Listing Thumbnail

    Backslash Security Platform

     Info
    Deployed on AWS
    Ensure the security of your code and open sources. Identify externally reachable data flows and vulnerabilities for effective risk mitigation.

    Overview

    Backslash's fusion of Static Application Security Testing (SAST) and Software Composition Analysis (SCA) is designed to enhance your security posture through risk-based vulnerability management. By identifying authentic attack paths leading to reachable code, Backslash empowers you to focus on rectifying only the code and open-source software that are genuinely in use and accessible. Fix only what needs fixing - the code and open-source software that are truly in play, thanks to the precision of Backslash.

    Highlights

    • Vulnerability prioritization
    • ASPM (application security posture management)
    • SCA (software composition analysis)

    Details

    Categories

    Delivery method

    Deployed on AWS

    Unlock automation with AI agent solutions

    Fast-track AI initiatives with agents, tools, and solutions from AWS Partners.
    AI Agents

    Features and programs

    Financing for AWS Marketplace purchases

    AWS Marketplace now accepts line of credit payments through the PNC Vendor Finance program. This program is available to select AWS customers in the US, excluding NV, NC, ND, TN, & VT.
    Financing for AWS Marketplace purchases

    Pricing

    Backslash Security Platform

     Info
    Pricing is based on the duration and terms of your contract with the vendor. This entitles you to a specified quantity of use for the contract duration. If you choose not to renew or replace your contract before it ends, access to these entitlements will expire.
    Additional AWS infrastructure costs may apply. Use the AWS Pricing Calculator  to estimate your infrastructure costs.

    12-month contract (1)

     Info
    Dimension
    Description
    Cost/12 months
    Annual Commit
    Annual contract fee to access backslash security platform
    $75,000.00

    Vendor refund policy

    All amounts payable for Backslash Security Services, Support or Consulting Services are non-refundable except as required by law

    How can we make this page better?

    We'd like to hear your feedback and ideas on how to improve this page.
    We'd like to hear your feedback and ideas on how to improve this page.

    Legal

    Vendor terms and conditions

    Upon subscribing to this product, you must acknowledge and agree to the terms and conditions outlined in the vendor's End User License Agreement (EULA) .

    Content disclaimer

    Vendors are responsible for their product descriptions and other product content. AWS does not warrant that vendors' product descriptions or other product content are accurate, complete, reliable, current, or error-free.

    Usage information

     Info

    Delivery details

    Software as a Service (SaaS)

    SaaS delivers cloud-based software applications directly to customers over the internet. You can access these applications through a subscription model. You will pay recurring monthly usage fees through your AWS bill, while AWS handles deployment and infrastructure management, ensuring scalability, reliability, and seamless integration with other AWS services.

    Support

    AWS infrastructure support

    AWS Support is a one-on-one, fast-response support channel that is staffed 24x7x365 with experienced and technical support engineers. The service helps customers of all sizes and technical abilities to successfully utilize the products and features provided by Amazon Web Services.

    Product comparison

     Info
    Updated weekly

    Accolades

     Info
    Top
    100
    In Testing

    Customer reviews

     Info
    Sentiment is AI generated from actual customer reviews on AWS and G2
    Reviews
    Functionality
    Ease of use
    Customer service
    Cost effectiveness
    0 reviews
    Insufficient data
    Insufficient data
    Insufficient data
    Insufficient data
    0 reviews
    Insufficient data
    Insufficient data
    Insufficient data
    Insufficient data
    Positive reviews
    Mixed reviews
    Negative reviews

    Overview

     Info
    AI generated from product descriptions
    Static Application Security Testing
    Advanced code scanning mechanism to identify potential security vulnerabilities in application source code
    Software Composition Analysis
    Comprehensive analysis of open-source software components to detect and assess potential security risks and dependencies
    Attack Path Identification
    Precision mapping of externally reachable data flows to pinpoint authentic potential security breach routes
    Risk-Based Vulnerability Management
    Prioritization of security vulnerabilities based on actual code usage and accessibility
    Application Security Posture Management
    Holistic approach to monitoring, assessing, and improving overall application security infrastructure
    Software Composition Analysis
    Comprehensive analysis of open-source libraries and third-party components in source code and binaries
    Vulnerability Detection
    Evaluation of security vulnerabilities using proprietary open-source knowledgebase
    Software Bill-of-Materials Generation
    Automated creation of detailed software component inventory and dependencies
    Risk Management
    Identification and assessment of security and legal compliance risks in software supply chain
    Remediation Capabilities
    Built-in mechanisms for addressing detected vulnerabilities and compliance issues
    Application Security Testing
    Interactive application security testing (IAST) that identifies software vulnerabilities in real-time while developers write code
    Runtime Protection
    Embedded automated defense mechanism that continuously monitors and blocks attacks within the application runtime
    Source Code Scanning
    Static application security testing (SAST) tool with pipeline-native approach that prioritizes critical vulnerabilities
    Software Supply Chain Protection
    Identifies and prioritizes threats from third-party libraries across the software development lifecycle based on active component usage
    Cloud Native Security
    Purpose-built security testing solution for cloud environments, specifically designed to secure serverless functions and cloud infrastructure

    Contract

     Info
    Standard contract
    No

    Customer reviews

    Ratings and reviews

     Info
    0 ratings
    5 star
    4 star
    3 star
    2 star
    1 star
    0%
    0%
    0%
    0%
    0%
    0 AWS reviews
    No customer reviews yet
    Be the first to review this product . We've partnered with PeerSpot to gather customer feedback. You can share your experience by writing or recording a review, or scheduling a call with a PeerSpot analyst.