Salt Security References Capped?

Access even more references from these marketplace competitors

  • 4.7 / 5.0 (3328)
    Premium133+ References
  • 4.7 / 5.0 (3585)
    Premium262+ References
  • 4.7 / 5.0 (2407)
    Verified160+ References

Salt Security Case Studies

  • Leading Digital Financial Services Company - Customer Case Study

  • AppsFlyer - Customer Case Study

  • currently locked
  • Reference Rating
    4.7 / 5.0
    Customer References133 total
    About

    The Sonatype journey started 10 years ago, just as the concept of “open source” software development was gaining steam. From our humble beginning as core contributors to Apache Maven, to supporting the world’s largest repository of open source components (Central), to distributing the world's most popular repository manager (Nexus), we’ve played a meaningful role in helping the world embrace the power of open innovation. Over time, we witnessed the staggering volume and variety of open source libraries that began flowing into every development environment in the world. We understood that when open source components are properly managed, they provide a tremendous energy for accelerating innovation. Conversely, when unmanaged, open source "gone wild" can lead directly to security vulnerabilities, licensing risks, enormous rework, and waste. Our vision today is simple. We are laser focused on helping organizations continuously harness all of the good that open source has to offer, without any of the risk. In order to do this, we have invested in knowing more about the quality of open source than anyone else in the world. This investment takes the form of machine learning, artificial intelligence, and human expertise, which in aggregate produces highly curated intelligence that is infused into every Nexus product. Organizations equipped with Nexus products make better decisions, innovate faster at scale, and rest comfortably knowing that their applications always consist of the highest quality open source components. Today, more than 150,000 organizations, and 10 million developers, depend on Sonatype’s Nexus platform to govern the volume, variety, and quality of open source components flowing into modern software applications. Sonatype is privately held with investments from TPG, Goldman Sachs, Accel Partners, and Hummer Winblad Venture Partners.

  • Reference Rating
    4.7 / 5.0
    Customer References262 total
    About

    Sumo Logic is the next generation log management and analytics company that leverages Big Data for real-time IT insights. Sumo Logic cloud-based service provides customers with real-time interactive analytics at unprecedented petabyte scale. The Sumo Logic service is powered by patent-pending Elastic Log Processing™ and LogReduce™ technologies, and transforms log data into actionable insights for IT operations, application management, and security and compliance teams. Unlike expensive and complex premise-based solutions, the Sumo Logic service has a low TCO, can be deployed instantly, scales elastically and requires zero maintenance. Sumo Logic is based in Silicon Valley and is backed by Greylock Partners and Sutter Hill Ventures.

  • Reference Rating
    4.7 / 5.0
    Customer References160 total
    About

    Vectra is an artificial intelligence company that develops a cybersecurity platform that automates threat hunting. Vectra's product is Cognito, a cybersecurity analyst in software that is the fastest, most efficient way to find and stop attackers inside your network. Cognito uses artificial intelligence to deliver real-time attack visibility and put attack details at your fingertips to empower immediate action. By combining advanced machine learning techniques – including deep learning and neural networks – Cognito quickly finds hidden attackers before they do damage. Cognito eliminates blind spots by analyzing all network traffic and logs from security systems, authentication systems and SaaS apps to provide high-fidelity visibility from cloud/data center workloads to user/IoT devices. Cognito works with firewalls, endpoint security, and NAC to automatically block cyberattacks.

  • currently locked
  • currently locked
  • currently locked
  • currently locked
  • currently locked
  • currently locked
  • currently locked