Legit Security
Why Leading Enterprises Trust Legit
With the Legit ASPM platform, enterprises get a cleaner, easier way to manage and scale application security and address risks from code to cloud.
“Legit is providing us with visibility across the entire software supply chain, which helps us minimize risk and raise analyst and engineering productivity.”
Deputy Chief Information Security Officer
Netskope
“Legit significantly helps organizations to modernize application security programs by seamlessly integrating security into agile development and our modern application stack."
Global CISO
Chicago Board of Options Exchange (CBOE)
“Legit helps us secure our CI/CD pipelines including tracking the security posture of different teams, addressing SDLC configuration drifts, and applying security resources where it can help us most."
VP of Security
ACV Auctions
"We’re able to inventory all our SDLC systems and security tools, view developer activity, and leverage this visibility and context to remediate vulnerabilities faster."
Head of DevSecOps
Large pharmaceutical company
“Legit gives us governance out of the box, and the ability to have visualization across our SDLC to improve our developer collaboration and security best practices.”
Chief Information Security Officer
Cybersecurity vendor
Case Studies & Testimonials
Displaying 11 of 11Kraft-Heinz | Ricardo Lafosse
Hear how Ricardo Lafosse, CISO at Kraft-Heinz, uses Legit Security's auto-discovery and analysis capabilities to find vulnerabilities and collaborate effectively with development teams to ensure secure application delivery.
Read NowSDLC visibility case study: Noname Security | Karl Mattson
Despite the moniker, Noname Security is making a big name for themselves in the world of API security by protecting some of the world’s largest organizations from API-based attacks.
Read NowVulnerability management case study: Firebolt Analytics | Nir Yizhak
Firebolt's mission is “to create the world’s most powerful cloud data warehouse and offer it as a service.” As a company that is “first and foremost customer driven”, earning their customers’ trust is built not only on product innovation but on the confidence that Firebolt will do what it takes to protect their proprietary and sensitive data.
Read NowCompliance case study: ACV Auctions | Erik Bataller
ACV Auctions is out to “fundamentally change the wholesale automotive industry by providing a level of trust and transparency that was once unimaginable.”
Read NowCISO | Consumer Goods
"Application Security Posture Management Done Right."
Read NowCISO | IT Services
"Legit Secures Your Code Pipelines And Identifies Stale And Noncompliant Repositories."
Read NowCISO | Software
"Legit Security Is The Centerpiece Of Our Product Security Program."
Read NowDirector | Banking
"Legit's Remarkable Responsiveness And Dedication To Success."
Read NowVulnerability management case study: Cybersecurity vendor
A large cybersecurity vendor became a Legit customer because maintaining their hard earned reputation as one of the most trusted cybersecurity vendors naturally extends to the
integrity and security of their own software products, which are used by enterprises globally.
InfoSec | Consumer Goods
"How Legit Team Exceeds In Delivering Commitments and Customer Assistance."
Read Now