Company Website

Ratings and Reviews 0 Ratings

Total
ease
features
design
support

This software has no reviews. Be the first to write a review.

Write a Review

What is Wiz?

Wiz introduces a novel strategy for cloud security by identifying critical risks and potential entry points across various multi-cloud settings. It enables the discovery of all lateral movement threats, including private keys that can access both production and development areas. Vulnerabilities and unpatched software can be scanned within your workloads for proactive security measures. Additionally, it provides a thorough inventory of all services and software operating within your cloud ecosystems, detailing their versions and packages. The platform allows you to cross-check all keys associated with your workloads against their permissions in the cloud environment. Through an exhaustive evaluation of your cloud network, even those obscured by multiple hops, you can identify which resources are exposed to the internet. Furthermore, it enables you to benchmark your configurations against industry standards and best practices for cloud infrastructure, Kubernetes, and virtual machine operating systems, ensuring a comprehensive security posture. Ultimately, this thorough analysis makes it easier to maintain robust security and compliance across all your cloud deployments.

What is DigitSec S4?

S4 facilitates the implementation of Salesforce DevSecOps into the CI/CD pipeline in under an hour. This tool equips developers with the capability to spot and rectify vulnerabilities prior to their deployment in production, helping to prevent potential data breaches. By securing Salesforce during the development phase, S4 minimizes risks and accelerates deployment times. Our innovative SaaS Security scannerâ„¢, S4 for Salesforceâ„¢, conducts automatic evaluations of Salesforce's security posture. It employs a comprehensive continuous app security testing (CAST) platform, meticulously crafted to uncover Salesforce-specific vulnerabilities. This includes features such as Interactive Runtime Testing, Software Composition Analysis, and Cloud Security Configuration Review. A key component of S4 is our static application security testing engine (SAST), which streamlines the scanning and analysis of custom source code across Salesforce Orgs, including Apex, VisualForce, and Lightning Web Components, along with associated JavaScript files. Overall, S4 ensures that businesses can develop and deploy Salesforce applications securely and efficiently.

Media

Media

Integrations Supported

Jira
Amazon Web Services (AWS)
Azure Marketplace
BDOW!
Balance Theory
Chainguard
Jira Work Management
Microsoft Azure
Okta
Opus Security
OverSOC
RegScale
ScaleOps
Seemplicity
ServiceNow
Slack
Stream Security
Sumo Logic
Tamnoon

Integrations Supported

Jira
Amazon Web Services (AWS)
Azure Marketplace
BDOW!
Balance Theory
Chainguard
Jira Work Management
Microsoft Azure
Okta
Opus Security
OverSOC
RegScale
ScaleOps
Seemplicity
ServiceNow
Slack
Stream Security
Sumo Logic
Tamnoon

API Availability

Has API

API Availability

Has API

Pricing Information

Request Pricing
Free Trial Offered?
Free Version

Pricing Information

Pricing not provided.
Free Trial Offered?
Free Version

Supported Platforms

SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux

Supported Platforms

SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux

Customer Service / Support

Standard Support
24 Hour Support
Web-Based Support

Customer Service / Support

Standard Support
24 Hour Support
Web-Based Support

Training Options

Documentation Hub
Webinars
Online Training
On-Site Training

Training Options

Documentation Hub
Webinars
Online Training
On-Site Training

Company Facts

Organization Name

Wiz

Date Founded

2020

Company Location

United States

Company Website

www.wiz.io

Company Facts

Organization Name

DigitSec

Date Founded

2017

Company Location

United States

Company Website

www.digitsec.com

Categories and Features

Cloud Security

Antivirus
Application Security
Behavioral Analytics
Encryption
Endpoint Management
Incident Management
Intrusion Detection System
Threat Intelligence
Two-Factor Authentication
Vulnerability Management

Cloud Workload Protection

Anomaly Detection
Asset Discovery
Cloud Gap Analysis
Cloud Registry
Data Loss Prevention (DLP)
Data Security
Governance
Logging & Reporting
Machine Learning
Security Audit
Workload Diversity

Container Security

Access Roles / Permissions
Application Performance Tracking
Centralized Policy Management
Container Stack Scanning
Image Vulnerability Detection
Reporting
Testing
View Container Metadata

Cybersecurity

AI / Machine Learning
Behavioral Analytics
Endpoint Management
IOC Verification
Incident Management
Tokenization
Vulnerability Scanning
Whitelisting / Blacklisting

Identity Management

Access Certification
Compliance Management
Multifactor Authentication
Password Management
Privileged Account Management
Self-Service Access Request
Single Sign On
User Activity Monitoring
User Provisioning

IT Security

Anti Spam
Anti Virus
Email Attachment Protection
Event Tracking
IP Protection
Internet Usage Monitoring
Intrusion Detection System
Spyware Removal
Two-Factor Authentication
Vulnerability Scanning
Web Threat Management
Web Traffic Reporting

Patch Management

Alerts/Notifications
Automatic Approval
Automatic Patch Deployment
Automatic Scans
Compliance Management
Custom Patches
Dashboard
Network Wide Management
Patch Prioritization
Patch Testing
Remote Access/Control
Vulnerability Scanning

Vulnerability Management

Asset Discovery
Asset Tagging
Network Scanning
Patch Management
Policy Management
Prioritization
Risk Management
Vulnerability Assessment
Web Scanning

Vulnerability Scanners

Asset Discovery
Black Box Scanning
Compliance Monitoring
Continuous Monitoring
Defect Tracking
Interactive Scanning
Logging and Reporting
Network Mapping
Perimeter Scanning
Risk Analysis
Threat Intelligence
Web Inspection

Categories and Features

Vulnerability Scanners

Asset Discovery
Black Box Scanning
Compliance Monitoring
Continuous Monitoring
Defect Tracking
Interactive Scanning
Logging and Reporting
Network Mapping
Perimeter Scanning
Risk Analysis
Threat Intelligence
Web Inspection

Popular Alternatives

Popular Alternatives

Sonrai Security Reviews & Ratings

Sonrai Security

Sonraí Security
PT Application Inspector Reviews & Ratings

PT Application Inspector

Positive Technologies
ThreatStryker Reviews & Ratings

ThreatStryker

Deepfence