Legit Security offers comprehensive solutions for managing software security risks, ensuring efficient code integration, risk reduction, and policy adherence through centralized controls and robust integration with existing tools.


| Product | Mindshare (%) |
|---|---|
| Legit Security | 4.0% |
| JFrog Xray | 12.4% |
| Mend.io | 8.5% |
| Other | 75.1% |
| Type | Title | Date | |
|---|---|---|---|
| Category | Software Supply Chain Security | May 9, 2026 | Download |
| Product | Reviews, tips, and advice from real users | May 9, 2026 | Download |
| Comparison | Legit Security vs Docker | May 9, 2026 | Download |
| Comparison | Legit Security vs Qualys CyberSecurity Asset Management | May 9, 2026 | Download |
| Comparison | Legit Security vs JFrog Xray | May 9, 2026 | Download |
| Title | Rating | Mindshare | Recommending | |
|---|---|---|---|---|
| Snyk | 4.1 | N/A | 100% | 51 interviewsAdd to research |
| Veracode | 4.0 | N/A | 89% | 207 interviewsAdd to research |
Legit Security provides organizations with a powerful platform for enhancing software security. It offers a unified control panel that highlights high-risk findings and enhances security posture with risk scoring. By facilitating seamless integration with existing tools, it promotes a security shift-left approach. Centralized management helps enforce policy adherence while secret management capabilities add another layer of security. Despite some false positives in secret detection, Legit collaborates with engineering teams to ensure secure code integration.
What are the key features of Legit Security?In industries dealing with sensitive data and complex code deliveries, Legit Security is implemented to manage the entire software development lifecycle. Organizations utilize it for compliance, integrating it with other scanning tools to bolster code supply chain security and application security management. In the wake of incidents like the SolarWinds breach, the importance of securing the software delivery pipeline has been underscored, positioning Legit Security as a crucial component in protecting against similar threats.
Google, NYSE, Kraft-Hienz, Takeda Pharmaceuticals, and many other large enterprise and Fortune 500 customers. Learn more by going to: https://www.legitsecurity.com/...
| Author info | Rating | Review Summary |
|---|---|---|
| CISO at Mandiant / FireEye | 5.0 | Legit Security uniquely secures our software delivery pipeline, complementing Snyk's code-focused approach. It seamlessly integrates into workflows, enhancing team collaboration and maintaining security. Despite some secret detection issues, its pipeline focus addresses critical needs highlighted by the SolarWinds breach. |
| Head of Cyber Security at ACV Auctions Inc. | 5.0 | We use Legit Security for application security posture management, benefiting from excellent visibility and integration with tools. It centralizes our security efforts, delivers quick performance, and offsets costs despite needing improved detection of exposed keys. |
| Deputy Chief Information Security Officer at a tech vendor with 501-1,000 employees | 5.0 | I use Legit Security for our application security program, enhancing visibility, secret management, and infrastructure scans. It improves our security posture and cost-efficiency, though we seek dynamic team rerun capabilities. Previously, we used no pipeline security solutions. |
| CISO at Noname Security | 5.0 | We use Legit Security to manage our SDLC, ensuring policy enforcement and prioritizing remediation of high-risk findings. Its integration capabilities and visibility enhance security posture, despite needing other scanners for complete coverage, aiming to eventually consolidate tools. |