Platform
Shift Left AppSec Platform
Learn More
Code Scanning

Unify security scanners in one platform that cuts through noise.

Remediation

Fix what’s easy, patch what's hard, and avoid breaking changes.

AI Code Security

Prepare for AI adoption and increase AppSec productivity.

Ecosystem
Languages & Integrations
Microsoft Defender for Cloud
GitHub Advanced Security
Use Cases
Reachability & Remediation Based SCA
AI Security Code Review
OSS Security Patches
CI/CD Security
SAST & Secrets
Container Scanning
AI Governance
SBOM & VEX
Learn
Blog
Documentation
Events
LeanAppSec
Learn by Topic
AI/ML
CI/CD Security
Compliance & SBOM
Developer Productivity
First Party Code
Open Source
SCA
Learn by Category
See All
Blog
Customer Story
Ebook / Report
Events
Solution Brief
Video
Featured resources
View All
Artifact Signing
SCA for Bazel
SCA for Python and AI Apps
Tools
TEI Calculator
Risk Explorer
Company
About
Careers
News
Partners
Achievements
SOC 2
$93M Series B
Gartner Cool Vendor
CRN Stellar Startup
Intellyx Digital Innovation Award
Recent resources
View All
Why Security Policies Frustrate Developers (and How We Can Fix Them)
Open Source Gets Political: What The easyjson Debate Misses (and what to do about it)
Why We Raised a $93M Series B (In This Market)
LeanAppSec
LeanAppSec
Pricing
Docs
Login
Book a Demo
Book Demo

Endor Labs Privacy Policy

Last updated on
April 9, 2024
Title goes here

Endor Labs Privacy Policy

Last updated on
April 9, 2024
Enter your email to be notified of changes to this list.

At Endor Labs Inc. (the “Company,” “us,” “we,” or “our”), we take your privacy seriously. Please read this Privacy Policy to learn how we treat your personal data. By using or accessing our Site, Saas Services, or other products or services (collectively, the “Services”) in any manner, you acknowledge that you accept the practices and policies outlined below, and you hereby consent that we will collect, use and disclose your information as described in this Privacy Policy. 

Remember that your use of our Services is at all times subject to our Product Terms of Use and our Website Terms of Use (together, the “Terms of Use”), which incorporates this Privacy Policy. Any terms we use in this Policy without defining them have the definitions given to them in the Terms of Use. 

As we continually work to improve our Services, we may need to change this Privacy Policy from time to time. We will alert you of material changes by placing a notice on our Site, by sending you an email and/or by some other means. Please note that if you’ve opted not to receive legal notice emails from us (or you haven’t provided us with your email address), those legal notices will still govern your use of the Services, and you are still responsible for reading and understanding them. If you use the Services after any changes to the Privacy Policy have been posted, that means you agree to all of the changes.

What this Privacy Policy Covers

This Privacy Policy covers how we treat Personal Data that we gather when you access or use our Services. “Personal Data” means any information that identifies or relates to a particular individual and also includes information referred to as “personally identifiable information” or “personal information” under applicable data privacy laws, rules or regulations. This Privacy Policy does not cover the practices of companies we don’t own or control or people we don’t manage.

Personal Data

Categories of Personal Data We Collect

This chart details the categories of Personal Data that we collect and have collected over the past 12 months:


Category of Personal Data (and Examples)
Categories of Third Parties With Whom We Disclose this Personal Data 
Profile or Contact Data such as first and last name, email, phone number, and username used to access the Services. 
  • Service Providers

  • Advertising Partners

  • Analytics Partners

  • Business Partners

  • Parties You Authorize, Access or Authenticate

Device/IP Data such as IP address, device ID, domain server, and type of device/ operating system/ browser used to access the Services.
  • Service Providers

  • Advertising Partners

  • Analytics Partners

  • Business Partners

  • Parties You Authorize, Access or Authenticate

Web Analytics such as web page interactions, referring webpage/source through which you accessed the Services, non-identifiable request IDs, and statistics associated with the interaction between device or browser and the Services. 
  • Service Providers

  • Advertising Partners

  • Analytics Partners

  • Business Partners

  • Parties You Authorize, Access or Authenticate

Professional or Employment-Related Data such as job title. 
  • Service Providers

  • Advertising Partners

  • Analytics Partners

  • Business Partners

  • Parties You Authorize, Access or Authenticate

Geolocation Data such as IP-address-based location information.
  • Service Providers

  • Advertising Partners

  • Analytics Partners

  • Business Partners

  • Parties You Authorize, Access or Authenticate

Other Identifying Information that You Voluntarily Choose to Provide such as emails, letters, texts, or other communications you send us.
  • Service Providers

  • Advertising Partners

  • Analytics Partners

  • Business Partners

  • Parties You Authorize, Access or Authenticate

Our Commercial or Business Purposes for Collecting Personal Data

  • Providing, Customizing and Improving the Services
    • Creating and managing your account or other user profiles.
    • Processing orders or other transactions; billing.
    • Providing you with the products, services or information you request.
    • Meeting or fulfilling the reason you provided the information to us.
    • Providing support and assistance for the Services.
    • Improving the Services, including testing, research, internal analytics and product development.
    • Personalizing the Services, website content and communications based on your preferences.
    • Doing fraud protection, security and debugging.
  • Marketing the Services
    • Marketing and selling the Services.
    • Showing you advertisements, including interest-based, online behavioral or targeted advertising.
  • Corresponding with You
    • Responding to correspondence that we receive from you, contacting you when necessary or requested, and sending you information about the Company or the Services.
    • Sending emails and other communications according to your preferences.

Other Permitted Purposes for Processing Personal Data

In addition, each of the above referenced categories of Personal Data may be collected, used, and disclosed with the government, including law enforcement, or other parties to meet certain legal requirements and enforcing legal terms including: fulfilling our legal obligations under applicable law, regulation, court order or other legal process, such as preventing, detecting and investigating security incidents and potentially illegal or prohibited activities; protecting the rights, property or safety of you, the Company, or another party; enforcing any agreements with you; responding to claims that any posting or other content violates third-party rights; and resolving disputes.

We will not collect additional categories of Personal Data or use the Personal Data we collected for materially different, unrelated or incompatible purposes without providing you notice or obtaining your consent. 

Categories of Sources of Personal Data

We collect Personal Data about you from the following categories of sources:

  • You
    • When you provide such information directly to us.
      • When you create an account or use our interactive tools and Services.
      • When you voluntarily provide information in free-form text boxes through the Services or through responses to surveys or questionnaires.
      • When you send us an email or otherwise contact us.  
    • When you use the Services and such information is collected automatically.
      • Through Cookies (defined in the “Tracking Tools, Advertising and Opt-Out” section below).
      • If you download our mobile application or use a location-enabled browser, we may receive information about your location and mobile device, as applicable.
      • If you download and install certain applications and software we make available, we may receive and collect information transmitted from your computing device for the purpose of providing you the relevant Services, such as information regarding when you are logged on and available to receive updates or alert notices.
  • Public Records
    • From the government or other sources.
  • Third Parties
    • Vendors
      • We may use analytics providers to analyze how you interact and engage with the Services, or third parties may help us provide you with customer support.
      • We may use vendors to obtain information to generate leads and create user profiles.
    • Advertising Partners
      • We receive information about you from some of our vendors who assist us with marketing or promotional services related to how you interact with our websites, applications, products, Services, advertisements or communications.
    • Third-Party Credentials

If you provide your third-party account credential to us or otherwise sign in to the Services through a third-party site or service, some account-related information (such as your username) may be transmitted to us. 

How We Disclose Your Personal Data

We disclose your Personal Data to the categories of service providers and other parties listed in this section. Depending on state laws that may be applicable to you, some of these disclosures may constitute a “sale” of your Personal Data. For more information, please refer to the state-specific sections below.

  • Service Providers. These parties help us provide the Services or perform business functions on our behalf. They include:
    • Hosting, technology and communication providers.
    • Security and fraud prevention consultants.
    • Support and customer service vendors.
    • Product fulfillment and delivery providers.
  • Advertising Partners. These parties help us market our services and provide you with other offers that may be of interest to you. They include:
    • Ad networks.
    • Data brokers.
    • Marketing providers.
  • Analytics Partners. These parties provide analytics on web traffic or usage of the Services. They include:
    • Companies that track how users found or were referred to the Services.
    • Companies that track how users interact with the Services.
  • Business Partners. These parties partner with us in offering various services. They include:
    • Businesses that you have a relationship with.
    • Companies that we partner with to offer joint promotional offers or opportunities.
  • Parties You Authorize, Access or Authenticate
    • Third parties you access through the services.
    • Social media services.
    • Other users.

Legal Obligations

We may disclose any Personal Data that we collect with third parties in conjunction with any of the activities set forth under “Other Permitted Purposes for Processing Personal Data” section above. 

Business Transfers

All of your Personal Data that we collect may be transferred to a third party if we undergo a merger, acquisition, bankruptcy or other transaction in which that third party assumes control of our business (in whole or in part). 

Data that is Not Personal Data

We may create aggregated, de-identified or anonymized data from the Personal Data we collect, including by removing information that makes the data personally identifiable to a particular user. We may use such aggregated, de-identified or anonymized data and disclose it with third parties for our lawful business purposes, including to analyze, build and improve the Services and promote our business, provided that we will not disclose such data in a manner that could identify you.  

Tracking Tools, Advertising, and Opt-Out

The Services use cookies and similar technologies such as pixel tags, web beacons, clear GIFs and JavaScript (collectively, “Cookies”) to enable our servers to recognize your web browser, tell us how and when you visit and use our Services, analyze trends, learn about our user base and operate and improve our Services. Cookies are small pieces of data– usually text files – placed on your computer, tablet, phone or similar device when you use that device to access our Services. We may also supplement the information we collect from you with information received from third parties, including third parties that have placed their own Cookies on your device(s). 

Please note that because of our use of Cookies, the Services do not support “Do Not Track” requests sent from a browser at this time.

We use the following types of Cookies:

  • Essential Cookies. Essential Cookies are required for providing you with features or services that you have requested. For example, certain Cookies enable you to log into secure areas of our Services. Disabling these Cookies may make certain features and services unavailable.
  • Functional Cookies. Functional Cookies are used to record your choices and settings regarding our Services, maintain your preferences over time and recognize you when you return to our Services. These Cookies help us to personalize our content for you, greet you by name and remember your preferences (for example, your choice of language or region).
  • Performance/Analytical Cookies. Performance/Analytical Cookies allow us to understand how visitors use our Services. They do this by collecting information about the number of visitors to the Services, what pages visitors view on our Services and how long visitors are viewing pages on the Services. Performance/Analytical Cookies also help us measure the performance of our advertising campaigns in order to help us improve our campaigns and the Services’ content for those who engage with our advertising. For example, Google LLC (“Google”) uses cookies in connection with its Google Analytics services. Google’s ability to use and disclose information collected by Google Analytics about your visits to the Services is subject to the Google Analytics Terms of Use and the Google Privacy Policy. You have the option to opt-out of Google’s use of Cookies by visiting the Google advertising opt-out page at www.google.com/privacy_ads.html or the Google Analytics Opt-out Browser Add-on at https://tools.google.com/dlpage/gaoptout/.
  • Retargeting/Advertising Cookies. Retargeting/Advertising Cookies collect data about your online activity and identify your interests so that we can provide advertising that we believe is relevant to you. For more information about this, please see the section below titled “Information about Interest-Based Advertisements.”

You can decide whether or not to accept Cookies through your internet browser’s settings. Most browsers have an option for turning off the Cookie feature, which will prevent your browser from accepting new Cookies, as well as (depending on the sophistication of your browser software) allow you to decide on acceptance of each new Cookie in a variety of ways. You can also delete all Cookies that are already on your device. If you do this, however, you may have to manually adjust some preferences every time you visit our website and some of the Services and functionalities may not work. 

To explore what Cookie settings are available to you or to modify your preferences with respect to Cookies, you can access your Cookie management settings by clicking [LINK]. To find out more information about Cookies generally, including information about how to manage and delete Cookies, please visit http://www.allaboutcookies.org/ or https://ico.org.uk/for-the-public/online/cookies/ if you are located in the European Union.

Session Replay Technology

We may use session replay technology in order to identify and resolve customer issues, to monitor and analyze how you use our Services, to better understand user behavior, and to improve our Services. By continuing to use the Services, you consent to the use of session replay technology. If you would like to change your settings with respect to session replay technology, you can access your Cookie management settings by clicking [LINK].

Information about Interest-Based Advertisements

We may serve advertisements, and also allow third-party ad networks, including third-party ad servers, ad agencies, ad technology vendors and research firms, to serve advertisements through the Services. These advertisements may be targeted to users who fit certain general profile categories or display certain preferences or behaviors (“Interest-Based Ads”). Information for Interest-Based Ads (including Personal Data) may be provided to us by you, or derived from the usage patterns of particular users on the Services and/or services of third parties. Such information may be gathered through tracking users’ activities across time and unaffiliated properties, including when you leave the Services. To accomplish this, we or our service providers may deliver Cookies, including a file (known as a “web beacon”) from an ad network to you through the Services. Web beacons allow ad networks to provide anonymized, aggregated auditing, research and reporting for us and for advertisers. Web beacons also enable ad networks to serve targeted advertisements to you when you visit other websites. Web beacons allow ad networks to view, edit or set their own Cookies on your browser, just as if you had requested a web page from their site.

Data Security

We seek to protect your Personal Data from unauthorized access, use and disclosure using appropriate physical, technical, organizational and administrative security measures based on the type of Personal Data and how we are processing that data. You should also help protect your data by appropriately selecting and protecting your password and/or other sign-on mechanism; limiting access to your computer or device and browser; and signing off after you have finished accessing your account. Although we work to protect the security of your account and other data that we hold in our records, please be aware that no method of transmitting data over the internet or storing data is completely secure.

Data Retention

We retain Personal Data about you for as long as necessary to provide you with our Services or to perform our business or commercial purposes for collecting your Personal Data. When establishing a retention period for specific categories of data, we consider who we collected the data from, our need for the Personal Data, why we collected the Personal Data, and the sensitivity of the Personal Data. In some cases we retain Personal Data for longer, if doing so is necessary to comply with our legal obligations, resolve disputes or collect fees owed, or is otherwise permitted or required by applicable law, rule or regulation. We may further retain information in an anonymous or aggregated form where that information would not identify you personally.

For example:

  • We retain your profile information and credentials for as long as you have an account with us.
  • We retain your device/IP data for as long as we need it to ensure that our systems are working appropriately, effectively and efficiently.

Personal Data of Children

As noted in the Terms of Use, we do not knowingly collect or solicit Personal Data from children under 18 years of age; if you are a child under the age of 18, please do not attempt to register for or otherwise use the Services or send us any Personal Data. If we learn we have collected Personal Data from a child under 18 years of age, we will delete that information as quickly as possible. If you believe that a child under 18 years of age may have provided Personal Data to us, please contact us at privacy@endor.ai. 

U.S. State Law Privacy Rights

California Resident Rights

Under California Civil Code Sections 1798.83-1798.84, California residents are entitled to contact us to prevent disclosure of Personal Data to third parties for such third parties’ direct marketing purposes; in order to submit such a request, please contact us at privacy@endor.ai. 

Your browser may offer you a “Do Not Track” option, which allows you to signal to operators of websites and web applications and services that you do not wish such operators to track certain of your online activities over time and across different websites. Our Services do not support Do Not Track requests at this time. To find out more about “Do Not Track,” you can visit www.allaboutdnt.com.

Nevada Resident Rights

If you are a resident of Nevada, you have the right to opt-out of the sale of certain Personal Data to third parties. You can exercise this right by contacting us at privacy@endor.ai with the subject line “Nevada Do Not Sell Request” and providing us with your name and the email address associated with your account. Please note that we do not currently sell your Personal Data as sales are defined in Nevada Revised Statutes Chapter 603A.

European Union and United Kingdom Data Subject Rights

EU and UK Residents

If you are a resident of the European Union (“EU”), United Kingdom (“UK”), Lichtenstein, Norway or Iceland, you may have additional rights under the EU or UK General Data Protection Regulation (the “GDPR”) with respect to your Personal Data, as outlined below.

For this section, we use the terms “Personal Data” and “processing” as they are defined in the GDPR, but “Personal Data” generally means information that can be used to individually identify a person, and “processing” generally covers actions that can be performed in connection with data such as collection, use, storage and disclosure. 

If there are any conflicts between this this section and any other provision of this Privacy Policy, the policy or portion that is more protective of Personal Data shall control to the extent of such conflict. If you have any questions about this section or whether any of the following applies to you, please contact us at privacy@endor.ai. If we are the processor of your Personal Data (i.e., not the controller), please contact the controller party in the first instance to address your rights with respect to such data. 

Personal Data We Collect

The “Categories of Personal Data We Collect” section above details the Personal Data that we collect from you.

Personal Data Use and Processing Grounds

The “Our Commercial or Business Purposes for Collecting Personal Data” section above explains how we use your Personal Data.

We will only process your Personal Data if we have a lawful basis for doing so. Lawful bases for processing include consent, contractual necessity and our “legitimate interests” or the legitimate interest of others, as further described below.

  • Contractual Necessity:  We process the following categories of Personal Data as a matter of “contractual necessity”, meaning that we need to process the data to perform under our Terms of Use with you, which enables us to provide you with the Services. When we process data due to contractual necessity, failure to provide such Personal Data will result in your inability to use some or all portions of the Services that require such data.
    • Profile and Contact Data
    • Payment Data 
    • Other Identifying Information that You Voluntarily Choose to Provide 
  • Legitimate Interest:  We process the following categories of Personal Data when we believe it furthers the legitimate interest of us or third parties:
    • Profile or Contact Data 
    • Device/IP Data 
    • Web Analytics 
    • Professional or Employment-Related Data 
    • Geolocation Data 
    • Other Identifying Information that You Voluntarily Choose to Provide 

We may also de-identify or anonymize Personal Data to further our legitimate interests. 

Examples of these legitimate interests include (as described in more detail above):

  • Providing, customizing and improving the Services.
  • Marketing the Services.
  • Corresponding with you.
  • Meeting legal requirements and enforcing legal terms.
  • Completing corporate transactions.
  • Consent:  In some cases, we process Personal Data based on the consent you expressly grant to us at the time we collect such data. When we process Personal Data based on your consent, it will be expressly indicated to you at the point and time of collection. 
  • Other Processing Grounds:  From time to time we may also need to process Personal Data to comply with a legal obligation, if it is necessary to protect the vital interests of you or other data subjects, or if it is necessary for a task carried out in the public interest.

Disclosing Personal Data

The “How We Disclose Your Personal Data” section above details how we disclose your Personal Data with third parties. 

EU, UK and Swiss Data Subject Rights

You have certain rights with respect to your Personal Data, including those set forth below. If you have any questions about these rights, or would like to submit a request, please email us at privacy@endor.ai . Please note that in some circumstances, we may not be able to fully comply with your request, such as if it is frivolous or extremely impractical, if it jeopardizes the rights of others, or if it is not required by law, but in those circumstances, we will still respond to notify you of such a decision. In some cases, we may also need you to provide us with additional information, which may include Personal Data, if necessary to verify your identity and the nature of your request.  

  • Access:  You can request more information about the Personal Data we hold about you and request a copy of such Personal Data by emailing privacy@endor.ai. 
  • Rectification:  If you believe that any Personal Data we are holding about you is incorrect or incomplete, you can request that we correct or supplement such data by emailing privacy@endor.ai. 
  • Erasure:  You can request that we erase some or all of your Personal Data from our systems.
  • Withdrawal of Consent:  If we are processing your Personal Data based on your consent (as indicated at the time of collection of such data), you have the right to withdraw your consent at any time. Please note, however, that if you exercise this right, you may have to then provide express consent on a case-by-case basis for the use or disclosure of certain of your Personal Data, if such use or disclosure is necessary to enable you to utilize some or all of our Services.
  • Portability:  You can ask for a copy of your Personal Data in a machine-readable format. You can also request that we transmit the data to another controller where technically feasible.
  • Objection:  You can contact us to let us know that you object to the further use or disclosure of your Personal Data for certain purposes, such as for direct marketing purposes.
  • Restriction of Processing:  You can ask us to restrict further processing of your Personal Data.
  • Right to File Complaint:  You have the right to lodge a complaint about the Company’s practices with respect to your Personal Data with the supervisory authority of your country or EU Member State. A list of Supervisory Authorities is available here: https://edpb.europa.eu/about-edpb/board/members_en.

Transfers of Personal Data

The Services are hosted and operated in the United States (“U.S.”) through the Company and its service providers, and if you do not reside in the U.S., laws in the U.S. may differ from the laws where you reside. By using the Services, you acknowledge that any Personal Data about you, regardless of whether provided by you or obtained from a third party, is being provided to the Company in the U.S. and will be hosted on U.S. servers, and you authorize the Company to transfer, store and process your information to and in the U.S., and possibly other countries. In some circumstances, your Personal Data may be transferred to the U.S. pursuant to a data processing agreement incorporating standard data protection clauses. 

Contact Information

If you have any questions or comments about this Privacy Policy, the ways in which we collect and use your Personal Data or your choices and rights regarding such collection and use, please do not hesitate to contact us at:

  • www.endorlabs.com 
  • privacy@endor.ai
Endor Labs logo
HomePricingContact Us
Company
AboutCareers
Login
LEARN
BlogDocumentationeBook / ReportsEventsLeanAppSecSolution BriefVideo
Tools
TEI CalculatorRisk Explorer
Why Us?
vs. Snykvs. Traditional SCAvs. Runtime SCA
Product
Products
Endor Labs Supply Chain
Endor Open Source
Endor CI/CD
Endor SBOM Hub
Use Cases
Code ScanningCode Scanning
SAST & Secret DetectionSAST & Secret Detection
AI Code GovernanceAI Code Governance
Upgrades & RemediationUpgrades & Remediation
SBOM IngestionSBOM Ingestion
AI AppsAI Apps
Bazel MonoreposBazel Monorepos
Digital Operational Resilience Act (DORA)Digital Operational Resilience Act (DORA)
PCI DSSPCI DSS
Container ScanningContainer Scanning
RSPMRSPM
GitHub ActionsGitHub Actions
CI/CD DiscoveryCI/CD Discovery
Artifact SigningArtifact Signing
Compliance & SBOMCompliance & SBOM
SCA with ReachabilitySCA with Reachability
Integrations
Microsoft Defender for CloudMicrosoft Defender for Cloud
RustRust
BitbucketBitbucket
VantaVanta
BazelBazel
GitHubGitHub
PHPPHP
SwiftSwift
ScalaScala
.NET (C#).NET (C#)
RubyRuby
TypeScriptTypeScript
JavaScriptJavaScript
PythonPython
GoGo
KotlinKotlin
JavaJava
SlackSlack
JenkinsJenkins
CircleCICircleCI
GitLabGitLab
JiraJira
IDEIDE
GitHubGitHub
© 2025 Endor Labs. All rights reserved.
Legal and PrivacyTrust and Security

All names, logos, and brands of third parties listed on our site are trademarks of their respective owners. Endor Labs and its products and services are not endorsed by, sponsored by, or affiliated with these third parties. Our use of these names, logos, and brands is for identification purposes only, and does not imply any such endorsement, sponsorship, or affiliation.

Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Article

SSDF Compliance and Attestation

Learn ways to comply with SSDF requirements for secure environments, trusted source code supply chains, code and artifact provenance, and vulnerabilities.

Click to read

Article

You Have a Shadow Pipeline Problem

Learn how to establish automated CI/CD controls to reveal what’s running in your pipelines and which configs don’t align with risk and compliance requirements.

Click to read

Article

Remediating Vulnerabilities vs. Maintaining Current Dependencies

Learn about the pros and cons of maintaining current dependencies, backed by a TU Delft study on 262 Java projects on Github

Click to read

Article

Prioritizing SCA Findings with Reachability Analysis - On-Demand Webinar

Watch this 30-minute on-demand webinar to learn how reachability analysis works.

Click to read

Article

Signing Your Artifacts For Security, Quality, and Compliance

Code Signing and other Artifact Signing enable application provenance to enhance admission control, incident response, and other essential capabilities.

Click to read

Article

Detect Malicious Packages Among Your Open Source Dependencies

Learn about emerging malicious code trends, including typosquatting and dependency confusion attacks, and two techniques for detecting malware in your applications.

Click to read

Article

Tom Gleason Joins Endor Labs as VP of Customer Solutions

Tom Gleason is a security enthusiast with a knack for building and leading technically-focused customer teams. Formerly at Snyk, Akamai, and Palo Alto Networks, Tom joins Endor Labs to lead Customer Solutions.

Click to read

Article

Introducing CI/CD Security with Endor Labs

Endor Labs CI/CD helps organizations secure their pipelines through pipeline discovery, repository security posture management, and build integrity verification (artifact signing).

Click to read

Article

How to Improve SCA in GitHub Advanced Security - Tutorial

In this short video we demonstrate how to use Endor Labs and GitHub Advanced Security to manage and prioritize open source risk.

Click to read

Article

How to Ingest and Manage SBOMs - Tutorial

In this short video we demonstrate how to ingest 1st and 3rd party software bills of material, manage them centrally, and detect new vulnerabilities in a timely manner.

Click to read

Article

VMware Achieves SBOM Compliance for Over 100 Services with Endor Labs

Learn how the VMWare compliance team built a a scalable process to collect and attest to SBOMs using Endor Labs.

Click to read

Article

AI-Supported Environment Debugging for Endor Labs

Testing and installing new security tools is painful. Using generative AI, DroidGPT by Endor Labs makes it easy to troubleshoot and even prevent compatibility errors when installing the platform.

Click to read

Article

How to Generate SBOM and VEX - Tutorial

In this short video we demonstrate how to use Endor Labs to produce SBOM and VEX documents.

Click to read

Article

How to Use AI for Open Source Selection - Tutorial

In this short video we demonstrate how to use DroidGPT to research open source packages in a conversational manner.

Click to read

Article

Introducing a Better Way to SCA for Monorepos and Bazel

Endor Labs’ reachability-based SCA now supports Bazel so you can get fully accurate results without any of the messy workarounds usually required for monorepos.

Click to read

Article

5 Types of Reachability Analysis (and Which is Right for You)

Explore the five key categories of reachability and their practical applications in AppSec and development. Learn the differences between SCA and container scanning, and understand how various tools like Function-Level Reachability, Package Baselining, and Internet Reachability play crucial roles in identifying and prioritizing security risks.

Click to read

Article

What’s in a Name? A Look at the Software Identification Ecosystem

Learn best practices for a proper software identification ecosystem that supports asset inventory, version control, vulnerability management, incident response, and more.

Click to read

Article

What You Need to Know About Apache Struts and CVE-2023-50164

Discover the critical details of CVE-2023-50164, a severe vulnerability in Apache Struts.

Click to read

Article

Introducing JavaScript Reachability and Phantom Dependency Detection

Endor Labs’ JavaScript SCA capabilities cut down noise with a program analysis approach that outperforms manifest scanning SCA tools like Snyk, Veracode, and BlackDuck.

Click to read

Article

MileIQ Securely Reimagines a Decade Old Product with Endor Labs

Lean MileIQ, the #1 mileage tracking app, selected Endor Labs to help their security and engineering teams focus on the software supply chain risks that actually matter.

Click to read

Article

How CycloneDX VEX Makes Your SBOM Useful

Explore the challenges of modern vulnerability management and the efficiency of the Vulnerability Exploitability eXchange (VEX) in our latest blog post. Learn how VEX helps identify and communicate the true exploitability of vulnerabilities, streamlining cybersecurity efforts in the face of overwhelming scanner findings.

Click to read

Article

How to Scan and Prioritize Valid Secrets - Tutorial

In this short video we demonstrate how to use Endor Labs to discover if your organization has leaked valid secrets and provide developers with instructions for resolving the leak.

Click to read

Article

SBOM Requirements for Medical Devices

Learn about the 2023 FDA rule for medical devices, including requirements for SBOMs, a mitigation plan, and secure software development practices.

Click to read

Article

CISA and NCSC's Take on Secure AI Development

A breakdown of the "Guidelines for Secure AI System Development document from CISA and NCSC.

Click to read

Article

Open Source Security 101: How to Evaluate Your Open Source Security Posture

Organizations need to evolve their approach to using open source securely. Find four fundamental considerations to consider when it comes to securely using OSS.

Click to read

Article

Endor Labs is a CRN 2023 Stellar Startup!

CRN®, a brand of The Channel Company, has named Endor Labs to its 2023 Stellar Startups list in the Security category. Learn more about the list and us here.

Click to read

Article

How to Prioritize Reachable Open Source Software (OSS) Vulnerabilities - Tutorial

In this short video we demonstrate how to use Endor Labs for reachability-based SCA and noise reduction.

Click to read

Article

Open Source Security for Python and AI Apps

Gain visibility into your hidden Python dependencies and prioritize reachable, exploitable risks.

Click to read

Article

How To Evaluate Secret Detection Tools

An overview of 3 requirements for a secret detection program, and how to do it with Endor Labs.

Click to read

Article

Why SCA Tools Can't Agree if Something is a CVE

One scanner says this is a CVE, and the other says it's not. Which is right?

Click to read

Article

5 Federal Software Supply Chain Requirements You Should Be Aware Of

If you’ve been watching the software supply chain security space evolve, you likely know that a lot of the momentum and effort is coming out of the U.S. Federal government. This may seem surprising at first, but it shouldn’t be, when you account for the fact that the Federal government is one of the single largest procurers of technology and software in the world. 

Click to read

Article

You Found Vulnerabilities in Your Dependencies, Now What?

Third-party open source dependencies offer convenience but also pose a significant security risk. Learn how tools like Endor Labs can detect & address vulnerabilities here.

Click to read

Article

Dependency Resolution in Python: Beware The Phantom Dependency

Phantom dependencies are dependencies used by your code that are not declared in the manifest. If you miss them, they can sneak reachable risks into your application, lead to false positives, or inaccurate SBOMs. All very spooky. This article breaks down how phantom dependencies happen, and how to catch them.

Click to read

Article

Chris Hughes Joins Endor Labs as Chief Security Advisor

Chris Hughes brings nearly 20 years of IT and cybersecurity experience to his role as Chief Security Advisor. Learn what made him choose Endor Labs.

Click to read

Article

Understanding Python Manifest Files

In this blog, we delve into the various Python manifest files used to declare dependencies and how they collaborate seamlessly.

Click to read

Article

Why Your SCA is Always Wrong

A breakdown of why your SCA results are always so full of false positives (and sometimes false negatives), and why treating source code as a first class citizen can lead us to the solution.

Click to read

Article

Endor Labs Named 2023 SINET16 Innovator Award Winner

SINET, an organization with the mission to accelerate Cybersecurity innovation through public-private partnerships, announced today that Endor Labs is one of the winners of its annual SINET16 Innovator Award. Endor Labs and 15 other emerging companies are identified as the most innovative and compelling technologies in their fields to address Cybersecurity threats and vulnerabilities.

Click to read

Article

Combining EPSS and Reachability Analysis to Optimize Vulnerability Management

Exploit Prediction Scoring Systems (EPSS) is a data set that helps you understand the likelihood that a CVE will be exploited. Learn what the EPSS includes and how to use it to prioritize vulnerability remediation.

Click to read

Article

Reachability Analysis for Python, Go, C# - Webinar

In this on-demand webinar, get an in-depth reachability analysis for Python, Go, and C#. Watch now.

Click to read

Article

Introducing Reachability-Based SCA for Python, Go, and C#

Announcing new language support for Endor Labs Open Source

Click to read

Article

The Open Source Security Index Top 5

What’s the best of the best when it comes to open source security tools?We’ve previously talked about the OpenSSF Scorecard, which gives developers a high-level snapshot of the security of any given open source project. But in this post, we’ll talk about a related project, the Open Source Security Index (OSSI), which does something slightly different and complementary.

Click to read

Article

Faster SCA with Endor Labs and npm Workspaces

As projects grow larger and more complex, developers face challenges in maintaining a clean and efficient development workflow. Fortunately, npm workspaces offer an essential solution to streamline JavaScript development. In this blog post, we will explore the concept of npm/yarn workspaces, its importance, and how Endor Labs works with them.

Click to read

Article

Key Questions for Your SBOM Program

All the questions (and some of the answers) you need before kicking off your SBOM program.

Click to read

Article

Endor Labs & Github Advanced Security: AppSec Without The Productivity Tax

Endor Labs integrates with GitHub Advanced Security to enable developers to easily view and remediate SCA alerts without ever needing to leave GitHub.

Click to read

Article

Endor Labs Raises $70M in Series A Funding to Reform Application Security

Endor Labs raises a total of $70M to achieve application security without the developer productivity tax. Here's what we're doing, and where we're going.

Click to read

Article

How Should I Prioritize Software Vulnerabilities?

CVSS, KEV, SVCC, EPSS, and reachability analysis are 5 method used to prioritize open source vulnerabilities for remediation. Do you need all 5? Which is the best? It turns out a combination of factors (and a tool that can bring it all together) is the best solution.

Click to read

Article

Divide and Hide: How Malicious Code Lived on PyPI for 3 months

The Station 9 research team discovered malicious code that was divided and distributed across different packages, remaining obfuscated for months while getting nearly 2000 downloads.

Click to read

Article

Endor Labs’ ‘State of Dependency Management 2023’ Report Offers Insight on Explosive Popularity of AI and LLMs—and How They Impact Application Security

The State of Dependency Management 2023 reports on the latest research on dependency management and how AI is impacting the application security landscape.

Click to read

Article

State of Dependency Management 2023

Emerging trends impacting open source dependency management

Click to read

Article

Endor Labs Recognized as a Cool Vendor in the 2023 Gartner® Cool Vendors™ in Platform Engineering for Scaling Application Security Practices

Endor Labs is committed to providing cutting-edge solutions that address the challenges faced by platform engineering and DevSecOps teams in meeting application security needs.

Click to read

Article

Visualizing the Impact of Call Graphs on Open Source Security

A call graph is a visualization of invocation of vulnerable open source methods by a given client. Learn how to use call graphs to understand relevancy and impact of vulnerabilities.

Click to read

Article

Why Different SCA Tools Produce Different Results

Like anything in computer science and programming, there’s more than one way to solve a problem or get a result. SCA (software composition analysis) is no different.

Click to read

Article

Strengthening Security in .NET Development with packages.lock.json

Learn how packages.lock.json can help maintain a secure .NET development and why it should be part of your development workflow.

Click to read

Article

Highlights from State of Dependency Management 2022 - Webinar

In this on-demand webinar we discuss the key research findings from our 2022 report "State of Dependency Management."

Click to read

Article

How Security and Engineering Can Scale Open Source Security - Webinar

In this on-demand video we discuss open source dependency management and considerations for implementing AppSec programs to protect OSS.

Click to read

Article

Endor Labs is SOC 2 Type II Certified!

Proving once again open source governance doesn’t have to SOC, yes I made that joke again and I’m not sorry. We’re excited to announce we have received a clean audit result on our SOC2 Type II certification.

Click to read

Article

Reviewing Malware with LLMs: OpenAI vs. Vertex AI

At Endor Labs, we continue evaluating the use of large language models (LLMs) for all kinds of use-cases related to application security. And we continue to be amazed about high-quality responses … until we’re amused about the next laughably wrong answer.

Click to read

Article

Endor Labs Wins Intellyx Digital Innovation Award

We've been named a winner of the 2023 Intellyx Digital Innovator Award, recognizing technology providers driving enterprise digital transformation. Learn more.

Click to read

Article

Endor Labs Recognized As a 2023 Bay Area Best Place to Work

I mean, who wouldn't want to work with a bunch of Ewoks?

Click to read

Article

Make Developers' Lives Easier with Endor Labs & GitHub Advanced Security

Developers are bombarded with information every day. Constant context switching and information overload are among the biggest barriers to productivity. There are simply too many demands for their attention. One day the sales team will understand. Right?

Click to read

Article

LLM-assisted Malware Review: AI and Humans Join Forces to Combat Malware

Experiments with GPT-3.5 suggest that LLM-based malware reviews can complement, but not yet substitute human reviews. 1800 binary classifications performed with GPT-3.5 included false-positives and false-negatives.

Click to read

Article

Endor Labs Selected as Finalist for RSA Conference 2023 Innovation Sandbox

Endor Labs recognized for innovation in helping enterprises manage open source risk.

Click to read

Article

Announcing the Endor Labs Hyperdrive Program for Resellers and Solution Providers

The Hyperdrive partner program enables organizations of all sizes to embrace open source software with confidence.

Click to read

Article

Endor Labs partners with Zinfinity to help enterprise safely adopt Open Source Software

We’re excited to announce our latest partnership with Zinfinity as a strategic partner. Zinfinity is a global provider of technology solutions and services with a focus on Cyber Security, Cloud and Digital Infrastructure.

Click to read

Article

OWASP Top 10 Risks for Open Source

Emerging trends impacting open source dependency management

Click to read

Article

How to Quickly Measure SBOM Accuracy for Maven Projects (for Free)

SBOM-Lab is an open source tool that lets you quickly compare SBOM generation methods for Maven projects and find the right one for you.

Click to read

Article

Endor Labs is SOC2 Certified!

Open Source security doesn't have to SOC (sorry, I had to). We're excited to announce we have received a clean audit result on our SOC2 Type 1 certification.

Click to read

Article

Introduction to Open Source Security - Webinar

In this on-demand webinar we help you understand the basics of dependency management and how they can be vulnerable to security risks.

Click to read

Article

Comparing SBOMs Generated at Different Lifecycle Stages - Webinar

In this on-demand webinar, we share research on the variation in SBOMs depending on tool and when the documents are generated.

Click to read

Article

SBOM vs. SBOM: Comparing SBOMs from Different Tools and Lifecycle Stages

Software vendors active in certain verticals will soon be required to provide customers with SBOMs for their products. But how and when should an SBOM for a given piece of software be produced?

Click to read

Article

What Breaking Changes Teach Us about Security

GitHub rolled out a release that had some breaking changes to Git. Here's what we learned from it.

Click to read

Article

Open Source Licensing Simplified: A Comparative Overview of Popular Licenses

Explore the different types of open source licenses and how they impact the use, modification, and distribution of open source software. From GPL to Apache, MIT and more, learn the key differences between permissive and restrictive licenses and how to choose the right one for your project.

Click to read

Article

What is VEX and Why Should I Care?

An SBOM without VEX is like peanut butter without jelly. SBOM is a top buzzword in cybersecurity, but it's important to understand why VEX (Vulnerability Exploitability eXchange) is such a critical companion document.

Click to read

Article

Whatfuscator, Malicious Open Source Packages, and Other Beasts

Join Henrik to learn how his journey into Go programming turned into a path of malicious OSS packages.

Click to read

Article

Exploring Risk: Understanding Software Supply Chain Attacks

Naming and understanding the attack vectors at the disposal of our adversaries.

Click to read

Article

Endor Labs and Intuitive Partner to Help Enterprises Leverage OSS

Endor Labs and Intuitive.Cloud announce strategic partnership and investment with the goal of taking on OSS sprawl.

Click to read

Article

What is Reachability-Based Dependency Analysis?

Reachability analysis increases reliability of SCA results, allowing teams to quickly prioritize just the risks that matter.

Click to read

Article

State of Dependency Management 2022

In their inaugural report, the Station 9 research team explores the complexities of open source dependencies and the top security considerations for open source adoption at the enterprise.

Click to read

Article

Why We Need Static Analysis When Prioritizing Vulnerabilities - Webinar

In this on-demand webinar, we explain the role of static analysis of open source dependencies in an application security program.

Click to read

Article

What are Maven Dependency Scopes and Their Related Security Risks?

This article explores Maven dependency scopes: What are they, what are they used for, and how do they impact security risks?

Click to read

Article

The Government's Role in Maintaining Open Source Security

This blog summarizes highlights from Tragedy of the Digital Commons, by Strauss Center scholar and lecturer Chinmayi Sharma, where she shares the OSS state of affairs and her thoughts on improving security.

Click to read

Article

Introduction to Program Analysis

Program analysis is the process of checking whether or not a piece of software fulfills certain properties. This article explores the basics of program analysis, so we could then dive deeper into the world of call graphs.

Click to read

Article

More Than 30 Industry-Leading CISOs Personally Invest in Endor Labs

After a comprehensive diligence process on startups in the supply chain and open source security space, over 30 CISOs have chosen to personally back Endor Labs.

Click to read

Article

From Cloud Security to Code Security: Why We've Raised $25M to Take on OSS Dependency Sprawl

Endor Labs raises $25M seed round.

Click to read

Article

Endor Labs Launches with $25M Seed Financing to Tackle Massive Sprawl of Open Source Software (OSS)

Solution from category-defining entrepreneurs and world-renowned experts helps developers spend less time dealing with security issues, more time accelerating their development through safe code reuse.

Click to read

Article

SBOMs are Just a Means to an End

Do you know what goes into the software your company consumes? If your answer was sticky tape and glue, you clearly work in technology. Congratulations, this article is for you.

Click to read

Article

Introducing the OpenSSF Scorecard API

The Scorecard API makes it easier to automate and enforce your dependency policies. Naveen is one of the key contributors to the Scorecard projects, in this article, he walks through how it works!

Click to read

Article

How to Get the Most out of GitHub API Rate Limits

Thinking about using Github's REST API within your system, or already doing so? If you have not already encountered this concept, one important thing to keep in mind while developing is Github's concept of rate limiting.

Click to read

Article

Why I Joined Endor Labs to Build our India Team

Sriram Subramanian recently left his position as VP of Engineering at Citrix to lead the India R&D center at Endor Labs. We asked him what made him take the leap and what's his vision for the India team.

Click to read

Article

How Zero Trust Principles Can Accelerate Enterprise Adoption of OSS

Learn how Zero Trust principles help OSS adoption

Click to read

Article

What Security Teams Need to Know about Software Development

Learn how to begin threat models and make more informed risk management decisions regarding their software development practices.

Click to read

Article

CSRB Log4j Report - The Response is as Dangerous as the Vulnerability

The recent report from the CSRB gives a step by step account of Log4j, from discovery to remediation, and uncovers a painful insight - sometimes the response is just as dangerous as the vulnerability.

Click to read

Article

Polyrepo vs. Monorepo - How Does it Impact Dependency Management?

In this article, we explore the impact of using a monorepo vs a polyrepo architecture on dependency management.

Click to read

Previous
Event

Lightsaber Stunt Training Series - North America

Lightsaber Stunt Training Series - North America

Click to view

Event

Lightsaber Stunt Training Series - Europe

Lightsaber Stunt Training Series - Europe

Click to view

Event

AppSec Brews and Rooftop Views Social

BBQ & Bytes: AppSec Social Copenhagen

Click to view

Event

OWASP Global AppSec EU 2025

OWASP Global AppSec EU 2025

Click to view

Event

OWASP Washington, D.C. Meetup

OWASP Washington, D.C. Meetup Evolving Your AppSec Program in the Era of AI

Click to view

Event

The Crossroad of Agentic AI and Security: Chicago Edition

The Crossroad of Agentic AI and Security: Chicago Edition

Click to view

Event

FS-ISAC EMEA Summit

FS-ISAC EMEA Summit

Click to view

Event

Cloud & AI Security Azure Immersion Day

Join us at Cloud & AI Security Azure Immersion Day!

Click to view

Event

OWASP London Meetup

OWASP London Meetup

Click to view

Event

OWASP Vancouver Meetup

OWASP Vancouver Meetup

Click to view

Event

BBQ & Bytes: AppSec Social Copenhagen

BBQ & Bytes: AppSec Social Copenhagen

Click to view

Event

V2 Security Copenhagen

V2 Security Copenhagen

Click to view

Event

Birds of a Feather [Women's Only Event]

Click to view

Event

CISO Sanctuary Breakfast hosted by Hitch Partners

Click to view

Event

Bricks, Blocks, and Big Ideas: A LEGO Workshop with Tyler Clites

Click to view

Event

Request your VIP pass to the Endor Labs' Base at RSAC

Click to view

Event

CSA Summit 2025

CSA Summit 2025: Transformation: Ushering in the Next Generation of Cybersecurity.

Click to view

Event

AI vs. AI: Securing Software in the Era of AI-Generated Code

AI vs. AI: Securing Software in the Era of AI-Generated Code

Click to view

Event

RSAC 2025

Click to view

Event

AppSec Workshop: Fix Faster

AppSec Workshop: Fix Faster

Click to view

Event

Vibe Coding is Mid for Security

Learn what securing AI-generated code actually looks like. Endor Labs CTO Dimitri Stiliadis will do some vibe coding of his own, and then scan and fix vulnerabilities live.

Click to view

Event

Cybersecurity Identity Summit 2025

Cybersecurity Identity Summit

Click to view

Event

BSides Seattle

BSides Seattle

Click to view

Event

KCJUG Meetup

KCJUG Meetup

Click to view

Event

OWASP Antonio Meetup

OWASP Antonio Meetup AI for AppSec - A discussion of AppSec Best Practices

Click to view

Event

Innovate Cybersecurity Summit - Nashville

Innovate Cybersecurity Summit - Nashville

Click to view

Event

AppSec AI Summit

AppSec AI Summit

Click to view

Event

OWASP Bristol: Stormy Seas of Supply Chain Security

OWASP Bristol: Stormy Seas of Supply Chain Security

Click to view

Event

NCAA March Madness

NCAA March Madness

Click to view

Event

OWASP Vancouver

OWASP Vancouver

Click to view

Event

Boston Security March 2025 Meetup

Boston Security March 2025 Meetup

Click to view

Event

GPSec Security Forum Boston

GPSec Security Forum Boston

Click to view

Event

InfoSec Anti-Summit

InfoSec Anti-Summit

Click to view

Event

SANS Institute Cyber Solutions Fest

SANS Institute Cyber Solutions Fest

Click to view

Event

SnowFROC

SnowFROC

Click to view

Event

DevOps Live London

DevOps Live London

Click to view

Event

FS-ISAC Spring Americas Summit

FS-ISAC Spring Americas Summit

Click to view

Event

Lightsaber Stunt Training for AppSec Nerds

Meet other AppSec practitioners, learn some stage combat lightsaber moves from a legit stunt choreographer, and enjoy snacks and drinks on us.

Click to view

Event

Software Supply Chain (SSC) Security & Craft Beer

Software Supply Chain (SSC) Security & Craft Beer

Click to view

Event

Innovate Peer Panel - Atlanta

Innovate Peer Panel - Atlanta

Click to view

Event

GuidePoint Security CKO

GuidePoint Security CKO

Click to view

Event

Chicago Java Users Group Meetup

Chicago Java Users Group Meetup

Click to view

Event

NDC Security

NDC Security

Click to view

Event

Lightsaber Stunt Training for AppSec Nerds

Meet other AppSec practitioners, learn some stage combat lightsaber moves from a legit stunt choreographer, and enjoy snacks and drinks on us.

Click to view

Event

Black Hat Europe 2024

Black Hat Europe 2024

Click to view

Event

OWASP Birmingham December Meeting

OWASP Birmingham

Click to view

Event

OWASP BeNeLux Days

OWASP BeNeLux Days

Click to view

Event

C-Vision National CIO & CISO Summit

C-Vision National CIO & CISO Summit

Click to view

Event

GitHub Universe

GitHub Universe

Click to view

Event

FS-ISAC Fall Americas Summit 2024

Register Today!

Click to view

Event

LASCON 2024

Register Today!

Click to view

Event

OWASP New York Meetup

OWASP NY Meetup

Click to view

Event

SINET New York 2024

SINET New York 2024

Click to view

Event

Lightsaber Stage Combat Training for AppSec Nerds - New York

Lightsaber Stage Combat Training for AppSec Nerds - New York

Click to view

Event

CISO XC

CISO XC

Click to view

Event

Innovate Cybersecurity Summit, Scottsdale

Innovate Cybersecurity Summit, Scottsdale

Click to view

Event

Information Warfare Summit

Information Warfare Summit

Click to view

Event

OWASP MSP October Meetup

OWASP MSP October Meetup

Click to view

Event

OWASP 2024 Global AppSec, SF

Meet Endor Labs at OWASP Global AppSec SF

Click to view

Event

Dependency Management Report 2024

The Dependency Management Report explores emerging OSS dependency trends to consider as part of an SDLC security strategy.

Click to view

Event

Nordic Software Security Summit

Request a Meeting

Click to view

Event

Bay Area Bazel Meet-up

Bay Area Bazel Meet-up

Click to view

Event

OWASP Tampa Chapter 2024 Q3 Lunch and Learn

OWASP Tampa Chapter 2024 Q3 Lunch and Learn

Click to view

Event

Mastering OSS Security: Validating Vulnerabilities with Code-Level Reachability Analysis

Join this 45-minute webinar to learn how to prioritize OSS vulnerabilities using code-level reachability analysis, call graphs, and other parameters for effective vulnerability management

Click to view

Event

Give Devs the Confidence to Fix: Making Remediation Less Painful

Join this 60-minute webinar to learn how you can reduce the research required to understand the impact of dependency upgrades.

Click to view

Event

Black Hat - Las Vegas, USA 2024

Meet Endor Labs at Black Hat - Las Vegas, USA 2024

Click to view

Event

CSA San Francisco July Chapter Meetup

CSA - San Francisco Chapter Meetup

Click to view

Event

What's a Security Pipeline?

Join this 30-minute webinar to learn about common patterns and tradeoffs for security pipelines.

Click to view

Event

Happy Hour at OWASP Global 2024 AppSec

Endor Labs Happy Hour at OWASP Global 2024 AppSec

Click to view

Event

OWASP - LA Monthly Meet-up In-Person, June 2024

Meet Endor Labs at OWASP - Los Angeles, Monthly Meet-up

Click to view

Event

Meet Endor Labs at Evanta New York CISO Executive Summit

Register today!

Click to view

Event

OWASP 2024 Global AppSec, Lisbon 2024

Meet Endor Labs at OWASP Global AppSec Lisbon

Click to view

Event

London Java Community Summer Unconference 2024

Schedule a Meeting

Click to view

Event

OWASP Amsterdam, Netherlands - June 2024 Chapter Meetup

Join us for a conversation on harnessing reachability analysis to discern real threats.

Click to view

Event

Managing Open Source Vulnerabilities for PCI DSS Compliance

Click to view

Event

OWASP AppSec Days Pacific Northwest Conference - 2024

Register Today!

Click to view

Event

Engineering Leader Mixer

An interactive event for engineering leaders to network and get ideas for how to ship secure code

Click to view

Event

OWASP Porto, Portugal - May 2024 Chapter Meetup

Join us for a conversation on harnessing reachability analysis to discern real threats.

Click to view

Event

OWASP Lisboa - May 2024 Chapter Meetup

Join us for a conversation on harnessing reachability analysis to discern real threats.

Click to view

Event

Security Executive Round Table & Dinner in Hartford

Join us at a restaurant in Hartford, CT for executive round table and dinner

Click to view

Event

GuidePoint Security Cup at Geneva National Resort 2024

Register today!

Click to view

Event

Software Supply Chain Summit: Bridging Theory and Practice

Register today!

Click to view

Event

Meet Endor Labs at FS-ISAC EMEA

Register today!

Click to view

Event

PyCon US 2024

We will be at the PyCon Main Conference from May 17 to May 19

Click to view

Event

OWASP Northern Virginia - May 2024 Chapter Meetup

Join us for a conversation on managing open source vulnerabilities for PCI DSS compliance.

Click to view

Event

OWASP Portland - May 2024 Chapter Meetup

Join us for a conversation on managing open source vulnerabilities for PCI DSS compliance.

Click to view

Event

Intro to Endor Labs

Learn how Endor Labs supports a software supply chain security program, from OSS code to pipelines to compliance.

Click to view

Event

Join Endor Labs and GitHub for a Directors' Breakfast at RSA

Please join Endor Labs & GitHub on May 7th for an interactive executive breakfast focused on navigating the software supply chain security landscape without taxing developers.

Click to view

Event

Join Endor Labs and GitHub for an Executive Breakfast at RSA

Please join Endor Labs & GitHub on May 7th for an interactive executive breakfast focused on navigating the software supply chain security landscape without taxing developers.

Click to view

Event

Escape the RSA Chaos with Endor Labs and GitHub at the AppSec Lounge

Join Endor Labs and GitHub to refuel and refresh at TRACE before heading back to the Moscone Center to enjoy RSAC.

Click to view

Event

Meet Endor Labs at Day of Shecurity

Register today!

Click to view

Event

ISC2 Worcester 2024 | What's in Your AI Code

Join us as we speak about 'What's in your AI code?' at ISC2 Chapter Eastern Massachusetts

Click to view

Event

2nd Annual NFL Draft Party

Register for a great tech talk featuring Karthik Swarnam (ArmorCode), Karl Mattson (Noname Security) & Chris Hughes (Endor Labs) to discuss current trends in application security & vulnerability management.

Click to view

Event

Supply Chain Cyber Security Summit 2024

Join us for the Panel Discussion on Boosting Software Supply Chain Maturity to the Next Level with SBOM

Click to view

Event

Let's Taco 'bout Cyber

Join us at Barrio in Chicago for networking, gourmet tacos, and a discussion on how CISOs respond to securing AI initiatives.

Click to view

Event

Meet Endor Labs at Devnexus 2024

Join us at Devnexus, a largest Java Ecosystem Conference as we uncover the open source security for Java apps.

Click to view

Event

Artifact Signing 101

Join Endor Labs for a webinar on how to use artifact signing to enable code traceability, admission control, and provenance. Register now.

Click to view

Event

Meet Endor Labs at SnowFroc

Click to view

Event

Prioritizing SCA Findings with Reachability Analysis

Join Endor Labs for a webinar on how reachability analysis can reduce SCA noise by 80%+. Register now.

Click to view

Event

Meet Endor Labs at FS-ISAC America's Spring Summit

RSVP today!

Click to view

Product

Endor Open Source

Automate OSS selection and approval, identify applicable risks, reduce SCA noise by 92%, and remediate issues faster.

Click to view

Product

Endor SBOM Hub

Centralize your SBOM management with Endor SBOM Hub, featuring comprehensive risk analysis and continuous monitoring capabilities.

Click to view

Product

Endor CI/CD

Optimize your CI/CD pipelines with Endor Labs for superior code security, complete build integrity verification, and robust repository protection.

Click to view

Use case

Code Scanning

Endor Labs brings together Reachability-Based SCA, SAST, Secrets, CI/CD, and Container Scanning in a single, remediation-focused platform. Go beyond detection—correlating findings across scanners and cutting through the noise with reachability and deep program analysis.

Click to read

Use case

SAST & Secret Detection

Consolidate SAST, SCA, Container Scanning, and Secret Detection into a single platform with Endor Labs.

Click to read

Use case

AI Code Governance

Evaluate open source packages and AI Models for security, popularity, quality and activity.

Click to read

Use case

SCA with Reachability

Target the most critical vulnerabilities in your OSS packages for better code health and security.

Click to read

Use case

Container Scanning

Reduce noise by consolidating SCA and containers.

Click to read

Use case

Compliance & SBOM

Centrally manage SBOMs and VEX for compliance, including legal and licensing integrity.

Click to read

Use case

Upgrades & Remediation

Fix what’s easy, and magically patch hard-to-upgrade packages

Click to read

Use case

Artifact Signing

Enable application provenance for admission control, incident response, and compliance.

Click to read

Use case

AI Apps

SCA for Python-based AI applications

Click to read

Use case

Bazel Monorepos

SCA for Bazel including native Bazel rules for Java, Python, and Golang.

Click to read

Use case

Digital Operational Resilience Act (DORA)

Achieve DORA compliance for managing open source software vulnerabilities.

Click to read

Use case

PCI DSS

Achieve PCI DSS v4 compliance for managing open source software vulnerabilities.

Click to read

Use case

SBOM Ingestion

A one-stop-shop to store, manage, and analyze SBOMs with continuous risk monitoring.

Click to read

Use case

RSPM

Enforce source code best practices with Repository Security Posture Management.

Click to read

Use case

GitHub Actions

Prevent pipeline attacks caused by vulnerabilities and malware in CI workflows.

Click to read

Use case

CI/CD Discovery

Establish automated controls to reveal what’s running in your pipelines.

Click to read

Sorry, we couldn't find what you're looking for.
View All Results