No more typing reviews! Try our Samantha, our new voice AI agent.
Legit Security Logo

Legit Security Reviews

5.0 out of 5

What is Legit Security?

Featured Legit Security reviews

Legit Security mindshare

As of May 2026, the mindshare of Legit Security in the Software Supply Chain Security category stands at 4.0%, down from 4.8% compared to the previous year, according to calculations based on PeerSpot user engagement data.
Software Supply Chain Security Mindshare Distribution
ProductMindshare (%)
Legit Security4.0%
JFrog Xray12.4%
Mend.io8.5%
Other75.1%
Software Supply Chain Security

PeerResearch reports based on Legit Security reviews

TypeTitleDate
CategorySoftware Supply Chain SecurityMay 9, 2026Download
ProductReviews, tips, and advice from real usersMay 9, 2026Download
ComparisonLegit Security vs DockerMay 9, 2026Download
ComparisonLegit Security vs Qualys CyberSecurity Asset ManagementMay 9, 2026Download
ComparisonLegit Security vs JFrog XrayMay 9, 2026Download
Suggested products
TitleRatingMindshareRecommending
Snyk4.1N/A100%51 interviewsAdd to research
Veracode4.0N/A89%207 interviewsAdd to research
 
 
Key learnings from peers

Valuable Features

Room for Improvement

Pricing

Popular Use Cases

Deployment

Scalability

Stability

Top industries

By visitors reading reviews
Financial Services Firm
14%
University
13%
Retailer
7%
Government
7%
Educational Organization
7%
Computer Software Company
7%
Insurance Company
6%
Construction Company
5%
Energy/Utilities Company
5%
Real Estate/Law Firm
4%
Comms Service Provider
2%
Consumer Goods Company
2%
Healthcare Company
2%
Legal Firm
2%
Performing Arts
2%
Recreational Facilities/Services Company
2%
Religious Institution
2%
Wholesaler/Distributor
2%
Renewables & Environment Company
1%
Manufacturing Company
1%
Logistics Company
1%
Hospitality Company
1%
Recruiting/Hr Firm
1%
Wellness & Fitness Company
1%

Compare Legit Security with alternative products

Learn more about Legit Security

Legit Security customers

Related questions

 
Legit Security Reviews Summary
Author infoRatingReview Summary
CISO at Mandiant / FireEye5.0Legit Security uniquely secures our software delivery pipeline, complementing Snyk's code-focused approach. It seamlessly integrates into workflows, enhancing team collaboration and maintaining security. Despite some secret detection issues, its pipeline focus addresses critical needs highlighted by the SolarWinds breach.
Head of Cyber Security at ACV Auctions Inc.5.0We use Legit Security for application security posture management, benefiting from excellent visibility and integration with tools. It centralizes our security efforts, delivers quick performance, and offsets costs despite needing improved detection of exposed keys.
Deputy Chief Information Security Officer at a tech vendor with 501-1,000 employees5.0I use Legit Security for our application security program, enhancing visibility, secret management, and infrastructure scans. It improves our security posture and cost-efficiency, though we seek dynamic team rerun capabilities. Previously, we used no pipeline security solutions.
CISO at Noname Security5.0We use Legit Security to manage our SDLC, ensuring policy enforcement and prioritizing remediation of high-risk findings. Its integration capabilities and visibility enhance security posture, despite needing other scanners for complete coverage, aiming to eventually consolidate tools.