We use Xygeni to harden our CI/CD pipelines in Azure DevOps. Our software is mainly in Python, but we also use Javascript and Csharp. Xygeni detects issues on our open-source third-party dependencies and shows them in an easy-to-use dashboard. We also use Xygeni to analyze our code repositories. The scanner analyzes the repository configuration and the code within and detects potential security issues. Finally, it is important for us to secure the DevOps configuration and our deployment pipelines in search of potential vulnerabilities.
I use Xygeni to perform SAST and SCA analysis, and to gain better understanding of how my deployment pipelines are configured. Xygeni helps me understand what I am deploying and the level of integration with production. It also helps me understand how my vulnerabilities are exposed to the internet. Xygeni provides a filtering mechanism that helps me prevent vulnerabilities and keep focus on which vulnerabilities are actually exploitable.
I most often use Xygeni for monitoring our applications. When monitoring our applications, I use Xygeni when I see changes in code flow and codebase, and I compare the old codebase with the current codebase in terms of changes.
Business Development Manager at a security firm with 11-50 employees
Real User
Top 20
Jan 20, 2026
Xygeni is used to monitor and watch the status of applications with regard to information security. For example, there is a project where a previous version of a codebase needs to be compared with the current version, and when libraries are updated, there can be threats and malware. Xygeni can provide information about supply chain security and vulnerabilities with standards of information security. There are some applications, such as basic applications, and within Xygeni's user interface, the status of information security of these applications can be viewed.
Application Security Tools are essential for organizations looking to protect their software applications from vulnerabilities that could lead to breaches or exploits. These tools provide automated solutions for identifying, managing, and mitigating risks associated with application vulnerabilities.These tools have gained recognition for their ability to integrate seamlessly into development pipelines, providing security teams with real-time data on potential risks. They support multiple...
We use Xygeni to harden our CI/CD pipelines in Azure DevOps. Our software is mainly in Python, but we also use Javascript and Csharp. Xygeni detects issues on our open-source third-party dependencies and shows them in an easy-to-use dashboard. We also use Xygeni to analyze our code repositories. The scanner analyzes the repository configuration and the code within and detects potential security issues. Finally, it is important for us to secure the DevOps configuration and our deployment pipelines in search of potential vulnerabilities.
I use Xygeni to perform SAST and SCA analysis, and to gain better understanding of how my deployment pipelines are configured. Xygeni helps me understand what I am deploying and the level of integration with production. It also helps me understand how my vulnerabilities are exposed to the internet. Xygeni provides a filtering mechanism that helps me prevent vulnerabilities and keep focus on which vulnerabilities are actually exploitable.
I most often use Xygeni for monitoring our applications. When monitoring our applications, I use Xygeni when I see changes in code flow and codebase, and I compare the old codebase with the current codebase in terms of changes.
Xygeni is used to monitor and watch the status of applications with regard to information security. For example, there is a project where a previous version of a codebase needs to be compared with the current version, and when libraries are updated, there can be threats and malware. Xygeni can provide information about supply chain security and vulnerabilities with standards of information security. There are some applications, such as basic applications, and within Xygeni's user interface, the status of information security of these applications can be viewed.