Sonatype Delivers Premium Open Source Controls to GitHub | Press Release


Nexus Auditor

Know what production apps are made of.

Schedule Demo   DATA SHEET

 

Nexus Auditor examines OSS components within applications

Generate a Software Bill of Materials

Nexus Auditor automatically generates a software bill of materials to identify open source components used within 3rd party or legacy applications.

Get a complete list of open source components included within your app to quickly identify components that violate your open source policies.

Nexus Auditor Bill of Materials

Nexus Auditor Scan

Triage License and Security Risk within Third Party Applications

Before you accept an application from a 3rd party, first scan it with Nexus Auditor to clearly see if any restricted licenses or security vulnerabilities exist.

With Auditor, you can analyze your inherent risk based on your open source policies and provide remediation guidance to remediate all issues.

Continuously Monitor Apps for New Vulnerabilities

An open source component might be free of security vulnerabilities today, but that doesn’t mean it will stay that way forever. Nexus Auditor continuously monitors your production applications to identify newly disclosed vulnerabilities.

You’ll receive an email or alert when a new vulnerability is found, so you can immediately take action to eliminate any threat from outside attackers.

Auditor Dashboard

C. Chani


“There is also a feature called Continuous Monitoring. As time goes on we'll be able to know whether a platform is still secure or not because of this feature. It's integrated, it's proactive, it's exactly what you want for a security product.”

- C. Chani (Financial Services), IT Central Station Review

Learn More

Dive into Sonatype Research
Learn how open source exploits work and get expert guidance on how to remediate risk.
Why Precision Matters
Discover why accurate data is critical to securing open source code.
Is Your Software Safe
Take a test drive of our data and see for yourself if there are vulnerabilities lurking in your application.

See Auditor in Action