Cases

Deployment

Scalability

Stability

Top industries

By visitors reading reviews
Computer Software Company
18%
Financial Services Firm
13%
University
12%
Pharma/Biotech Company
8%
Educational Organization
7%
Healthcare Company
7%
Insurance Company
5%
Government
4%
Energy/Utilities Company
3%
Performing Arts
3%
Retailer
3%
Recreational Facilities/Services Company
3%
Hospitality Company
3%
Legal Firm
3%
Construction Company
3%
Real Estate/Law Firm
2%
Consumer Goods Company
1%
Comms Service Provider
1%
Wellness & Fitness Company
1%
Logistics Company
1%
Manufacturing Company
1%
Recruiting/Hr Firm
1%
Renewables & Environment Company
1%
 
Legit Security Reviews Summary
Author infoRatingReview Summary
CISO at Mandiant / FireEye5.0Legit Security uniquely secures our software delivery pipeline, complementing Snyk's code-focused approach. It seamlessly integrates into workflows, enhancing team collaboration and maintaining security. Despite some secret detection issues, its pipeline focus addresses critical needs highlighted by the SolarWinds breach.
Head of Cyber Security at ACV Auctions Inc.5.0We use Legit Security for application security posture management, benefiting from excellent visibility and integration with tools. It centralizes our security efforts, delivers quick performance, and offsets costs despite needing improved detection of exposed keys.
CISO at Noname Security5.0We use Legit Security to manage our SDLC, ensuring policy enforcement and prioritizing remediation of high-risk findings. Its integration capabilities and visibility enhance security posture, despite needing other scanners for complete coverage, aiming to eventually consolidate tools.
Deputy Chief Information Security Officer at a tech vendor with 501-1,000 employees5.0I use Legit Security for our application security program, enhancing visibility, secret management, and infrastructure scans. It improves our security posture and cost-efficiency, though we seek dynamic team rerun capabilities. Previously, we used no pipeline security solutions.