Difference between revisions of "Synopsys"
Jump to navigation
Jump to search
(3 intermediate revisions by the same user not shown) | |||
Line 1: | Line 1: | ||
− | [[wikipedia:Synopsys]] ([[1986]], 13.000 FTE) | + | [[wikipedia:Synopsys]] ([[1986]], 13.000 FTE, [[Nasdaq 100]]) |
* [[Defensics]] | * [[Defensics]] | ||
Line 6: | Line 6: | ||
* [[Black Duck]] Protex | * [[Black Duck]] Protex | ||
* [[Black Duck Software Composition Analysis]] ([[SCA]]) | * [[Black Duck Software Composition Analysis]] ([[SCA]]) | ||
− | * Black Duck OpsSight open source vulnerabilities from affecting production [[container]] deployments | + | * [[Black Duck OpsSight]] open source vulnerabilities from affecting production [[container]] deployments |
* [[Coverity]] ([[2002]]) | * [[Coverity]] ([[2002]]) | ||
Line 27: | Line 27: | ||
== See also == | == See also == | ||
* {{Synopsys}} | * {{Synopsys}} | ||
− | |||
* [[Codenomicon]] (SCA), [[Protecode]] (SCA) | * [[Codenomicon]] (SCA), [[Protecode]] (SCA) | ||
* {{AST}} | * {{AST}} |
Latest revision as of 06:35, 7 February 2024
wikipedia:Synopsys (1986, 13.000 FTE, Nasdaq 100)
- Defensics
- Polaris Platform
- Seeker
- Black Duck Protex
- Black Duck Software Composition Analysis (SCA)
- Black Duck OpsSight open source vulnerabilities from affecting production container deployments
As of 2019 there is no DAST on-premises product.
Acquisition[edit]
- November 2019 Black Duck Software
Activities[edit]
- Read Synopsys documentation: https://synopsys.atlassian.net/wiki/home
Related terms[edit]
See also[edit]
- Synopsys: Black Duck, Coverity, WhiteHat, Codenomicon
- Codenomicon (SCA), Protecode (SCA)
- Application Security Testing (SAST, DAST, IAST): Fortify WebInspect, GitLab Ultimate, flawfinder, Kubesec, Coverity, SonarQube, SCA, Checkmarx
- Software Composition Analysis (SCA): Flexera, FOSSA, GitLab Ultimate, JFrog Xray, Snyk, Sonatype, Synopsys: Black Duck, Veracode, WhiteHat Security, WhiteSource, Bill of Materials (BOM), Semgrep, Clair
- Security: Security portfolio, Security standards, Hardening, CVE, CWE, Wireless Network Hacking, vulnerability scanner, Security risk assessment, SCA, Application Security Testing, OWASP, Data leak, NIST, SANS, MITRE, Security policy, Access Control attacks, password policy, password cracking, Password manager, MFA, OTP, UTF, Firewall, DoS, Software bugs, MITM, Certified Ethical Hacker (CEH) Contents, Security+ Malware, FIPS, DLP, Network Access Control (NAC), VAPT, SIEM, EDR, SOC, pentest, PTaaS, Clickjacking, MobSF, Janus vulnerability, Back Orifice, Backdoor, CSO, CSPM, PoLP, forensic, encryption, Keylogger, Pwn2Own, CISO, Prototype pollution
Advertising: