What is Dependency Track SaaS?

YourSky.blue offers a managed cloud solution for Software Composition Analysis (SCA) through its Dependency Track SaaS, which is built upon the well-known open-source Dependency-Track platform developed by OWASP®. This service enables users to effectively oversee the entire lifecycle of software components using advanced dashboards and customizable alerts. It stays current with the latest security updates and routinely checks previously submitted Software Bill of Materials (SBOMs) for newly identified vulnerabilities, outdated versions, and risky licenses.

The Dependency Track SaaS from YourSky.blue stands out as an indispensable tool for the streamlined management of software assets. Furthermore, it upholds top-tier security protocols, including multi-factor authentication, adjustable application permissions, portfolio segmentation, and Single Sign-On capabilities, ensuring seamless integration with any enterprise identity management system. With these features, users can confidently safeguard their software supply chain while maintaining operational efficiency.

Pricing

Price Starts At:
USD 10.08 per user per month
Price Overview:
Monthly and yearly subscription available.

Integrations

Offers API?:
Yes, Dependency Track SaaS provides an API

Screenshots and Video

Assessment of impact for the company, with audit trail of the changes.

Assessment of impact for the company, with audit trail of the changes.

Company Facts

Company Name:
YourSky.blue
Date Founded:
2022
Company Location:
Switzerland
Company Website:
yoursky.blue/
Edit This Page

Product Details

Deployment
SaaS
Training Options
Documentation Hub
Support
Standard Support
Web-Based Support

Product Details

Target Company Sizes
1-10
11-50
51-200
201-500
501-1000
Target Organization Types
Mid Size Business
Small Business
Enterprise
Freelance
Nonprofit
Government
Startup
Supported Languages
English

Dependency Track SaaS Categories and Features

Vulnerability Scanners

Asset Discovery
Black Box Scanning
Compliance Monitoring
Continuous Monitoring
Defect Tracking
Interactive Scanning
Logging and Reporting
Network Mapping
Perimeter Scanning
Risk Analysis
Threat Intelligence
Web Inspection