Skip to main content
TrustRadius
ZeroDay-AIAST

ZeroDay-AIAST

Overview

What is ZeroDay-AIAST?

AIAST – An advanced interactive application security tool identifying vulnerabilities in both self-developed code and open-source dependencies. Integrated into CI/CD, it can be applied in both application development phase and application deployment phase.

Read more
Recent Reviews
TrustRadius

Leaving a review helps other professionals like you evaluate DevSecOps Tools

Be the first one in your network to review ZeroDay-AIAST, and make your voice heard!

Return to navigation

Pricing

View all pricing
N/A
Unavailable

What is ZeroDay-AIAST?

AIAST – An advanced interactive application security tool identifying vulnerabilities in both self-developed code and open-source dependencies. Integrated into CI/CD, it can be applied in both application development phase and application deployment phase.

Entry-level set up fee?

  • No setup fee

Offerings

  • Free Trial
  • Free/Freemium Version
  • Premium Consulting/Integration Services

Would you like us to let the vendor know that you want pricing?

Alternatives Pricing

What is Quixxi Security?

Quixxi Security provides codeless app protection against hackers looking to clone, tamper, inject malicious code, or exploit a mobile app. A simple drag & drop feature applies a sophisticated set of security layers, for quick & easy mobile app protection.Quixxi is also a monitoring tool with…

What is F5 Distributed Cloud Bot Defense?

F5 Distributed Cloud Bot Defense (formerly Shape Defense, acquired January 2020) provides security to protect a website from bots, fake users, and unauthorized transactions, preventing large scale fraud and eroded user experiences. Companies get visibility, detection and mitigation outcomes to…

Return to navigation

Product Details

What is ZeroDay-AIAST?

AIAST – An advanced interactive application security tool identifying vulnerabilities in both self-developed code and open-source dependencies. Integrated into CI/CD, it can be applied in both application development phase and application deployment phase.

ZeroDay-AIAST Features

  • Supported: Comprehensive Detection Rules
  • Supported: Sensitive Data Tracking
  • Supported: Open Source Check

ZeroDay-AIAST Screenshots

Screenshot of loginScreenshot of HomeScreenshot of application quick startScreenshot of application check result and export

ZeroDay-AIAST Video

ZeroDay-AIAST Integrations

ZeroDay-AIAST Technical Details

Deployment TypesSoftware as a Service (SaaS), Cloud, or Web-Based
Operating SystemsUnspecified
Mobile ApplicationNo

ZeroDay-AIAST Downloadables

Return to navigation

Comparisons

View all alternatives
Return to navigation

Reviews

Sorry, no reviews are available for this product yet

Return to navigation