Sonatype Repository Firewall ensures secure software supply chains by inspecting open-source components for vulnerabilities and other threats at the point of ingress.

| Product | Mindshare (%) |
|---|---|
| Sonatype Repository Firewall | 0.9% |
| SonarQube | 16.3% |
| Checkmarx One | 9.9% |
| Other | 72.9% |
Designed for real-time protection, Sonatype Repository Firewall not only identifies but also controls potentially malicious, vulnerable, or non-compliant components before they reach development teams and CI/CD pipelines. It offers automation for quarantine, blocking workflows, and integrates with repository managers like Sonatype Nexus Repository to enforce security and compliance policies. Audit trails and reporting features enable monitoring of repository health and trends while automated remediation workflows assist security and DevOps teams in reducing manual intervention.
What are the notable features of Sonatype Repository Firewall?Sonatype Repository Firewall is widely implemented across industries that rely on rapid and secure software development. It is particularly valuable in sectors like finance, healthcare, and technology, where managing software dependencies effectively is crucial for maintaining security and compliance standards.
Sonatype Repository Firewall was previously known as Sonatype Nexus Firewall, Nexus Firewall.
EDF, Tomitribe, Crosskey, Blackboard, Travel audience
| Author info | Rating | Review Summary |
|---|---|---|
| CEO at VIVANS | 4.0 | We use Sonatype Repository Firewall to prevent malicious packages in Nexus Repository, as it supports accurate detection via its database. While lacking in container and AI support, improvements are expected in 2025. Alternatives are limited to Gather. |
| Global Treasurer at Genpact | 4.5 | No summary available |
| Senior Cyber Security Architect and Engineer at a computer software company with 10,001+ employees | 4.0 | No summary available |
| Student at a university with 51-200 employees | 4.0 | I find Sonatype Repository Firewall valuable for vulnerability and security assessments, with strong network and intrusion protection features as well as compliance rules. However, improvements are needed in file systems, and a zero test feature should be included. |