List of JFrog Integrations

This is a list of platforms and tools that integrate with JFrog. This list is updated as of May 2026.

  • 1
    depthfirst Reviews & Ratings

    depthfirst

    depthfirst

    Uncover hidden vulnerabilities with intelligent, comprehensive security solutions.
    Depthfirst is a sophisticated application security platform developed to assist organizations in the detection, prioritization, and resolution of software vulnerabilities by comprehensively analyzing their code, infrastructure, and business logic as an interconnected system. At the heart of Depthfirst lies its "General Security Intelligence," which performs in-depth evaluations of entire repositories and operational environments, uncovering intricate, real-world vulnerabilities that traditional scanners often miss. By examining full attack paths, permissions, and data flows, it effectively assesses the exploitability of various issues, thereby reducing false positive rates and allowing teams to focus on significant threats. Furthermore, Depthfirst operates across multiple layers of the technology stack, encompassing source code, dependencies, secrets, containers, and live applications, thereby ensuring robust security during both development and production stages. This comprehensive method not only boosts the effectiveness of security measures but also simplifies the remediation process for development teams, enabling a more efficient response to vulnerabilities. Ultimately, Depthfirst's approach fosters a culture of proactive security within organizations, ensuring that they remain resilient against evolving threats.
  • 2
    CycloneDX Reviews & Ratings

    CycloneDX

    CycloneDX

    Boost application security with comprehensive Software Bill of Materials.
    CycloneDX serves as a highly effective standard for Software Bill of Materials (SBOM), tailored to bolster application security and facilitate the assessment of supply chain elements. The stewardship and continuous enhancement of this standard are managed by the CycloneDX Core working group, which originates from the OWASP community. A detailed and accurate inventory of both first-party and third-party components is essential for recognizing possible vulnerabilities. Ideally, BOMs should include all direct and transitive components alongside their interdependencies. By adopting CycloneDX, organizations can quickly meet critical compliance demands while progressively advancing towards the integration of more sophisticated applications in the future. Additionally, CycloneDX adheres to all SBOM requirements outlined in the OWASP Software Component Verification Standard (SCVS), thus ensuring thorough compliance and security oversight. This feature positions it as an indispensable resource for organizations striving to improve the integrity of their software supply chain, ultimately fostering a more secure development environment. Embracing CycloneDX can lead to greater transparency and trustworthiness within the software ecosystem.