Ratings and Reviews 0 Ratings

Total
ease
features
design
support

This software has no reviews. Be the first to write a review.

Write a Review

Ratings and Reviews 0 Ratings

Total
ease
features
design
support

This software has no reviews. Be the first to write a review.

Write a Review

Alternatives to Consider

  • Source Defense Reviews & Ratings
    7 Ratings
    Company Website
  • Wiz Reviews & Ratings
    1,059 Ratings
    Company Website
  • Satori Reviews & Ratings
    89 Ratings
    Company Website
  • HERE Enterprise Browser Reviews & Ratings
    2 Ratings
    Company Website
  • Reflectiz Reviews & Ratings
    14 Ratings
    Company Website
  • Chainguard Reviews & Ratings
    42 Ratings
    Company Website
  • Aikido Security Reviews & Ratings
    106 Ratings
    Company Website
  • Sage Supply Chain Intelligence Reviews & Ratings
    70 Ratings
    Company Website
  • SOCRadar Extended Threat Intelligence Reviews & Ratings
    67 Ratings
    Company Website
  • c/side Reviews & Ratings
    23 Ratings
    Company Website

What is Noma?

Shifting from development to production, as well as from conventional data engineering to artificial intelligence, necessitates the safeguarding of various environments, pipelines, tools, and open-source components that form the backbone of your data and AI supply chain. It is crucial to consistently identify, avert, and correct security and compliance weaknesses in AI prior to their deployment in production. Furthermore, real-time monitoring of AI applications facilitates the identification and counteraction of adversarial AI attacks while ensuring that specific application guardrails are maintained. Noma seamlessly integrates throughout your data and AI supply chain and applications, delivering a comprehensive overview of all data pipelines, notebooks, MLOps tools, open-source AI components, and both first- and third-party models alongside their datasets, which in turn allows for the automatic generation of a detailed AI/ML bill of materials (BOM). Additionally, Noma continuously detects and provides actionable insights for security challenges, including misconfigurations, AI-related vulnerabilities, and the improper use of non-compliant training data across your data and AI supply chain. This proactive strategy empowers organizations to significantly improve their AI security framework, ensuring that potential risks are mitigated before they have a chance to affect production. In the end, implementing such strategies not only strengthens security but also enhances overall trust in AI systems, fostering a safer environment for innovation.

What is Legit Security?

Legit Security safeguards software supply chains against attacks by automatically identifying and securing development pipelines, addressing vulnerabilities and leaks, as well as enhancing the security practices of individuals involved. This enables companies to maintain safety while rapidly deploying software. The platform offers automated identification of security vulnerabilities, threat remediation, and compliance assurance for each software release. It features a thorough and continuously updated visual inventory of the Software Development Life Cycle (SDLC). Additionally, it uncovers weak points in SDLC infrastructure and systems, providing centralized insights into the configuration, coverage, and placement of security tools and scanners. Potentially insecure build actions are intercepted before they can introduce vulnerabilities later in the process. Furthermore, it ensures early detection and prevention of sensitive data leaks and secrets prior to their inclusion in the SDLC. The system also validates the secure utilization of plugins and images that might jeopardize the integrity of a release. To bolster security measures and promote best practices, tracking of security trends across various product lines and teams is included. With Legit Security Scores, users receive a concise snapshot of their security standing. Moreover, integration with alert and ticketing systems is facilitated, allowing for flexibility in workflow management.

Media

Media

Integrations Supported

Bitbucket
GitHub
GitLab
AI21 Studio
Amazon Web Services (AWS)
Avalor
Chainguard
Claude
Go
Jira
Le Chat
Meta AI
Ministral 3B
Mistral 7B
Mistral AI
Mixtral 8x22B
OpenAI
Pixtral Large
Terraform
Visual Studio Code

Integrations Supported

Bitbucket
GitHub
GitLab
AI21 Studio
Amazon Web Services (AWS)
Avalor
Chainguard
Claude
Go
Jira
Le Chat
Meta AI
Ministral 3B
Mistral 7B
Mistral AI
Mixtral 8x22B
OpenAI
Pixtral Large
Terraform
Visual Studio Code

API Availability

Has API

API Availability

Has API

Pricing Information

Pricing not provided.
Free Trial Offered?
Free Version

Pricing Information

Pricing not provided.
Free Trial Offered?
Free Version

Supported Platforms

SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux

Supported Platforms

SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux

Customer Service / Support

Standard Support
24 Hour Support
Web-Based Support

Customer Service / Support

Standard Support
24 Hour Support
Web-Based Support

Training Options

Documentation Hub
Webinars
Online Training
On-Site Training

Training Options

Documentation Hub
Webinars
Online Training
On-Site Training

Company Facts

Organization Name

Noma

Company Location

Israel

Company Website

noma.security/

Company Facts

Organization Name

Legit Security

Date Founded

2020

Company Location

United States

Company Website

www.legitsecurity.com

Categories and Features

Data Security

Alerts / Notifications
Antivirus/Malware Detection
At-Risk Analysis
Audits
Data Center Security
Data Classification
Data Discovery
Data Loss Prevention
Data Masking
Data-Centric Security
Database Security
Encryption
Identity / Access Management
Logging / Reporting
Mobile Data Security
Monitor Abnormalities
Policy Management
Secure Data Transport
Sensitive Data Compliance

Categories and Features

Application Security

Analytics / Reporting
Open Source Component Monitoring
Source Code Analysis
Third-Party Tools Integration
Training Resources
Vulnerability Detection
Vulnerability Remediation

Popular Alternatives

Popular Alternatives

Xygeni Reviews & Ratings

Xygeni

Xygeni Security