• HOME
  • CATEGORIES

    • CATEGORIES

    • Browse All Categories
  • FOR VENDORS

    • FOR VENDORS

    • Log In to Vendor Portal
    • Get Started
  • REVIEWS

    • REVIEWS

    • Write a Review
    • Product Reviews
    • Vendor Directory
    • Product Comparisons
  • GARTNER PEER COMMUNITY™
  • GARTNER.COM
  • Community GuidelinesListing GuidelinesBrowse VendorsRules of EngagementFAQPrivacyTerms of Service
    ©2026 Gartner, Inc. and/or its affiliates.
    All rights reserved.
  • Categories

    • No categories available

      Browse All Categories

      Select a category to view markets

  • For Vendors

    • Log In to Vendor Portal 

    • Get Started 

  • Write a Review

Join / Sign In

Gartner Peer Insights content consists of the opinions of individual end users based on their own experiences, and should not be construed as statements of fact, nor do they represent the views of Gartner or its affiliates. Gartner does not endorse any vendor, product or service depicted in this content nor makes any warranties, expressed or implied, with respect to this content, about its accuracy or completeness, including any warranties of merchantability or fitness for a particular purpose.

This site is protected by hCaptcha and its Privacy Policy and Terms of Use apply.


Software reviews and ratings for EMMS, BI, CRM, MDM, analytics, security and other platforms - Peer Insights by Gartner
Community GuidelinesListing GuidelinesBrowse VendorsRules of EngagementFAQsPrivacyTerms of Use

©2026 Gartner, Inc. and/or its affiliates.

All rights reserved.

Highest Rated By Your Peers
For Willingness to Recommend
Logo of Wiz CNAPP
Wiz CNAPP
Logo of GitLab
GitLab
Logo of Invicti
Invicti
For 50M-1B USD Companies
Logo of ArmorCode Platform
ArmorCode Platform
Logo of Falcon ASPM
Falcon ASPM
Logo of Phoenix Security Platform
Phoenix Security Platform
For North America
Logo of Wiz CNAPP
Wiz CNAPP
Logo of Legit Security
Legit Security
Logo of Falcon ASPM
Falcon ASPM
Integration & Deployment
Logo of Aikido Security
Aikido Security
Logo of Legit Security
Legit Security
Logo of Wiz CNAPP
Wiz CNAPP

Gartner Client Insights

Gartner Peer Insights 'Voice of the Customer': Application Security Posture Management (ASPM) Tools

Top Trending Products

Falcon ASPMConviso Platform

Popular Product Comparisons

ArmorCode Platform vs OX Security Platform

What is Application Security Posture Management (ASPM) Tools?

Application security posture management (ASPM) tools continuously manage application risk through collection, analysis and prioritization of security issues from across the software life cycle. They ingest data from multiple sources, maintain an inventory of all software within an organization, correlate and analyze findings for easier interpretation, triage and remediation. They enable the enforcement of security policies and facilitate the remediation of security issues while offering a comprehensive view of risk across applications.

How Categories and Markets Are Defined
All Categories
/
Application Security Posture Management (ASPM) Tools

Application Security Posture Management (ASPM) Tools Reviews and Ratings

Best Application Security Posture Management (ASPM) Tools Reviews 2026 | Gartner Peer Insights

Product Listings

Filter by

Products 1 - 20 of 42
Sort by
Logo of ArmorCode Platform

ArmorCode Platform

By ArmorCode

4.6
(84 Ratings)
customers choice 2026

ArmorCode Platform is a software that delivers centralized application security posture management by integrating multiple security tools, processes, and workflows. The software aggregates vulnerabilities and findings from different sources to provide unified visibility and prioritization of risks. It enables organizations to automate remediation, track security tasks, and coordinate communication between development and security teams. The platform facilitates policy enforcement and governance, supporting scalable management of security issues across cloud and on-premises environments. ArmorCode Platform helps organizations streamline operations, improve compliance, and reduce manual effort associated with securing software development lifecycle.

Show More Details
Logo of Falcon ASPM

Falcon ASPM

By CrowdStrike

4.6
(71 Ratings)
customers choice 2026

Falcon ASPM is a software developed by CrowdStrike for application security posture management. The software provides visibility into application vulnerabilities and misconfigurations across the software development lifecycle. Falcon ASPM integrates with development and deployment tools to identify risks in source code, dependencies, and cloud environments. The software offers automated detection and prioritized remediation guidance to help teams address security issues before they reach production. It supports risk reduction by providing context-based analysis and recommendations for improvement. Falcon ASPM is designed to help organizations manage and reduce their application security risks through continuous monitoring and integration with existing workflows.

Show More Details
Logo of Cycode Platform

Cycode Platform

By Cycode

4.5
(56 Ratings)

Cycode’s AI-Native Application Security Platform unites security and development teams with actionable context from code to runtime to identify, prioritize, and fix the software risks that matter.

Powered by proprietary scanners, third-party integrations, and the Context Intelligence Graph (CIG), Cycode delivers unified, correlated insight across the Software Factory. Its unique ability to sense, reason, and act with context in the AI-Era comes from its foundational convergence of AST, ASPM, and Software Supply Chain Security—purpose-built to secure both AI- and human-generated code.

Show More Details
Logo of Phoenix Security Platform

Phoenix Security Platform

By Phoenix Security

4.6
(53 Ratings)

Phoenix Security Platform is a software designed to facilitate security posture management by integrating vulnerability data from multiple sources and providing automated risk assessment. It enables organizations to prioritize remediation workflows based on business impact and contextual risk analysis. The software supports security operations with capabilities such as real-time reporting, continuous monitoring, and analytics to identify and manage vulnerabilities across various environments, including cloud and on-premises systems. Phoenix Security Platform also offers functionalities for compliance tracking and workflow automation, aiming to address issues related to vulnerability overload, resource allocation, and regulatory alignment within enterprise security programs.

Show More Details
Logo of Wiz CNAPP

Wiz CNAPP

By Wiz

4.6
(46 Ratings)

Wiz CNAPP is a software designed to provide cloud security by helping organizations identify and manage risks across cloud environments. This software offers visibility into cloud infrastructure, enabling detection of vulnerabilities, misconfigurations, and exposures in real time. It integrates with major cloud platforms, offering context on workloads, identities, and network configurations. Wiz CNAPP enables prioritization and remediation of security issues by presenting actionable insights into risks and compliance status. The software supports security operations by correlating various cloud resources, supporting governance and risk reduction for enterprises seeking to secure complex cloud architectures.

Show More Details
Logo of GitLab

GitLab

By GitLab

4.4
(36 Ratings)
customers choice 2026

GitLab is a comprehensive AI-powered DevSecOps platform for software innovation. The GitLab DevSecOps platform includes all capabilities required to deliver secure software faster with a unified data store, including source code management, continuous integration and delivery, agile project and portfolio planning, GitOps, software supply chain security, compliance management, and value stream management. GitLab empowers customers to improve operational efficiency, reduce security and compliance risk, build high-performing teams, and accelerate cloud transformation to maximize the overall return on software development.

Show More Details
Logo of Ivanti Neurons for ASPM

Ivanti Neurons for ASPM

By Ivanti

4.4
(34 Ratings)

Ivanti Neurons for Application Security Posture Management (ASPM) delivers full-stack visibility of application risk exposure through the entire software development lifecycle. Unify all application scan data – SAST, DAST, OSS/SCA and container – to locate misconfigurations, vulnerabilities and weaknesses and prioritize remediation. Move from detection to remediation in minutes with a contextualized, risk-based view of your organization’s cybersecurity posture and automated playbooks for remediation. Cultivate communication and cooperation from across the organization with access to dashboards designed for personnel from the DevSecOps to the C-suite.

Show More Details
Logo of Invicti

Invicti

By Invicti

4.7
(30 Ratings)

Invicti is a software designed to identify and manage security vulnerabilities in web applications. It performs automated scanning to detect potential security risks such as SQL injection, cross-site scripting, and other vulnerabilities. The software offers features including automatic scanning of web assets, vulnerability verification, and integration with issue tracking and development workflows. Invicti assists organizations in maintaining secure code by enabling continuous security assessments and streamlining remediation processes. The software addresses the business need for proactive identification and resolution of web security issues, helping organizations reduce the risk of security breaches and supporting compliance with industry standards and policies.

Show More Details
Logo of Conviso Platform

Conviso Platform

By Conviso

4.5
(28 Ratings)

The Conviso Platform is an Application Security Posture Management (ASPM) solution that centralizes the management of risks, vulnerabilities, assets, requirements, and security policies in a single environment.

It’s ideal for companies looking to structure, scale, and monitor their AppSec programs with visibility, automation, and risk-based prioritization.

The platform supports the entire development lifecycle — from secure planning and threat modeling to technical validation and remediation tracking — fostering seamless collaboration between development and security teams.

Show More Details
Logo of Legit Security

Legit Security

By Legit

4.8
(25 Ratings)

Legit Security is a software platform designed to secure software supply chains by providing automated security and compliance checks throughout the development lifecycle. The software integrates with existing DevOps environments and continuously monitors pipelines, source code repositories, and infrastructure-as-code configurations to identify vulnerabilities, misconfigurations, and policy violations. It enables organizations to detect risks related to third-party components, credentials exposure, and code changes, helping teams address threats before they reach production. Legit Security automates remediation workflows and delivers detailed insights to help organizations maintain compliance with regulatory standards and internal governance policies, aiming to reduce risk and improve the overall security posture of software development processes.

Show More Details
Logo of Aikido Security

Aikido Security

By Aikido Security

4.7
(20 Ratings)

Aikido is a developer-centric security platform that gives developers and security teams an instant overview of all code-to-cloud security issues and guides teams to fix vulnerabilities fast. Aikido supports security teams execute by aggressively reducing false-positives, automatic triage and risk bundling, and translating Common Vulnerabilities and Exposures (CVEs) into easy step-by-step explanations to resolve.

Described as an "all-in-one" application security platform, Aikido's covers the entire Software Development Lifecycle (SDLC), including: static application security testing (SAST), dynamic application security testing (DAST), infrastructure-as-code (IaC), container scanning, secrets detection, open source lisence scanning, cloud posture management (CSPM), runtime protection, and more.

Show More Details
Logo of OX Security Platform

OX Security Platform

By OX Security

4.7
(18 Ratings)

OX centralizes Application Security from AI coding to runtime, tracing every risk back to its source: your code. As AI transforms development, security teams face fragmented tooling and blind spots—OX delivers complete product security built for prevention, unifying security across your entire code journey from AI code generation through cloud runtime.

Show More Details
Logo of Apiiro

Apiiro

By Apiiro

4.6
(17 Ratings)

Deep Code Analysis: Apiiro extrapolates application components, going beyond vulnerability detection to identify changes introducing risk. Its patented technology forms the foundation for the Risk GraphTM, connecting risks to identify toxic combinations and surface invaluable context.

Code to Runtime Modeling: Connecting to runtime via API, Apiiro uses modeling technology to generate context and prioritize findings based on deployment, internet exposure, or WAF protection. This technology matches runtime APIs, containers, and security alerts to their source code and maps the entire exposure path of risks.

Risk-Based, Developer-Centric Policy Engine: Apiiro offers out-of-the-box and custom risk-based policies and workflows to define, automate, and validate security controls. With extensive developer tool integrations, the policy engine enables continuous, proactive guardrails to prevent business-critical risks from reaching the cloud.

Show More Details
Logo of Vulcan Cyber

Vulcan Cyber

By Tenable

4.5
(12 Ratings)

Vulcan Cyber is a software that focuses on vulnerability remediation orchestration for cybersecurity teams. The software integrates with existing vulnerability management, IT service management, and patching tools to prioritize vulnerabilities based on risk and business context. Vulcan Cyber automates the remediation workflow by assigning tasks, tracking progress, and assisting with patch management and configuration updates. It enables organizations to reduce security risk by streamlining vulnerability response and providing visibility into remediation processes across environments. The software helps address the business problem of managing and resolving vulnerabilities efficiently while maintaining compliance and minimizing exposure to potential threats.

Show More Details
Logo of Faraday

Faraday

By Faraday

4.4
(10 Ratings)

Faraday is an all-in-one collaborative pentest and vulnerability management platform designed to help security teams prioritize, analyze, and correlate findings for triage and remediation

It orchestrates +150 tools and vulnerability scanners, enabling you to scan your domain and have a comprehensive view of risks across all user assets. It offers a picture of your security posture. Its single dashboard allows centralized vulnerability management and custom report generation.

Show More Details
Logo of BoostSecurity

BoostSecurity

By boostsecurity.io

4.5
(9 Ratings)

BoostSecurity is a software designed to enhance software supply chain security through automated detection and remediation of risks in development workflows. The software integrates with existing CI/CD pipelines and version control systems to monitor configurations, code, dependencies, and access patterns. It provides visibility into potential vulnerabilities, misconfigurations, and policy violations throughout the development lifecycle. BoostSecurity aims to address risks associated with code changes, third-party components, and privileged actions, offering automated alerts and guidance to developers. The software supports compliance management by tracking code provenance and enforcing security policies, helping organizations mitigate threats that could disrupt software delivery or integrity.

Show More Details
Logo of Arnica

Arnica

By Arnica

4.7
(8 Ratings)

Arnica is a software designed to enhance the security and integrity of software development processes by preventing and remediating security vulnerabilities in code repositories. The software integrates with version control systems to detect and address risks such as secrets exposure, unsafe coding practices, and configuration errors. It provides automated actions and developer guidance to facilitate secure code contributions without impacting workflow efficiency. Arnica addresses the business problem of managing security risks in modern DevOps environments, helping organizations maintain compliance and reduce exposure to threats within their software supply chain.

Show More Details
Logo of Jit

Jit

By Jit

4.9
(8 Ratings)

Jit empowers developers to secure everything they code with an all-in-one platform for product security that makes eleven code and cloud scanners feel like one - including SAST, SCA, secrets detection, IaC scanning, CSPM, K8s scanning, DAST, and more.

Without ever leaving their environment, developers get automated feedback on the security of every code change. Jit reduces vulnerability noise by correlating findings with runtime and business context, so developers understand why they should resolve issues.

As a result, Jit makes security easy for developers to adopt, so they can independently and consistently resolve security issues before production.

Show More Details
Logo of PointGuard AI Platform

PointGuard AI Platform

By PointGuard AI

4.6
(8 Ratings)

PointGuard AI Platform secures AI applications and agent-driven systems across their lifecycle, starting with AI Discovery & Inventory to identify models, agents, and integrations. It delivers AI Security Posture Management and AI Security Testing, including AI Red Teaming, to uncover and assess risks such as prompt injection and data exposure. At runtime, AI Anomaly Detection and Guardrails enforce safe behavior, while AI DLP and Access Control protect sensitive data and restrict usage. The Agentic Gateway provides a centralized control point for MCP, API, and A2A traffic. The platform also integrates vulnerability management to prioritize and remediate risks across AI and traditional applications.

Show More Details
Logo of Boman.ai

Boman.ai

By Boman.ai

4.8
(7 Ratings)

Boman.ai is a software designed to facilitate threat detection and response for organizations by leveraging artificial intelligence. The software analyzes vast volumes of cybersecurity data to identify vulnerabilities and threats across networks and endpoints. Boman.ai automates investigation and remediation processes, which helps streamline security operations and supports compliance with regulatory requirements. It integrates with existing security infrastructure to provide real-time alerts and actionable intelligence, enabling organizations to address cybersecurity risks more efficiently. The software aims to solve challenges related to manual threat analysis, prolonged incident response times, and resource-intensive security management practices.

Show More Details