Sign in
Categories
Your Saved List Become a Channel Partner Sell in AWS Marketplace Amazon Web Services Home Help

GitGuardian Platform

GitGuardian | 1

Reviews from AWS customer

1 AWS reviews
  • 1
  • 4 star
    0
  • 3 star
    0
  • 2 star
    0
  • 1 star
    0

External reviews

234 reviews
from and

External reviews are not included in the AWS star rating for the product.


    Alex B.

Un excellent outil pour vous soutenir

  • July 17, 2025
  • Review provided by G2

Qu'aimez-vous le plus à propos de the product?
Solution extrêmement utile à avoir lorsque vous développez vos solutions.
Que n’aimez-vous pas à propos de the product?
L'inconvénient est que vous savez que vous avez fait une erreur dans votre code et votre sécurité.
Quels sont les problèmes que the product résout, et en quoi cela vous est-il bénéfique?
Publication involontaire de clés de produit.


    reviewer2740785

Supports application security by detecting a wide range of secrets and allows integration into existing vulnerability management processes

  • July 16, 2025
  • Review provided by PeerSpot

What is our primary use case?

My use case for the GitGuardian Platform is application security for our enterprise repository.

How has it helped my organization?

The solution has improved our organization. We are still in the rollout, but the users who are utilizing it are very happy, especially about the feature that enables pre-commit hooks in Git that will not raise to the remote repository. This is a very good feature that our developers use very heavily.

What is most valuable?

The best features of the GitGuardian Platform are that it finds many different secrets, more than other competitors, and the support from the colleagues is also very good.

The GitGuardian Platform helps in monitoring and protecting our code repositories from leakage. It helps significantly because we connected our vulnerability management process to this, and the colleagues from vulnerability management have much easier work since we have the GitGuardian Platform installation due to the dedicated incidents or issues which are opened automatically.

The alerting capabilities and threat intelligence features of the GitGuardian Platform are managed by another team; we only host the platform.

The audit logs and compliance reports from GitGuardian are very helpful because, in the past, we needed to do it manually by scanning the repos. Now with GitGuardian Platform, we have a really good overview of what is open, what is closed, and how critical the issues are.

What needs improvement?

The areas that have room for improvement involve the missing feature to add custom detectors for the GitGuardian Platform, which would help us check if internal secrets are still valid or not.

I assess the accuracy of the detection from the GitGuardian Platform as very good because we don't have many false positives, which means the quality is very good. The only thing we want to have are some additional detectors which help us to prioritize, especially since enterprise secrets are found, but they cannot verify if they are valid or not.

For how long have I used the solution?

I have been using the GitGuardian Platform for one and a half years.

What do I think about the stability of the solution?

The stability of the GitGuardian Platform is excellent. We don't have any problems with the stability of the system at all.

What do I think about the scalability of the solution?

The scalability of the GitGuardian Platform is excellent.

How are customer service and support?

The technical support from the GitGuardian Platform deserves a rating of nine out of ten.

How would you rate customer service and support?

Positive

What about the implementation team?

The deployment of the GitGuardian Platform is very easy because it's a Helm chart which is very easy to install for us. The deployment took several days.

What's my experience with pricing, setup cost, and licensing?

I have no information about pricing, but since they won the request for quotation, I believe it's a good price.

Which other solutions did I evaluate?

We created a technical evaluation and checked against other providers, though I don't remember the names. The GitGuardian Platform has the best technical capabilities, and our procurement handles the pricing part.

What other advice do I have?

The GitGuardian Platform is used worldwide in our environment.

Currently, we have approximately 1,300 licenses for the GitGuardian Platform, but we will increase to 2,000 next year.

The solution requires maintenance from our side only for user management, which is normal for each application.

I cannot quantify how much time or resources the GitGuardian Platform saves us because this is spread across all teams worldwide.

I would recommend the GitGuardian Platform to other users because the integration with GitHub and Azure DevOps is very easy, and you also have the possibility to use it locally on your IDE. This is a very good solution.

I rate the GitGuardian Platform a nine out of ten because room for improvement is always possible, but it's really good.

Which deployment model are you using for this solution?

On-premises

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Other


    Ney Roman

Facilitates efficient secret management and improves development processes

  • June 23, 2025
  • Review from a verified AWS customer

What is our primary use case?

My use case for the GitGuardian Platform is application security.

What is most valuable?

My impression of the GitGuardian Platform's capability to detect secrets in real time is actually really amazing, because it lets us protect or block the pipelines in which we deploy new applications so we can acknowledge when a secret is hardcoded in a repository, or when we have already hardcoded secrets within templates in our repos.

We adopted it a year ago, and it has been doing great in our teams, especially for developers. The impression so far has been good.

The severity scoring has helped us in incident management because it is doing the correct job. We got many secrets leaked within our platform and it was making the correct warnings regarding that particular secret, as we had a hardcoded Google Cloud API key. It was marked as a critical severity, so we had the chance to correct it, regenerate that secret and work again on not hardcoding secrets within our code.

GitGuardian's public leak detection significantly enhances our organization's data security by continuously monitoring public repositories. It allows us to proactively identify accidental exposures of sensitive credentials or secrets.

What needs improvement?

Regarding the exceptions in GitGuardian Platform, we know that within the platform we have a way to accept a path or a directory from a repository, but it is not that visible at the very beginning. You have to figure out where to search for it, and once you have it, it is really good, but it is not that visible at the beginning. This should be made more exposed.

The documentation could be better because it was not that comprehensively documented. When we started working with GitGuardian Platform, it was difficult to find some specific use cases, and we were not aware of that. It might have improved now, but at that time, it was not something we would recommend.

For how long have I used the solution?

I have been using the GitGuardian Platform for almost a year now.

What was my experience with deployment of the solution?

The deployment of the GitGuardian Platform was easy.

What do I think about the stability of the solution?

From 1 to 10, I rate the stability of the GitGuardian Platform a 10, as there are no downtimes.

What do I think about the scalability of the solution?

I would rate the scalability as a 10, since we did not have any problems.

How are customer service and support?

For technical support, I would give a solid 10. They have someone who speaks Spanish, which made it easier for us.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

I am comparing it with Advanced Security from GitHub and Cycode.

How was the initial setup?

Two of us were involved in the deployment process.

It took a week to deploy the GitGuardian Platform, just to standardize the process.

What about the implementation team?

Two of us were involved in the deployment process.

What was our ROI?

Regarding return on investment, we have actually saved time and resources because before having GitGuardian Platform, we had two or three people working in every repository looking for secrets with open-source tools. It took a long time to find secrets or many patterns, and at the time, we had to configure our own patterns to find them. I cannot specify the exact return on investment, but I can surely say that we have saved significant time and resources, particularly in terms of people and automation.

Which other solutions did I evaluate?

I would compare the GitGuardian Platform to other solutions or vendors on the market as being easier to use, but it is not integrated with the CSM that we are using right now. That is the difference. It is easy to use, but it could be easier.

What other advice do I have?

We are customers in our company's relationship with the vendor.

I work primarily with the CLI, focusing on pipelines and automations rather than the platform itself. The platform has remained almost the same within the year that we have been working with it.

We are not utilizing the automated playbooks yet.

I cannot determine if the pricing is cost-effective.

The vendor can contact me if they have any questions or comments about my review.

I have rated the GitGuardian Platform a 10 out of 10.

Which deployment model are you using for this solution?

Public Cloud

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Microsoft Azure


    shanebrannick@yahoo.com B.

Git Guardian m'aide à éviter de révéler des données sensibles au public.

  • June 23, 2025
  • Review provided by G2

Qu'aimez-vous le plus à propos de the product?
J'aime qu'il me donne des avertissements automatiques sur l'exposition de données potentiellement sensibles.
Que n’aimez-vous pas à propos de the product?
Je l'utilise juste pour les avertissements automatiques. Je ne vois pas encore d'inconvénient.
Quels sont les problèmes que the product résout, et en quoi cela vous est-il bénéfique?
Cela m'empêche d'exposer des données sensibles. Parfois, j'ajoute des mots de passe lors du débogage et j'oublie de les supprimer. Git Guardian corrige cela.


    Abhinav P.

Je suis étonné par la rapidité avec laquelle GitGuardian identifie les vulnérabilités.

  • June 13, 2025
  • Review provided by G2

Qu'aimez-vous le plus à propos de the product?
Exposition secrète et résolution rapide + excellente expérience utilisateur
Que n’aimez-vous pas à propos de the product?
Ils ont tous accès à nos secrets privés et informations. Nous ne pouvons pas simplement faire confiance à n'importe quelle entreprise avec notre base de données qui a été divulguée.
Quels sont les problèmes que the product résout, et en quoi cela vous est-il bénéfique?
Résolution rapide et identification secrète.


    reviewer2721312

Custom detectors streamline workflow and real-time detection enhances security

  • June 11, 2025
  • Review provided by PeerSpot

What is our primary use case?

Our current use cases for GitGuardian Platform involve monitoring external and internal GitHub and GitLab, Bitbucket, and other code repositories that it supports for secrets.

What is most valuable?

The newest addition that we appreciate about GitGuardian Platform is the ability to create a custom detector, which we built and worked with the team, and that works very effectively.

GitGuardian Platform performs the capability to detect secrets in real time exceptionally, as it activates from the commit and can detect it immediately.

We utilize GitGuardian Platform's automated validity checks in some cases, and they seem to work effectively. We are still experimenting with them.

The multi-vault integration plays a key role in our secrets management strategy because we have multiple different vaults, and that works effectively.

What needs improvement?

GitGuardian Platform does what it is designed to do, but it still generates many false positives.

We utilize the automated playbooks from GitGuardian Platform, and we are enhancing them. We will probably stop using some of them, but we are building off of them. The one piece they do not include is contacting the person's manager or copying them, which we feel is necessary to prevent insider threat and other issues, but they do not have access to our hierarchy of employees.

We are not using the honeytokens feature of GitGuardian Platform.

Regarding improvements, there are two things we are working on with them. They have added charts, which is a new feature, but it is still not accurate. It has taken 4 to 5 months and it is fairly slow. We are looking for better metrics and audit data, wanting more features such as knowing which users are creating the most secrets or committing the most secrets, what repository, what directory, and who is not checking in secrets, which repo, user, or directory has not had any secrets committed. We want more metrics around both good and bad to see how we are performing.

For how long have I used the solution?

I have been using GitGuardian Platform for 5 years at the company, and my team has been using it for 3 years.

What was my experience with deployment of the solution?

The initial deployment when we first started using GitGuardian Platform was easy. One feature I would appreciate is more notice or alerts, and they fixed them slightly, such as when a secret expires and we are no longer connected. It would be beneficial to have a heads up or a timer indicating when a secret runs every 6 months, or we could set it, and we need a new secret before the connection breaks. It usually gets fixed fairly quickly, but it is just annoying.

What do I think about the stability of the solution?

There has not been any instability with GitGuardian Platform; it performs reliably.

What do I think about the scalability of the solution?

Currently, what GitGuardian Platform is doing works effectively. It is quick and meets our needs. If we added more, I do not think that would really impact performance, so the scalability in that aspect is fine. I know they are trying to branch out and look for secrets in other types of tools, but I am not sure if we are going to use them for that or if that would impact performance or stability either.

How are customer service and support?

I have contacted technical support previously, but we usually work through our customer representative directly, and they create the tickets for us.

How would you rate customer service and support?

Positive

How was the initial setup?

We have one employee that primarily works on the deployment and configuration of GitGuardian Platform, and that took approximately a couple of weeks working directly with them. After that, she spends about an hour in there a week, so it requires minimal effort on our side.

GitGuardian Platform requires very little maintenance on our end—just making sure the keys are connected and ensuring people are following through.

Which other solutions did I evaluate?

I have not used any alternatives to GitGuardian Platform in this specific scope, as I have not found one that fully integrates into as many different code repositories. We have used a couple of tool-specific ones, but GitGuardian Platform is the only one we have used that works across multiple platforms.

What other advice do I have?

We purchased GitGuardian Platform for a compliance checkbox because we needed to monitor secrets in our code repositories. We saw benefits immediately after implementation, but the reason my team took it over after a couple of years is that the original team did not really go beyond a compliance checkbox. We started seeing benefits in year 3 as we built out a workflow to contact the developers who committed code with secrets and get them to review and approve or revoke the process.

In terms of how GitGuardian Platform Public Leakage Detection influences our data security, it helps us with our known developers, but it is fairly limited. It has to go to another developer who has to make it public or they have to put codes in there, so it works in the right scenario, but there are scenarios where it still misses.

We do not really look at the automated security severity scoring in Incident Management. We still are getting false positives and others, so we are concentrating more on that versus any severity rating.

The pricing for GitGuardian Platform is fair, though slightly high.

We are customers of GitGuardian Platform; we do not have any partnerships or official partnerships, nor are we resellers.

I rate GitGuardian Platform 8 out of 10.


    Mahbub B.

Il détecte immédiatement les risques de sécurité et donne de bons conseils pour les corriger.

  • May 22, 2025
  • Review provided by G2

Qu'aimez-vous le plus à propos de the product?
Il détecte rapidement les risques et donne facilement des conseils pour les corriger.
Que n’aimez-vous pas à propos de the product?
Pas grand-chose, l'interface utilisateur pourrait être plus intuitive.
Quels sont les problèmes que the product résout, et en quoi cela vous est-il bénéfique?
Pour mon usage personnel, cela m'aide à sécuriser mes applications.


    Ari Kalfus

Proactive self-service capabilities remove the burden of the security team and enable faster remediation

  • May 21, 2025
  • Review provided by PeerSpot

What is our primary use case?

GitGuardian Platform is a security tool preventing the exposure of secrets. It is particularly valuable as a tool because it doesn't just identify exposed security issues, but works as a platform that gives developers an intuitive and easy way of reacting to and fixing the issues.

How has it helped my organization?

GitGuardian Platform captures all the major secret types we care about. It tends to be a bit overzealous in some categories, but it covers all the ones that we want to track and keep an eye on. It has great coverage over those.

GitGuardian Platform has helped save significant time for the security team by eliminating the need to seek out development teams and work with them on exposed secrets, as much of this is now handled proactively. The built-in process for developers interacting with exposed secrets saves them time fixing security problems before returning to their tasks. We can also provide customized remediation guidelines to developers.

Automated validity checks are super critical for us. If something is confirmed as valid in the platform, we know there is some externally accessible value that's exposed somewhere. It's then the top priority for us to engage in. It also gives us a lot of confidence. When the development teams come back and say that they have fixed it, GitGuardian Platform confirms that.

We rely a lot on GitGuardian Platform's self-service functionality so that developers handle incidents without us having to take action. We don't rely on automated severity scoring for incident management. While the severity rating is decent, we focus more on the validity feature and detector categories than on GitGuardian's high-risk ratings. We have customized remediation guidelines by providing specific internal context for handling exposed secrets. We use GitGuardian's integrations with other tracking platforms, but we don't have everything funneled into Jira. We use our own prioritization to see which ones we want to funnel into Jira.

The platform has given us a clear picture of the historical landscape, showing what has been fixed versus what remains hidden in historical data. This clarity has been helpful in planning security measures around issues that don't get self-healed.

We have it scanning our GitHub environments, Atlassian suite (Jira tickets, Confluence), and Slack messages. That gives us a nice coverage across the business.

What is most valuable?

The validity and self-healing playbook features of GitGuardian Platform is one of the most useful features for us. It automatically reaches out to developers for any leaks, notifying them immediately via email. We have Slack notifications set up, allowing developers to respond, provide feedback about sensitive values, and self-close issues by attesting completion on the platform. A high number of our exposures are remediated by developers before security needs to step in, as the self-healing playbook process engages them automatically. This results in issues being resolved within minutes, saving significant effort from the security team in tracking down or communicating with developers.

What needs improvement?

The analytics in GitGuardian Platform have a significant opportunity to better reflect the value provided to security teams and demonstrate actual activity occurring. While the self-healing capability and proactive developer actions are important features, the analytics do not provide information around this activity. They only track actions inside the platform when security team members assign themselves to issues and respond. The self-healing activity by developers isn't reflected in the analytics, requiring us to collect this data ourselves. This presents an opportunity for them to better showcase their developer-first remediation mindset.

For how long have I used the solution?

We have been using GitGuardian Platform for approximately nine months.

What do I think about the stability of the solution?

It's a stable platform, we don't often have to think about it. The SaaS platform has experienced two significant moments of downtime or instability in the last six months, requiring notices and retrospectives. We also run a self-hosted cluster which has not experienced these issues, though we've faced some challenges upgrading Kubernetes that required support assistance to prevent internal downtime.

What do I think about the scalability of the solution?

It is scalable. I would rate it a nine out of ten for scalability. 

My product security team administrates the platform, with a few other security people accessing it. Access to respond to incidents is deployed for every engineer. Team-based provisioning is not yet supported with SCIM, which makes team-based grouping a hassle, so we do not use it.

How are customer service and support?

I would rate their technical support a nine out of ten.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

We were using a home-grown solution. 

How was the initial setup?

The initial setup of the self-hosted cluster was moderately complex. We faced some issues because of the environment we had. We had to fix some installation errors and bugs in their Helm configuration.

In terms of deployment model, we self-host a cluster out of necessity. We have an internal GitHub Enterprise server. We self-host GitGuardian Platform to connect to that environment. We also use their SaaS version for Slack and Atlassian integrations.

What about the implementation team?

We implemented in-house.

What was our ROI?

The majority of our incidents for critical detectors and important secret types are remediated automatically or proactively by developers through GitGuardian's notification system, without security team involvement. It saves a lot of time for the security teams and the developers. It probably saves approximately 10 hours per week. Previously, we needed an extra 20% of our time focused on this subject area, which has now been saved because of this platform.

What's my experience with pricing, setup cost, and licensing?

It's competitively priced compared to others. Overall, the secret detection sector is expensive, but we are happy with the value we get.

Which other solutions did I evaluate?

We evaluated other vendors on the market. The secret detection capabilities of most vendors are basically equivalent, capturing all major types of secrets. The management and administration of findings after scanning is what differentiates vendors. Many alternatives lack strong administration capabilities for security teams after finding detections. GitGuardian's dashboard, self-healing playbooks, and ways for the security team to monitor, track, and deduplicate detections make it easier to manage the program compared to competitors.

What other advice do I have?

I would recommend GitGuardian Platform to other users due to the ease of management for the security team with the dashboard. It offers easy administration of results. The proactive self-service capabilities provided to developers remove the burden from the security team and enable faster remediation of exposed values.

My overall rating for GitGuardian Platform is an eight out of ten.

Which deployment model are you using for this solution?

On-premises

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Other


    Glenn McDonald

Improves coding hygiene and uncovers potentially nasty surprises

  • May 21, 2025
  • Review provided by PeerSpot

What is our primary use case?

We use GitHub as our source code platform. When we shifted from on-premise version control systems, we identified a requirement for capable tooling that could both find secrets that were committed in the past, and prevent and alert on secrets that were being accidentally committed.

How has it helped my organization?

GitGuardian gives us a better understanding of what's going on in our source code. Persistent use of the platform has allowed us to highlight areas where we need to improve; eg. providing training so that people know what information should and should not be in GitHub

We've managed to use this data to improve practices related to where teams store their secrets, and have also been able to use it to understand where we might be lacking tooling. 

When a developer commits a secret or there's a particular pattern in a repository, we often ask them about why they did this. They may turn around and say that there's no better option at the moment because we don't have a platform to suit x, y, or z. We can use that information to then drive decisions around whether or not we need to look into improved tooling or patterns that our engineering teams can use to avoid storing secrets in their source code.

What is most valuable?

Automated validity checks are very helpful; we use them to prioritise incidents, as they give us a quick understanding as to which secrets are still valid. They also help us to confirm that token invalidation - which sometimes has to be done by another team or a third party - has worked as expected.

We also utilize some of the automated playbooks, specifically those around automatic incident closure, allowing us to spend less time making sure that the incidents closed by changes to code are getting closed out.

Instantaneous notifications connected to our Slack platform allow us to deal quickly with incidents if and when they occur.

One of the best features of the solution, though, is the ability to use pre-push hooks. Preventing our developers from committing secrets into their source code before they hit the remote GitHub servers is ideal; it can be quite challenging and time consuming to remediate and rotate secrets once pushed to the remote.

The reporting feature has improved quite a bit since we first used it around five years ago, with filters that allow us to set up quick groups of or collections of filters and statuses to determine which secret detections are still unassigned and which are new. It allows us to easily ship those off to the developers involved in those incidents to get them remediated.

What needs improvement?

We'd love to see notification updates in Slack, as the system does not provide feedback on updates to incidents, which can be problematic when developers resolve issues. 

ie. if a developer commits code that triggers an incident, the alert comes into Slack, but by the time someone looks at it through the Slack alerting channel, the developer might have gone and already fixed or closed the issue. There's no feedback loop back into the notification channel to show that it's been addressed. 

Another thing that would be good to see is some more metrics on the usage of the GitGuardian pre-push hooks. It would be helpful to see which GitHub users have or do not have the pre-push hook capability turned on. That would allow us to chase people and say that we noticed that you're making commits, but you're not using GitGuardian, and encourage them to install ggshield before an accident happens.

For how long have I used the solution?

My experience with the solution started in November 2020, which is approximately four or five years.

What do I think about the stability of the solution?

It's generally quite stable.

There has been a little bit of downtime of late, and it has been reasonably impactful when it's not been scanning. We set up our repositories in GitHub with GitGuardian as a required check. 

We had an incident for about four hours  last week and another one about a month before that. Prior to that, it's been really stable. 

What do I think about the scalability of the solution?

It handles all the repositories and commit activity we have.

How are customer service and support?

I would rate their technical support an eight out of ten.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

No

How was the initial setup?

We didn't have to do much. They manage all of the backend for us. All we have to do is integrate it into our GitHub organizations, and doing that is straightforward.

The solution does not require any maintenance.

What about the implementation team?

In-house.

What was our ROI?

It's challenging to quantify, but it has saved us from a bit of panic because we know the state of our source code. It's hard to determine what savings might come from having the tooling or not.

What's my experience with pricing, setup cost, and licensing?

It's fairly priced, as it performs a lot of analysis and is a valuable tool.

Which other solutions did I evaluate?

We have tested it against other solutions, such as TruffleHog, the open-source solution, and found the GitGuardian Platform to be about significantly better in terms of detection capabilities. TruffleHog focuses on secrets that it can validate, but in an Enterprise world with lots of internal tools, APIs and platforms it can miss a lot of secrets.

What other advice do I have?

The new multi-vault feature looks useful; we are planning to connect it up to AWS Secrets Manager and HashiCorp Vault

Which deployment model are you using for this solution?

Public Cloud


    Jesus R.

Continue à faire du bon travail

  • May 13, 2025
  • Review provided by G2

Qu'aimez-vous le plus à propos de the product?
J'aime vraiment la façon dont les incidents notifiés avec des clés sont gérés, ainsi que le détail pour les résoudre, en plus des fichiers impliqués dans la fuite.
Que n’aimez-vous pas à propos de the product?
Au lieu de le recevoir par e-mail, j'aimerais mettre en place un pipeline pour que l'e-mail ne soit envoyé que lorsque quelque chose ne va pas.
Quels sont les problèmes que the product résout, et en quoi cela vous est-il bénéfique?
La façon dont il vous avertit est géniale car il s'assure que vos clés ne sont pas exposées. Mais ce serait encore mieux de le prévenir encore plus en effectuant un test local avant chaque commit et en affichant les résultats localement avant de pousser sur GitHub. Car une fois que c'est sur Git, même si vous arrêtez de le suivre plus tard, si le dépôt devient public, l'historique est toujours visible.