Platform
Shift Left AppSec Platform
Learn More
Code Scanning

Unify security scanners in one platform that cuts through noise.

Remediation

Fix what’s easy, patch what's hard, and avoid breaking changes.

AI Code Security

Prepare for AI adoption and increase AppSec productivity.

Ecosystem
Languages & Integrations
Microsoft Defender for Cloud
GitHub Advanced Security
Use Cases
Reachability & Remediation Based SCA
AI Security Code Review
OSS Security Patches
CI/CD Security
SAST & Secrets
Container Scanning
AI Governance
SBOM & VEX
Learn
Blog
Documentation
Events
LeanAppSec
Learn by Topic
AI/ML
CI/CD Security
Compliance & SBOM
Developer Productivity
First Party Code
Open Source
SCA
Learn by Category
See All
Blog
Customer Story
Ebook / Report
Events
Solution Brief
Video
Featured resources
View All
Artifact Signing
SCA for Bazel
SCA for Python and AI Apps
Tools
TEI Calculator
Risk Explorer
Company
About
Careers
News
Partners
Achievements
SOC 2
$93M Series B
Gartner Cool Vendor
CRN Stellar Startup
Intellyx Digital Innovation Award
Recent resources
View All
Endor Labs & Oligo: Closing the Loop Between Secure Code and Secure Runtime
Struggling to Patch Spring-Web? Try This Instead
Under the Hood: People.ai's Proactive Approach to AI Security
LeanAppSec
LeanAppSec
Pricing
Docs
Login
Book a Demo
Book Demo

Endor Labs Product Terms of Use

Last updated on
February 16, 2024
Title goes here

Endor Labs Product Terms of Use

Last updated on
February 16, 2024
Enter your email to be notified of changes to this list.

These Terms and Conditions (the “Terms”) govern your access to and use of the internet-based services offered by Endor Labs Inc. (the “Company”) at and through the website https://www.endorlabs.com/ or as otherwise made available by the Company (the “SaaS Services”).  PLEASE READ THESE TERMS CAREFULLY.  THIS IS A LEGAL AGREEMENT BETWEEN YOU (THE “CUSTOMER” or “YOU”) AND THE COMPANY WHICH GOVERNS YOUR USE OF THE SAAS SERVICES.  IF YOU ARE ENTERING INTO THIS AGREEMENT ON BEHALF OF A COMPANY OR OTHER LEGAL ENTITY, YOU REPRESENT THAT YOU HAVE THE AUTHORITY TO BIND SUCH ENTITY AND ITS AFFILIATES TO THESE TERMS AND CONDITIONS, IN WHICH CASE THE TERMS “YOU” AND "CUSTOMER" SHALL REFER TO SUCH ENTITY AND ITS AFFILIATES. IF YOU DO NOT HAVE SUCH AUTHORITY, OR IF YOU DO NOT AGREE WITH THESE TERMS AND CONDITIONS, YOU MUST NOT ACCEPT THIS AGREEMENT AND MAY NOT USE THE SAAS SERVICES.  YOUR USE OF THE SAAS SERVICES, OR YOUR AGREEING TO ANY WRITTEN OR ELECTRONIC DOCUMENT ACCEPTED BY THE COMPANY FOR THE PURCHASE OR USE OF THE SAAS SERVICES  REFERENCING THESE TERMS (AN “ORDER FORM”), CONSTITUTES YOUR ACCEPTANCE OF AND AGREEMENT TO THESE TERMS TO THE EXCLUSION OF ALL OTHER TERMS.  IF THE TERMS OF THIS AGREEMENT ARE CONSIDERED AN OFFER, ACCEPTANCE IS EXPRESSLY LIMITED TO SUCH TERMS.

‍

1. SAAS Services; Support; License

1.1 SaaS Services. Subject to the terms of this Agreement, Company will use commercially reasonable efforts to provide Customer the SaaS Services. As part of the registration process, Customer will identify at least one administrative username and password for Customer’s Company account. Company reserves the right to refuse registration of or cancel passwords it deems inappropriate.

1.2 Support. Subject to the terms hereof, Company will provide Customer with the SaaS Services and reasonable technical support services during the Company’s standard business hours and adhere to the service and support obligations set forth in the Service Level Agreement found at https://www.endorlabs.com/sla, which are incorporated into this Agreement by reference.

1.3 License Grant. To the extent the Company delivers to Customer any software, documentation or data related to the SaaS Services (“Software”), the Company grants to Customer a nonexclusive, irrevocable, worldwide right and license, during the Term, to access, install, if necessary, use, execute, store, perform and display such Software and its documentation required to permit Customer to make full and proper use of the SaaS Solution.

‍1.4 Free Trial. During any free trial period (as specified on an Order Form), Customer may access and use the SaaS Services provided by the Company solely for Customer’s internal evaluation purposes, subject to the terms and conditions set forth herein. The free trial shall commence upon the activation of the Customer's account and shall continue for the duration specified by the Company (including on the Order Form). Upon expiration of the free trial period, unless otherwise agreed upon by the parties, Customer's access to the SaaS Services will be terminated unless Customer and Company enter into an Order Form to subscribe to a paid plan. Notwithstanding anything else, the Company reserves the right to modify or terminate the free trial at any time without prior notice.  Company’s obligations under Section 1.2, the first sentence of Section 2.1, and Section 3.1 of this Agreement will not apply during any free trial period. 

‍

2. Restrictions and Responsibilities

2.1 General Restrictions. Customer shall use commercially reasonable efforts to prevent unauthorized access to or use of the SaaS Services and notify Company promptly of any such unauthorized access or use. Customer shall not, directly or indirectly: reverse engineer, decompile, disassemble or otherwise attempt to discover the source code, object code or underlying structure, ideas, know-how or algorithms relevant to the SaaS Services or any Software (except to the extent such restriction is prohibited by applicable law); modify, translate, or create derivative works based on the SaaS Services or any Software (except to the extent expressly permitted by Company or authorized within the SaaS Services); use the SaaS Services or any Software for timesharing or service bureau purposes or otherwise for the benefit of a third party; or remove any proprietary notices or labels. Customer shall not (a) sell, resell, rent or lease the SaaS Services or any Services Data (as defined below), (b) modify, make derivative works of, disassemble, reverse compile, reverse engineer, or subvert the intrinsic security of any part of the SaaS Services or Services Data for any purpose including without limitation discovering individual Customer Data or re-identifying anonymous data, (c) use the SaaS Services to store or transmit infringing, libelous, or otherwise unlawful or tortious material, or to store or transmit material in violation of third-party privacy rights, (d) use the SaaS Services to store or transmit viruses, worms, time bombs, Trojan horses and other harmful or malicious code, files, scripts, agents or programs, (e) interfere with or disrupt the integrity or performance of the SaaS Services or third-party data contained therein, (f) access or use the SaaS Services in order to build a similar or competitive product or SaaS Services, (g) disclose any review, benchmarking or comparative study of the SaaS Services or Services Data to any third party without Company’s prior written approval, (h) post, transmit, link to, or otherwise distribute any inappropriate, profane, defamatory, obscene, indecent or unlawful material or information, or (i) attempt to gain unauthorized access to the SaaS Services or Services Data or their related systems or networks. Except as expressly stated herein, no part of the SaaS Services or Services Data may be copied, reproduced, distributed, republished, downloaded, displayed, posted or transmitted in any form or by any means to, including but not limited to electronic, mechanical, photocopying, recording, or other means. Customer shall make every reasonable effort to prevent unauthorized third parties from accessing the SaaS Services and Services Data and notify Company promptly of any such unauthorized access or use. Customer shall not use any information obtained from the SaaS Services (including without limitation Company’s vulnerability database, including but not limited to security vulnerabilities and associated proprietary information) (“Services Data”), for the purpose of creating, developing, enhancing, or improving any products, services, or offerings of its own or those of any third party, without the express written consent of the Company. As between the parties, Company retains all right, title and interest in and to the Services Data, and no right or license to the Services Data is granted to Customer except as expressly provided herein.  Any unauthorized use or disclosure of Services Data is strictly prohibited and may result in immediate termination of access to the SaaS Services and pursuit of legal remedies by the Company. All restrictions and obligations of Customer herein relating to SaaS Services shall also apply to the Services Data.

2.2 Compliance with Applicable Laws. Customer represents, covenants, and warrants that Customer will use the SaaS Services only in compliance with applicable laws and regulations. Customer hereby agrees to indemnify and hold harmless Company against any damages, losses, liabilities, settlements and expenses (including without limitation costs and attorneys’ fees) in connection with any claim or action that arises from an alleged violation of this Section 2 or otherwise from Customer’s use of SaaS Services. Although Company has no obligation to monitor Customer’s use of the SaaS Services, Company may do so and may prohibit any use of the SaaS Services it believes may be (or alleged to be) in violation of this Section 2.‍

2.3 Third Party Equipment. Customer shall be responsible for obtaining and maintaining any equipment and ancillary services needed to connect to, access or otherwise use the SaaS Services, including, without limitation, modems, hardware, servers, software, operating systems, networking, web servers and the like (collectively, “Equipment”). Customer shall also be responsible for maintaining the security of the Equipment, Customer account, passwords (including but not limited to administrative and user passwords) and files, and for all uses of Customer account or the Equipment with or without Customer’s knowledge or consent.

2.4 Suspension. Company may suspend provision of the SaaS Services if:  (i) the SaaS Services are being used in material violation of this Agreement; (ii) suspension of the SaaS Services is necessary to protect Company’s network or Company’s other customers; (iii)  the use of the SaaS Services by Customer may expose Company or its affiliates to liability; or (iv) suspension is required by law.

3. Confidentiality; Proprietary Rights

3.1 Obligations and Exclusions. Each party (the “Receiving Party”) understands that the other party (the “Disclosing Party”) has disclosed or may disclose business, technical or financial information relating to the Disclosing Party’s business (hereinafter referred to as “Proprietary Information” of the Disclosing Party). Proprietary Information of Company includes non-public information regarding features, functionality and performance of the SaaS Service. Proprietary Information of Customer includes non-public data provided by Customer to Company to enable the provision of the SaaS Services (“Customer Data”). The Receiving Party agrees: (i) to take reasonable precautions to protect such Proprietary Information, and (ii) not to use (except in performance of the SaaS Services or as otherwise permitted herein) or divulge to any third person any such Proprietary Information. The Disclosing Party agrees that the foregoing shall not apply with respect to any information after five (5) years following the disclosure thereof or any information that the Receiving Party can document (a) is or becomes generally available to the public, or (b) was in its possession or known by it prior to receipt from the Disclosing Party, or (c) was rightfully disclosed to it without restriction by a third party, or (d) was independently developed without use of any Proprietary Information of the Disclosing Party or (e) is required to be disclosed by law. If the Receiving Party is compelled by law to disclose Proprietary Information of the Disclosing Party, it shall provide the Disclosing Party with prior notice of such compelled disclosure (to the extent legally permitted) and reasonable assistance, at Disclosing Party’s cost, if the Disclosing Party wishes to contest the disclosure. If the Receiving Party is compelled by law to disclose the Disclosing Party’s Proprietary Information as part of a civil proceeding to which the Disclosing Party is a party, and the Disclosing Party is not contesting the disclosure, the Disclosing Party will reimburse the Receiving Party for its reasonable cost of compiling and providing secure access to such Proprietary Information.

3.2 Proprietary Rights. Customer shall own all right, title and interest in and to the Customer Data. Company shall own and retain all right, title and interest in and to (a) the SaaS Services and Software, all improvements, enhancements or modifications thereto, (b) any software, applications, inventions or other technology developed in connection with any additional services or support, (c) any data that is based on or derived from the Customer Data and provided to Customer as part of the SaaS Services, and (d) all intellectual property rights related to any of the foregoing.   

3.3 Service Improvements. Notwithstanding anything to the contrary, Company shall have the right to collect and analyze data and other information relating to the provision, use and performance of various aspects of the SaaS Services and related systems and technologies (including, without limitation, information concerning Customer Data and data derived therefrom), and Company will be free (during and after the term hereof) to (i) use such information and data to improve and enhance the SaaS Services and for other development, diagnostic and corrective purposes in connection with the SaaS Services and other Company offerings, and (ii) disclose such data solely in aggregate or other de-identified form in connection with its business. No rights or licenses are granted except as expressly set forth herein. Company shall have a royalty-free, worldwide, transferable, sublicenseable, irrevocable, perpetual license to use or incorporate into the SaaS Services any suggestions, enhancement requests, recommendations or other feedback provided by Customer relating to the operation of the SaaS Services.

3.4 Publicity. Customer agrees that Company has the right to reveal the fact that Customer is using the SaaS Services, including by displaying Customer’s name and logo in Company’s website and other marketing materials.

‍

4. Payment of Fees

4.1 Fees. Customer will pay Company the then applicable fees described in the Order Form for the SaaS Services in accordance with the terms therein (the “Fees”). On a quarterly basis, Company will perform an audit to determine if Customer is in compliance with the license usage limits of this Order. Upon completion of an audit, Company will notify Customer of any additional licenses that need to be purchased to bring the license usage into compliance. Any such additional licenses will be billed as of the audit date, co-terminus with and incorporated into the Order Form, and charged at a pro-rated amount based on a 10% premium on the annual per unit extended price of the Order Form.

‍Company reserves the right to change the Fees or applicable charges and to institute new charges and Fees at the end of the Initial Service Term or then-current renewal term, upon thirty (30) days prior notice to Customer (which may be sent by email). If Customer believes that Company has billed Customer incorrectly, Customer must contact Company no later than 60 days after the closing date on the first billing statement in which the error or problem appeared, in order to receive an adjustment or credit. Inquiries should be directed to Company’s customer support department.  All fees under this Agreement are nonrefundable except as otherwise set forth herein.

4.2 Payment Terms. Company may choose to bill through an invoice, in which case, full payment for invoices issued in any given month must be received by Company thirty (30) days after the mailing date of the invoice (excluding amounts under reasonable and good faith dispute). If any amounts are withheld by Customer, Customer shall, within 15 days of receipt of the applicable invoice (the “Dispute Period”), provide Company a reasonably detailed written explanation of the nature of the dispute, which explanation shall set forth the dollar amounts withheld and the reasons for withholding such amounts.  If Customer does not dispute the applicable invoice during the Dispute Period, any such dispute shall be deemed waived.  For clarity, Customer remains obligated to pay Company for all portions of the applicable invoice that are not under reasonable and good faith dispute. Unpaid amounts are subject to a finance charge of 1.5% per month on any outstanding balance, or the maximum permitted by law, whichever is lower, plus all expenses of collection and may result in immediate termination of SaaS Service. Customer shall be responsible for all taxes associated with SaaS Services other than U.S. taxes based on Company’s net income.

4.3 Taxes.  The Fees and any other amounts due are exclusive of any export, withholding, federal, state and local taxes, duties or excises.  If Company pays any such taxes, duties or excises, Customer shall reimburse Company for such taxes, duties or excises, other than taxes on Company’s net income.

5. Term and Termination

5.1 Term. Subject to earlier termination as provided below, this Agreement is for the Initial Service Term as specified in the Order Form and shall be automatically renewed for additional periods of the same duration as the Initial Service Term (collectively, the “Term”), unless either party requests termination at least thirty (30) days prior to the end of the then-current term.‍

5.2 Termination for Cause. In addition to any other remedies it may have, either party may also terminate this Agreement upon thirty (30) days’ notice (or without notice in the case of nonpayment), as follows:‍

  1. ‍if the other party materially breaches any of the terms or conditions of this Agreement; or 
  2. ‍if the other Party (i) makes a general assignment for the benefit of creditors, (ii) admits in writing its inability to pay debts as they come due, (iii) voluntarily files a petition or similar document initiating any bankruptcy or reorganization proceeding, or (iv) involuntarily becomes the subject of a petition in bankruptcy or reorganization proceeding and such proceeding shall not have been dismissed or stayed within one hundred twenty (120) days after such filing.

‍Customer will pay in full for the SaaS Services up to and including the last day on which the SaaS Services are provided. Upon any termination, Company will make all Customer Data available to Customer for electronic retrieval for a period of thirty (30) days, but thereafter Company may, but is not obligated to, delete stored Customer Data. All sections of this Agreement which by their nature should survive termination will survive termination, including, without limitation, accrued rights to payment, confidentiality obligations, warranty disclaimers, and limitations of liability.

6. Warranties and Disclaimer

6.1 Representations. Each party hereby represents and warrants to the other party that: (a) it is a legal entity duly organized and validly existing under the laws of its relevant jurisdiction; (b) it has the full right, power and authority to enter into this Agreement; (c) this Agreement is a valid and binding obligation of such party; (d) it has obtained and shall maintain throughout the term of this Agreement all necessary licenses, authorizations, approvals and consents to enter into and perform its obligations hereunder; and (e) it shall comply with all applicable laws, rules and regulations, including applicable privacy and data protection laws.

6.2 Warranties. Company shall use reasonable efforts consistent with prevailing industry standards to maintain the SaaS Services in a manner which minimizes errors and interruptions in the SaaS Services. SaaS Services may be temporarily unavailable for scheduled maintenance or for unscheduled emergency maintenance, either by Company or by third-party providers, or because of other causes beyond Company’s reasonable control, but Company shall use reasonable efforts to provide advance notice in writing or by e-mail of any scheduled service disruption. 

6.3 Disclaimers. EXCEPT AS EXPRESSLY SET FORTH IN THIS AGREEMENT, NEITHER PARTY MAKES ANY WARRANTY, EXPRESS OR IMPLIED, WITH RESPECT TO ANY MATTER, AND EACH PARTY EXPRESSLY DISCLAIMS THE IMPLIED WARRANTIES OR CONDITIONS OF NONINFRINGEMENT, MERCHANTABILITY AND FITNESS FOR ANY PARTICULAR PURPOSE.  COMPANY DOES NOT WARRANT THE RESULTS OF USE OF THE SAAS SERVICES, AND CUSTOMER ASSUMES ALL RISK AND RESPONSIBILITY WITH RESPECT THERETO. CUSTOMER SHOULD NOTE THAT IN USING THE SAAS SERVICES, SENSITIVE INFORMATION WILL TRAVEL THROUGH THIRD PARTY INFRASTRUCTURES WHICH ARE NOT UNDER COMPANY’S CONTROL (SUCH AS A THIRD-PARTY SERVERS AND THE INTERNET). COMPANY MAKES NO WARRANTY WITH RESPECT TO THE SECURITY OF SUCH THIRD-PARTY INFRASTRUCTURES. CERTAIN FEATURES OF THE SAAS SERVICES MAY UTILIZE ARTIFICIAL INTELLIGENCE ("AI") COMPONENTS, PRIMARILY FOR ERROR INTERPRETATION AND TROUBLESHOOTING PURPOSES. HOWEVER, ENDOR LABS DOES NOT GUARANTEE THE ACCURACY OR COMPLETENESS OF AI-GENERATED INFORMATION AND THERE MAY BE LIMITATIONS IN THEIR USE CASES AND FUNCTIONALITIES DUE TO FACTORS SUCH AS DATA QUALITY AND TECHNICAL CONSTRAINTS.  CUSTOMER IS ADVISED TO INDEPENDENTLY CONFIRM INFORMATION AND CONSULT WITH PROFESSIONALS AS NECESSARY. FURTHER INFORMATION IS SET FORTH IN THE DOCUMENTATION.

7. Indemnity

‍Customer shall indemnify and, at Company’s option, defend Company and its affiliates, and its and their respective employees, contractors, agents, representatives, successors, and assigns from and against any damages and costs resulting from a third-party claim based on any use of the Customer Data in accordance with this Agreement.

8. Limitation of Liability

‍IN NO EVENT WILL COMPANY BE LIABLE TO THE CUSTOMER UNDER OR IN CONNECTION WITH THIS AGREEMENT UNDER ANY LEGAL OR EQUITABLE THEORY, INCLUDING BREACH OF CONTRACT, TORT (INCLUDING NEGLIGENCE), STRICT LIABILITY, AND OTHERWISE, FOR ANY: (i) CONSEQUENTIAL, INCIDENTAL, INDIRECT, EXEMPLARY, SPECIAL, ENHANCED, OR PUNITIVE DAMAGES; (ii) INCREASED COSTS, DIMINUTION IN VALUE OR LOST BUSINESS, PRODUCTION, REVENUES, OR PROFITS; (iii) LOSS OF GOODWILL OR REPUTATION; (iv) USE, INABILITY TO USE, LOSS, INTERRUPTION, DELAY OR RECOVERY OF ANY DATA, OR BREACH OF DATA OR SYSTEM SECURITY; OR (v) COST OF REPLACEMENT GOODS OR SERVICES, IN EACH CASE REGARDLESS OF WHETHER CUSTOMER WAS ADVISED OF THE POSSIBILITY OF SUCH LOSSES OR DAMAGES OR SUCH LOSSES OR DAMAGES WERE OTHERWISE FORESEEABLE.

9. Miscellaneous

9.1 Independent Contractors. The relationship between the parties established under this Agreement is that of independent contractors, and no agency, partnership, joint venture, or employment is created as a result of this Agreement and Customer does not have any authority of any kind to bind Company in any respect whatsoever.

9.2 Severability; Entire Agreement. This Agreement is the complete and exclusive statement of the mutual understanding of the parties and supersedes and cancels all previous written and oral agreements, communications and other understandings relating to the subject matter of this Agreement.  Notwithstanding any language to the contrary therein, no terms stated in a purchase order or in any other order document (other than an Order Form or other mutually executed order document expressly incorporated herein) shall be incorporated into this Agreement, and all such terms shall be void.

9.3 Modification. Company reserves the right to alter the terms of this Agreement at any time. If the alterations constitute a “material change” to the Agreement, Company will notify Customer. What constitutes a “material change” will be determined at Company’s sole discretion, in good faith and using common sense and reasonable judgment, but will only include those changes that materially affect Customer’s use of the SaaS Services or rights under this Agreement. Notice will be considered to have been delivered once sent.  Customer agrees to review the latest version of the Agreement on the Company’s website periodically to remain aware of any non-material modifications to the Agreement about which Customer is not alerted by the Company.  The Agreement available on the web site will be dated so as to make clear what version is currently in force.  Any use of the SaaS Services after alteration of the Agreement will constitute acceptance by Customer of such changes. Customer's sole remedy should Customer not agree with the altered Agreement shall be to cease Customer's use of the SaaS Services and to comply with Customer's termination obligations outlined in Section 5 of this Agreement.

9.4 Assignment. This Agreement is not assignable, transferable or sublicensable by Customer except with Company’s prior written consent. Company may transfer and assign any of its rights and obligations under this Agreement without consent. This Agreement is binding upon and inures to the benefit of the parties and their respective permitted successors and assigns.

9.5 Attorney’s Fees. In any action or proceeding to enforce rights under this Agreement, the prevailing party will be entitled to recover costs and attorneys’ fees. 

9.6 Notices. All notices under this Agreement will be in writing and will be deemed to have been duly given when received, if personally delivered; when receipt is electronically confirmed, if transmitted by facsimile or e-mail; the day after it is sent, if sent for next day delivery by recognized overnight delivery service; and upon receipt, if sent by certified or registered mail, return receipt requested. 

9.7 Governing Law and Venue. This Agreement is governed by and will be construed in accordance with the laws of the State of California, without regard to conflict of law principles. The parties acknowledge and agree that this Agreement relates solely to the performance of services (not the sale of goods) and, accordingly, will not be governed by the Uniform Commercial Code. In addition, the provisions of the Uniform Computerized Information Transaction Act and United Nations Convention on Contracts for the International Sale of Goods will not apply to this Agreement. All SaaS Services are provided hereunder are “commercial items” as that term is defined in the Federal Acquisition Regulation (FAR) at 48 C.F.R. 2.101. In addition, any Software covered under this Agreement is also "commercial items" as that term is defined at 48 C.F.R. 2.101; consisting of "commercial computer software" and "commercial computer software documentation" as such terms are used in 48 C.F.R. 12.212. Consistent with 48 C.F.R. 12.212 and 48 C.F.R. 227.7202-1 through 227.7202-4, all U.S. Government end users acquire the Supported Software and any other software and documentation covered under this Agreement with only those rights set forth herein. Any legal action or proceeding arising under this Agreement will be brought exclusively in the state or federal courts located in San Francisco County, California, and the parties expressly consent to personal jurisdiction and venue therein.

9.8 Compliance with Export Laws. Customer may not remove or export from the United States or allow the export or re-export of the SaaS Services, Software or anything related thereto, or any direct product thereof in violation of any restrictions, laws or regulations of the United States Department of Commerce, the United States Department of Treasury Office of Foreign Assets Control, or any other United States or foreign agency or authority.

9.9 Non-Solicitation. During the term of this Agreement and for a period of one (1) year thereafter, neither party may directly or indirectly solicit, any employee or contractor of the other party; provided, however, that nothing herein will prevent a party from hiring any such employee who responds to a general hiring program conducted in the ordinary course of business or who approaches the other party on a wholly unsolicited basis.

9.10 Force Majeure. Except for the obligation to pay sums due hereunder, neither party will be liable to the other for any delay or failure to perform due to causes beyond its reasonable control.

9.11 Disputes. If a dispute should arise between the parties relating to the Agreement, the parties shall promptly hold a meeting, attended by persons with decision-making authority regarding the dispute, in an attempt in good faith to negotiate a resolution of the dispute; provided, however, that no such meeting shall be deemed to reduce the obligations and liabilities of the parties or be deemed a waiver by either party hereto of any remedies to which such party would otherwise be entitled.   If the dispute is not resolved within thirty (30) days after the commencement of negotiations, or if no negotiations are commenced within sixty (60) days after one party notifies the other party of such dispute, then either party may initiate litigation per the terms of this Agreement.

9.12 Anticorruption Laws. Customer acknowledges that it is familiar with and understands the provisions of the U.S. Foreign Corrupt Practices Act (the “FCPA") and the U.K. Bribery Act of 2010 (“UKBA”) and agrees to comply with its terms as well as any provisions of local law related thereto. Customer further understands the provisions relating to the FCPA and UKBA’s prohibitions regarding the payment or giving of anything of value, including but not limited to payments, gifts, travel, entertainment and meals, either directly or indirectly, to an official of a foreign government or political party for the purpose of influencing an act or decision in his or her official capacity or inducing the official to use his or her party's influence with that government, to obtain or retain business involving the Services. Customer agrees to not violate or knowingly let anyone violate the FCPA or UKBA, and Customer agrees that no payment it makes will constitute a bribe, influence payment, kickback, rebate, or other payment that violates the FCPA, the UKBA, or any other applicable anti-corruption or anti-bribery law.

Endor Labs logo
HomePricingContact Us
Company
AboutCareers
Login
LEARN
BlogDocumentationeBook / ReportsEventsLeanAppSecSolution BriefVideo
Tools
TEI CalculatorRisk Explorer
Why Us?
vs. Snykvs. Traditional SCAvs. Runtime SCA
Product
Products
Endor Labs Supply Chain
Endor Open Source
Endor CI/CD
Endor SBOM Hub
Use Cases
Code ScanningCode Scanning
SAST & Secret DetectionSAST & Secret Detection
AI Code GovernanceAI Code Governance
Upgrades & RemediationUpgrades & Remediation
SBOM IngestionSBOM Ingestion
AI AppsAI Apps
Bazel MonoreposBazel Monorepos
Digital Operational Resilience Act (DORA)Digital Operational Resilience Act (DORA)
PCI DSSPCI DSS
Container ScanningContainer Scanning
RSPMRSPM
GitHub ActionsGitHub Actions
CI/CD DiscoveryCI/CD Discovery
Artifact SigningArtifact Signing
Compliance & SBOMCompliance & SBOM
SCA with ReachabilitySCA with Reachability
Integrations
VS Code / GitHub CopilotVS Code / GitHub Copilot
CursorCursor
C/C++C/C++
Microsoft Defender for CloudMicrosoft Defender for Cloud
RustRust
BitbucketBitbucket
VantaVanta
BazelBazel
GitHubGitHub
PHPPHP
SwiftSwift
ScalaScala
.NET (C#).NET (C#)
RubyRuby
TypeScriptTypeScript
JavaScriptJavaScript
PythonPython
GoGo
KotlinKotlin
JavaJava
SlackSlack
JenkinsJenkins
CircleCICircleCI
GitLabGitLab
JiraJira
IDEIDE
GitHubGitHub
© 2025 Endor Labs. All rights reserved.
Legal and PrivacyTrust and Security

All names, logos, and brands of third parties listed on our site are trademarks of their respective owners. Endor Labs and its products and services are not endorsed by, sponsored by, or affiliated with these third parties. Our use of these names, logos, and brands is for identification purposes only, and does not imply any such endorsement, sponsorship, or affiliation.

Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Article

Managing Open Source Vulnerabilities for PCI DSS Compliance - On-Demand Webinar

Watch this 30-minute on-demand webinar to learn about changes to PCI DSS that impact OSS vulnerability management.

Click to read

Article

Container Scanning + SCA = Better Together

We’re excited to announce that Endor Labs now extends our software supply chain platform to include container scanning.

Click to read

Article

Endor Labs Named to Rising in Cyber by CISOs and Venture Capital Investors

Company Recognized for Creating Secure Supply Chains that Improve Application Development Productivity

Click to read

Article

Evaluating and Scoring OSS Packages

How can you tell if an OSS package is “good” or “bad”? A rigorous evaluation model, such as the Endor Score, can help developers make quick and informed decisions.

Click to read

Article

Demystifying Transitive Dependency Vulnerabilities

95% of vulnerabilities are found in transitive dependencies. Learn how they’re unique from direct dependencies and how to incorporate them into your risk management program.

Click to read

Article

Surprise! Your GitHub Actions Are Dependencies, Too

GitHub Actions are open source dependencies - secure them accordingly! Learn how to effectively manage the security risks associated with GitHub Actions with a proactive approach focusing on three key areas: visibility, hardening, and dependency management.

Click to read

Article

OSS Vulnerabilities and the Digital Operational Resilience Act (DORA)

Learn how your organization can achieve DORA compliance for managing open source software vulnerabilities with reachability-based SCA, SBOMs, and more.

Click to read

Article

Protect Mobile Apps with Kotlin and Swift SCA

Learn about the mobile application threat landscape and how you can protect mobile apps from security and legal risk associated with open source software with Endor Labs Open Source.

Click to read

Article

Intro to Endor Labs - On-Demand Webinar

Watch this 30-minute on-demand webinar to learn how to Endor Labs supports a Software Supply Chain Security program.

Click to read

Article

OWASP OSS Risk 1: Known Vulnerabilities

Known vulnerabilities are a well-understood software risk…but managing and prioritizing them is anything but simple. Learn about key considerations when building a program to detect and remediate CVEs.

Click to read

Article

Low-Code/No Code Artifact Signing

A low-code/no code artifact signing solution makes it easy to implement an enterprise solution for verifying authenticity of software artifacts and tracing their origins.

Click to read

Article

An Auditor’s Perspective on Addressing OSS Vulnerabilities for PCI DSS v4

Learn how your organization can achieve PCI DSS v4 compliance for managing open source software vulnerabilities with reachability-based SCA and more.

Click to read

Article

Your Git Repo is a Supply Chain Risk

Source code repository misconfigurations can expose your organization to supply chain attacks. Repository Security Posture Management (RSPM) can offer a reliable system to enforce best practices.

Click to read

Article

Guide to Implementing Software Supply Chain Security

In this free guide, experts answer key questions like "what is it?", "why is it important?", "and how do I secure it?" so you can make informed decisions and thoughtfully design your organization's SSCS program.

Click to read

Article

Improve Kubernetes Security with Signed Artifacts and Admission Controllers

Control which images get deployed in Kubernetes by configuring an admission controller to admit only those which have been signed by Endor Labs.

Click to read

Article

AppSec Goes to Devnexus: Lessons from a Thriving, Modern Java Community

What happens when an AppSec professional attends a Java conference? Great conversations on productivity, tool pain, AI/ML, and vulnerability management.

Click to read

Article

Artifact Signing 101 - On-Demand Webinar

Watch this 30-minute on-demand webinar to learn using strong cryptographic artifact signatures to enable strong admission control, provenance, and traceability that support effective security, quality, and compliance programs.

Click to read

Article

XZ Backdoor: How to Prepare for the Next One

While it’s improbable to prevent all exposure to supply chain risks, organizations can absolutely focus on a strategy to reduce the probability of successful attacks and reduce the time it takes them to respond to such threats.

Click to read

Article

XZ is A Wake Up Call For Software Security: Here's Why

The xz backdoor shines a light on everything we're doing wrong in software supply chain security. Get an overview of the incident, what we can learn from it, and what we can do about it.

Click to read

Article

SSDF Compliance and Attestation

Learn ways to comply with SSDF requirements for secure environments, trusted source code supply chains, code and artifact provenance, and vulnerabilities.

Click to read

Article

You Have a Shadow Pipeline Problem

Learn how to establish automated CI/CD controls to reveal what’s running in your pipelines and which configs don’t align with risk and compliance requirements.

Click to read

Article

Remediating Vulnerabilities vs. Maintaining Current Dependencies

Learn about the pros and cons of maintaining current dependencies, backed by a TU Delft study on 262 Java projects on Github

Click to read

Article

Prioritizing SCA Findings with Reachability Analysis - On-Demand Webinar

Watch this 30-minute on-demand webinar to learn how reachability analysis works.

Click to read

Article

Signing Your Artifacts For Security, Quality, and Compliance

Code Signing and other Artifact Signing enable application provenance to enhance admission control, incident response, and other essential capabilities.

Click to read

Article

Detect Malicious Packages Among Your Open Source Dependencies

Learn about emerging malicious code trends, including typosquatting and dependency confusion attacks, and two techniques for detecting malware in your applications.

Click to read

Article

Tom Gleason Joins Endor Labs as VP of Customer Solutions

Tom Gleason is a security enthusiast with a knack for building and leading technically-focused customer teams. Formerly at Snyk, Akamai, and Palo Alto Networks, Tom joins Endor Labs to lead Customer Solutions.

Click to read

Article

Introducing CI/CD Security with Endor Labs

Endor Labs CI/CD helps organizations secure their pipelines through pipeline discovery, repository security posture management, and build integrity verification (artifact signing).

Click to read

Article

How to Improve SCA in GitHub Advanced Security - Tutorial

In this short video we demonstrate how to use Endor Labs and GitHub Advanced Security to manage and prioritize open source risk.

Click to read

Article

How to Ingest and Manage SBOMs - Tutorial

In this short video we demonstrate how to ingest 1st and 3rd party software bills of material, manage them centrally, and detect new vulnerabilities in a timely manner.

Click to read

Article

VMware Achieves SBOM Compliance for Over 100 Services with Endor Labs

Learn how the VMWare compliance team built a a scalable process to collect and attest to SBOMs using Endor Labs.

Click to read

Article

AI-Supported Environment Debugging for Endor Labs

Testing and installing new security tools is painful. Using generative AI, DroidGPT by Endor Labs makes it easy to troubleshoot and even prevent compatibility errors when installing the platform.

Click to read

Article

How to Generate SBOM and VEX - Tutorial

In this short video we demonstrate how to use Endor Labs to produce SBOM and VEX documents.

Click to read

Article

How to Use AI for Open Source Selection - Tutorial

In this short video we demonstrate how to use DroidGPT to research open source packages in a conversational manner.

Click to read

Article

Introducing a Better Way to SCA for Monorepos and Bazel

Endor Labs’ reachability-based SCA now supports Bazel so you can get fully accurate results without any of the messy workarounds usually required for monorepos.

Click to read

Article

5 Types of Reachability Analysis (and Which is Right for You)

Explore the five key categories of reachability and their practical applications in AppSec and development. Learn the differences between SCA and container scanning, and understand how various tools like Function-Level Reachability, Package Baselining, and Internet Reachability play crucial roles in identifying and prioritizing security risks.

Click to read

Article

What’s in a Name? A Look at the Software Identification Ecosystem

Learn best practices for a proper software identification ecosystem that supports asset inventory, version control, vulnerability management, incident response, and more.

Click to read

Article

What You Need to Know About Apache Struts and CVE-2023-50164

Discover the critical details of CVE-2023-50164, a severe vulnerability in Apache Struts.

Click to read

Article

Introducing JavaScript Reachability and Phantom Dependency Detection

Endor Labs’ JavaScript SCA capabilities cut down noise with a program analysis approach that outperforms manifest scanning SCA tools like Snyk, Veracode, and BlackDuck.

Click to read

Article

MileIQ Securely Reimagines a Decade Old Product with Endor Labs

Lean MileIQ, the #1 mileage tracking app, selected Endor Labs to help their security and engineering teams focus on the software supply chain risks that actually matter.

Click to read

Article

How CycloneDX VEX Makes Your SBOM Useful

Explore the challenges of modern vulnerability management and the efficiency of the Vulnerability Exploitability eXchange (VEX) in our latest blog post. Learn how VEX helps identify and communicate the true exploitability of vulnerabilities, streamlining cybersecurity efforts in the face of overwhelming scanner findings.

Click to read

Article

How to Scan and Prioritize Valid Secrets - Tutorial

In this short video we demonstrate how to use Endor Labs to discover if your organization has leaked valid secrets and provide developers with instructions for resolving the leak.

Click to read

Article

SBOM Requirements for Medical Devices

Learn about the 2023 FDA rule for medical devices, including requirements for SBOMs, a mitigation plan, and secure software development practices.

Click to read

Article

CISA and NCSC's Take on Secure AI Development

A breakdown of the "Guidelines for Secure AI System Development document from CISA and NCSC.

Click to read

Article

Open Source Security 101: How to Evaluate Your Open Source Security Posture

Organizations need to evolve their approach to using open source securely. Find four fundamental considerations to consider when it comes to securely using OSS.

Click to read

Article

Endor Labs is a CRN 2023 Stellar Startup!

CRN®, a brand of The Channel Company, has named Endor Labs to its 2023 Stellar Startups list in the Security category. Learn more about the list and us here.

Click to read

Article

How to Prioritize Reachable Open Source Software (OSS) Vulnerabilities - Tutorial

In this short video we demonstrate how to use Endor Labs for reachability-based SCA and noise reduction.

Click to read

Article

Open Source Security for Python and AI Apps

Gain visibility into your hidden Python dependencies and prioritize reachable, exploitable risks.

Click to read

Article

How To Evaluate Secret Detection Tools

An overview of 3 requirements for a secret detection program, and how to do it with Endor Labs.

Click to read

Article

Why SCA Tools Can't Agree if Something is a CVE

One scanner says this is a CVE, and the other says it's not. Which is right?

Click to read

Article

5 Federal Software Supply Chain Requirements You Should Be Aware Of

If you’ve been watching the software supply chain security space evolve, you likely know that a lot of the momentum and effort is coming out of the U.S. Federal government. This may seem surprising at first, but it shouldn’t be, when you account for the fact that the Federal government is one of the single largest procurers of technology and software in the world. 

Click to read

Article

You Found Vulnerabilities in Your Dependencies, Now What?

Third-party open source dependencies offer convenience but also pose a significant security risk. Learn how tools like Endor Labs can detect & address vulnerabilities here.

Click to read

Article

Dependency Resolution in Python: Beware The Phantom Dependency

Phantom dependencies are dependencies used by your code that are not declared in the manifest. If you miss them, they can sneak reachable risks into your application, lead to false positives, or inaccurate SBOMs. All very spooky. This article breaks down how phantom dependencies happen, and how to catch them.

Click to read

Article

Chris Hughes Joins Endor Labs as Chief Security Advisor

Chris Hughes brings nearly 20 years of IT and cybersecurity experience to his role as Chief Security Advisor. Learn what made him choose Endor Labs.

Click to read

Article

Understanding Python Manifest Files

In this blog, we delve into the various Python manifest files used to declare dependencies and how they collaborate seamlessly.

Click to read

Article

Why Your SCA is Always Wrong

A breakdown of why your SCA results are always so full of false positives (and sometimes false negatives), and why treating source code as a first class citizen can lead us to the solution.

Click to read

Article

Endor Labs Named 2023 SINET16 Innovator Award Winner

SINET, an organization with the mission to accelerate Cybersecurity innovation through public-private partnerships, announced today that Endor Labs is one of the winners of its annual SINET16 Innovator Award. Endor Labs and 15 other emerging companies are identified as the most innovative and compelling technologies in their fields to address Cybersecurity threats and vulnerabilities.

Click to read

Article

Combining EPSS and Reachability Analysis to Optimize Vulnerability Management

Exploit Prediction Scoring Systems (EPSS) is a data set that helps you understand the likelihood that a CVE will be exploited. Learn what the EPSS includes and how to use it to prioritize vulnerability remediation.

Click to read

Article

Reachability Analysis for Python, Go, C# - Webinar

In this on-demand webinar, get an in-depth reachability analysis for Python, Go, and C#. Watch now.

Click to read

Article

Introducing Reachability-Based SCA for Python, Go, and C#

Announcing new language support for Endor Labs Open Source

Click to read

Article

The Open Source Security Index Top 5

What’s the best of the best when it comes to open source security tools?We’ve previously talked about the OpenSSF Scorecard, which gives developers a high-level snapshot of the security of any given open source project. But in this post, we’ll talk about a related project, the Open Source Security Index (OSSI), which does something slightly different and complementary.

Click to read

Article

Faster SCA with Endor Labs and npm Workspaces

As projects grow larger and more complex, developers face challenges in maintaining a clean and efficient development workflow. Fortunately, npm workspaces offer an essential solution to streamline JavaScript development. In this blog post, we will explore the concept of npm/yarn workspaces, its importance, and how Endor Labs works with them.

Click to read

Article

Key Questions for Your SBOM Program

All the questions (and some of the answers) you need before kicking off your SBOM program.

Click to read

Article

Endor Labs Raises $70M in Series A Funding to Reform Application Security

Endor Labs raises a total of $70M to achieve application security without the developer productivity tax. Here's what we're doing, and where we're going.

Click to read

Article

How Should I Prioritize Software Vulnerabilities?

CVSS, KEV, SVCC, EPSS, and reachability analysis are 5 method used to prioritize open source vulnerabilities for remediation. Do you need all 5? Which is the best? It turns out a combination of factors (and a tool that can bring it all together) is the best solution.

Click to read

Article

Divide and Hide: How Malicious Code Lived on PyPI for 3 months

The Station 9 research team discovered malicious code that was divided and distributed across different packages, remaining obfuscated for months while getting nearly 2000 downloads.

Click to read

Article

Endor Labs’ ‘State of Dependency Management 2023’ Report Offers Insight on Explosive Popularity of AI and LLMs—and How They Impact Application Security

The State of Dependency Management 2023 reports on the latest research on dependency management and how AI is impacting the application security landscape.

Click to read

Article

State of Dependency Management 2023

Emerging trends impacting open source dependency management in 2023

Click to read

Article

Endor Labs Recognized as a Cool Vendor in the 2023 Gartner® Cool Vendors™ in Platform Engineering for Scaling Application Security Practices

Endor Labs is committed to providing cutting-edge solutions that address the challenges faced by platform engineering and DevSecOps teams in meeting application security needs.

Click to read

Article

Visualizing the Impact of Call Graphs on Open Source Security

A call graph is a visualization of invocation of vulnerable open source methods by a given client. Learn how to use call graphs to understand relevancy and impact of vulnerabilities.

Click to read

Article

Why Different SCA Tools Produce Different Results

Like anything in computer science and programming, there’s more than one way to solve a problem or get a result. SCA (software composition analysis) is no different.

Click to read

Article

Strengthening Security in .NET Development with packages.lock.json

Learn how packages.lock.json can help maintain a secure .NET development and why it should be part of your development workflow.

Click to read

Article

Highlights from State of Dependency Management 2022 - Webinar

In this on-demand webinar we discuss the key research findings from our 2022 report "State of Dependency Management."

Click to read

Article

How Security and Engineering Can Scale Open Source Security - Webinar

In this on-demand video we discuss open source dependency management and considerations for implementing AppSec programs to protect OSS.

Click to read

Article

Endor Labs is SOC 2 Type II Certified!

Proving once again open source governance doesn’t have to SOC, yes I made that joke again and I’m not sorry. We’re excited to announce we have received a clean audit result on our SOC2 Type II certification.

Click to read

Article

Reviewing Malware with LLMs: OpenAI vs. Vertex AI

At Endor Labs, we continue evaluating the use of large language models (LLMs) for all kinds of use-cases related to application security. And we continue to be amazed about high-quality responses … until we’re amused about the next laughably wrong answer.

Click to read

Article

Endor Labs Wins Intellyx Digital Innovation Award

We've been named a winner of the 2023 Intellyx Digital Innovator Award, recognizing technology providers driving enterprise digital transformation. Learn more.

Click to read

Article

Endor Labs Recognized As a 2023 Bay Area Best Place to Work

I mean, who wouldn't want to work with a bunch of Ewoks?

Click to read

Article

Make Developers' Lives Easier with Endor Labs & GitHub Advanced Security

Developers are bombarded with information every day. Constant context switching and information overload are among the biggest barriers to productivity. There are simply too many demands for their attention. One day the sales team will understand. Right?

Click to read

Article

LLM-assisted Malware Review: AI and Humans Join Forces to Combat Malware

Experiments with GPT-3.5 suggest that LLM-based malware reviews can complement, but not yet substitute human reviews. 1800 binary classifications performed with GPT-3.5 included false-positives and false-negatives.

Click to read

Article

Endor Labs Selected as Finalist for RSA Conference 2023 Innovation Sandbox

Endor Labs recognized for innovation in helping enterprises manage open source risk.

Click to read

Article

Announcing the Endor Labs Hyperdrive Program for Resellers and Solution Providers

The Hyperdrive partner program enables organizations of all sizes to embrace open source software with confidence.

Click to read

Article

Endor Labs partners with Zinfinity to help enterprise safely adopt Open Source Software

We’re excited to announce our latest partnership with Zinfinity as a strategic partner. Zinfinity is a global provider of technology solutions and services with a focus on Cyber Security, Cloud and Digital Infrastructure.

Click to read

Article

OWASP Top 10 Risks for Open Source

Emerging trends impacting open source dependency management

Click to read

Article

How to Quickly Measure SBOM Accuracy for Maven Projects (for Free)

SBOM-Lab is an open source tool that lets you quickly compare SBOM generation methods for Maven projects and find the right one for you.

Click to read

Article

Endor Labs is SOC2 Certified!

Open Source security doesn't have to SOC (sorry, I had to). We're excited to announce we have received a clean audit result on our SOC2 Type 1 certification.

Click to read

Article

Introduction to Open Source Security - Webinar

In this on-demand webinar we help you understand the basics of dependency management and how they can be vulnerable to security risks.

Click to read

Article

Comparing SBOMs Generated at Different Lifecycle Stages - Webinar

In this on-demand webinar, we share research on the variation in SBOMs depending on tool and when the documents are generated.

Click to read

Article

SBOM vs. SBOM: Comparing SBOMs from Different Tools and Lifecycle Stages

Software vendors active in certain verticals will soon be required to provide customers with SBOMs for their products. But how and when should an SBOM for a given piece of software be produced?

Click to read

Article

What Breaking Changes Teach Us about Security

GitHub rolled out a release that had some breaking changes to Git. Here's what we learned from it.

Click to read

Article

Open Source Licensing Simplified: A Comparative Overview of Popular Licenses

Explore the different types of open source licenses and how they impact the use, modification, and distribution of open source software. From GPL to Apache, MIT and more, learn the key differences between permissive and restrictive licenses and how to choose the right one for your project.

Click to read

Article

What is VEX and Why Should I Care?

An SBOM without VEX is like peanut butter without jelly. SBOM is a top buzzword in cybersecurity, but it's important to understand why VEX (Vulnerability Exploitability eXchange) is such a critical companion document.

Click to read

Article

Whatfuscator, Malicious Open Source Packages, and Other Beasts

Join Henrik to learn how his journey into Go programming turned into a path of malicious OSS packages.

Click to read

Article

Exploring Risk: Understanding Software Supply Chain Attacks

Naming and understanding the attack vectors at the disposal of our adversaries.

Click to read

Article

Endor Labs and Intuitive Partner to Help Enterprises Leverage OSS

Endor Labs and Intuitive.Cloud announce strategic partnership and investment with the goal of taking on OSS sprawl.

Click to read

Article

What is Reachability-Based Dependency Analysis?

Reachability analysis increases reliability of SCA results, allowing teams to quickly prioritize just the risks that matter.

Click to read

Article

State of Dependency Management 2022

In their inaugural report, the Station 9 research team explores the complexities of open source dependencies and the top security considerations for open source adoption at the enterprise.

Click to read

Article

Why We Need Static Analysis When Prioritizing Vulnerabilities - Webinar

In this on-demand webinar, we explain the role of static analysis of open source dependencies in an application security program.

Click to read

Article

What are Maven Dependency Scopes and Their Related Security Risks?

This article explores Maven dependency scopes: What are they, what are they used for, and how do they impact security risks?

Click to read

Article

The Government's Role in Maintaining Open Source Security

This blog summarizes highlights from Tragedy of the Digital Commons, by Strauss Center scholar and lecturer Chinmayi Sharma, where she shares the OSS state of affairs and her thoughts on improving security.

Click to read

Article

Introduction to Program Analysis

Program analysis is the process of checking whether or not a piece of software fulfills certain properties. This article explores the basics of program analysis, so we could then dive deeper into the world of call graphs.

Click to read

Previous
Next
Event

Lightsaber Stunt Training Series - North America

Lightsaber Stunt Training Series - North America

Click to view

Event

Lightsaber Stunt Training Series - Europe

Lightsaber Stunt Training Series - Europe

Click to view

Event

OWASP Nashville Meetup

OWASP Nashville Meetup

Click to view

Event

OWASP Los Angeles Meetup

OWASP Los Angeles Meetup

Click to view

Event

Star Wars: The Force Awakens - Rooftop Cinema Family Event

Click to view

Event

Evolving Your AppSec Program in the Era of AI

Evolving Your AppSec Program in the Era of AI

Click to view

Event

DEF CON 33 AppSec Village

DEF CON 33 AppSec Village

Click to view

Event

Suite Sessions: Breakfast & Lunch with a Side of AppSec

Click to view

Event

Meet with Us at the Endor Labs Suite

Click to view

Event

Black Hat USA

Endor Labs will

Click to view

Event

See the Vegas Strip like never before—from a helicopter

Click to view

Event

BSides Las Vegas

BSides Las Vegas

Click to view

Event

OWASP Toronto Meetup

OWASP Toronto Meetup

Click to view

Event

OWASP Denver Meetup

OWASP Denver Meetup

Click to view

Event

OWASP Bay Area Meetup

OWASP Bay Area Meetup

Click to view

Event

Endor Labs Game Night - June

Endor Labs Game Night

Click to view

Event

AI Security Collective London

AI Security Collective

Click to view

Event

OWASP Dallas Meetup

OWASP Dallas Meetup

Click to view

Event

Security Leaders Networking Breakfast: Chicago Edition

Security Leaders Networking Breakfast: Chicago Edition

Click to view

Event

OWASP Italy Day

OWASP Italy Day

Click to view

Event

OWASP Oslo Meetup

OWASP Oslo Meetup

Click to view

Event

OWASP Jacksonville Meetup

OWASP Jacksonville Meetup

Click to view

Event

OWASP Boston Meetup

OWASP Boston Meetup

Click to view

Event

AppSec Brews and Rooftop Views Social

BBQ & Bytes: AppSec Social Barcelona

Click to view

Event

OWASP Global AppSec EU 2025

OWASP Global AppSec EU 2025

Click to view

Event

CSA San Francisco Chapter May Meetup

CSA San Francisco Chapter May Meetup

Click to view

Event

OWASP Washington, D.C. Meetup

OWASP Washington, D.C. Meetup Evolving Your AppSec Program in the Era of AI

Click to view

Event

FS-ISAC EMEA Summit

FS-ISAC EMEA Summit

Click to view

Event

Cloud & AI Security Azure Immersion Day

Join us at Cloud & AI Security Azure Immersion Day!

Click to view

Event

OWASP London Meetup

OWASP London Meetup

Click to view

Event

OWASP Vancouver Meetup

OWASP Vancouver Meetup

Click to view

Event

BBQ & Bytes: AppSec Social Copenhagen

BBQ & Bytes: AppSec Social Copenhagen

Click to view

Event

V2 Security Copenhagen

V2 Security Copenhagen

Click to view

Event

Birds of a Feather [Women's Only Event]

Click to view

Event

CISO Sanctuary Breakfast hosted by Hitch Partners

Click to view

Event

Bricks, Blocks, and Big Ideas: A LEGO Workshop with Tyler Clites

Click to view

Event

Request your VIP pass to the Endor Labs' Base at RSAC

Click to view

Event

CSA Summit 2025

CSA Summit 2025: Transformation: Ushering in the Next Generation of Cybersecurity.

Click to view

Event

AI vs. AI: Securing Software in the Era of AI-Generated Code

AI vs. AI: Securing Software in the Era of AI-Generated Code

Click to view

Event

RSAC 2025

Click to view

Event

AppSec Workshop: Fix Faster

AppSec Workshop: Fix Faster

Click to view

Event

Vibe Coding is Mid for Security

Learn what securing AI-generated code actually looks like. Endor Labs CTO Dimitri Stiliadis will do some vibe coding of his own, and then scan and fix vulnerabilities live.

Click to view

Event

Cybersecurity Identity Summit 2025

Cybersecurity Identity Summit

Click to view

Event

BSides Seattle

BSides Seattle

Click to view

Event

KCJUG Meetup

KCJUG Meetup

Click to view

Event

OWASP Antonio Meetup

OWASP Antonio Meetup AI for AppSec - A discussion of AppSec Best Practices

Click to view

Event

Innovate Cybersecurity Summit - Nashville

Innovate Cybersecurity Summit - Nashville

Click to view

Event

AppSec AI Summit

AppSec AI Summit

Click to view

Event

OWASP Bristol: Stormy Seas of Supply Chain Security

OWASP Bristol: Stormy Seas of Supply Chain Security

Click to view

Event

NCAA March Madness

NCAA March Madness

Click to view

Event

OWASP Vancouver

OWASP Vancouver

Click to view

Event

Boston Security March 2025 Meetup

Boston Security March 2025 Meetup

Click to view

Event

GPSec Security Forum Boston

GPSec Security Forum Boston

Click to view

Event

InfoSec Anti-Summit

InfoSec Anti-Summit

Click to view

Event

SANS Institute Cyber Solutions Fest

SANS Institute Cyber Solutions Fest

Click to view

Event

SnowFROC

SnowFROC

Click to view

Event

DevOps Live London

DevOps Live London

Click to view

Event

FS-ISAC Spring Americas Summit

FS-ISAC Spring Americas Summit

Click to view

Event

Lightsaber Stunt Training for AppSec Nerds

On March 5th, Meet other AppSec practitioners, learn some stage combat lightsaber moves from a legit stunt choreographer, and enjoy snacks and drinks on us.

Click to view

Event

Software Supply Chain (SSC) Security & Craft Beer

Software Supply Chain (SSC) Security & Craft Beer

Click to view

Event

Innovate Peer Panel - Atlanta

Innovate Peer Panel - Atlanta

Click to view

Event

GuidePoint Security CKO

GuidePoint Security CKO

Click to view

Event

Chicago Java Users Group Meetup

Chicago Java Users Group Meetup

Click to view

Event

NDC Security

NDC Security

Click to view

Event

Lightsaber Stunt Training for AppSec Nerds - Palo Alto

Meet other AppSec practitioners, learn some stage combat lightsaber moves from a legit stunt choreographer, and enjoy snacks and drinks on us.

Click to view

Event

Black Hat Europe 2024

Black Hat Europe 2024

Click to view

Event

OWASP Birmingham December Meeting

OWASP Birmingham

Click to view

Event

OWASP BeNeLux Days

OWASP BeNeLux Days

Click to view

Event

C-Vision National CIO & CISO Summit

C-Vision National CIO & CISO Summit

Click to view

Event

GitHub Universe

GitHub Universe

Click to view

Event

FS-ISAC Fall Americas Summit 2024

Register for FS-ISAC Fall Americas Summit today!

Click to view

Event

LASCON 2024

Register for LASCON 2024 today!

Click to view

Event

OWASP New York Meetup

OWASP NY Meetup

Click to view

Event

SINET New York 2024

SINET New York 2024

Click to view

Event

Lightsaber Stage Combat Training for AppSec Nerds - New York

Lightsaber Stage Combat Training for AppSec Nerds - New York

Click to view

Event

CISO XC

CISO XC

Click to view

Event

Innovate Cybersecurity Summit, Scottsdale

Innovate Cybersecurity Summit, Scottsdale

Click to view

Event

Information Warfare Summit

Information Warfare Summit

Click to view

Event

OWASP MSP October Meetup

OWASP MSP October Meetup

Click to view

Event

OWASP 2024 Global AppSec, SF

Meet Endor Labs at OWASP Global AppSec SF

Click to view

Event

Dependency Management Report 2024

The Dependency Management Report explores emerging OSS dependency trends to consider as part of an SDLC security strategy.

Click to view

Event

Nordic Software Security Summit

Request a Meeting

Click to view

Event

Bay Area Bazel Meet-up

Bay Area Bazel Meet-up

Click to view

Event

OWASP Tampa Chapter 2024 Q3 Lunch and Learn

OWASP Tampa Chapter 2024 Q3 Lunch and Learn

Click to view

Event

Mastering OSS Security: Validating Vulnerabilities with Code-Level Reachability Analysis

Join this 45-minute webinar to learn how to prioritize OSS vulnerabilities using code-level reachability analysis, call graphs, and other parameters for effective vulnerability management

Click to view

Event

Give Devs the Confidence to Fix: Making Remediation Less Painful

Join this 60-minute webinar to learn how you can reduce the research required to understand the impact of dependency upgrades.

Click to view

Event

Black Hat - Las Vegas, USA 2024

Meet Endor Labs at Black Hat - Las Vegas, USA 2024

Click to view

Event

CSA San Francisco July Chapter Meetup

CSA - San Francisco Chapter Meetup

Click to view

Event

What's a Security Pipeline?

Join this 30-minute webinar to learn about common patterns and tradeoffs for security pipelines.

Click to view

Event

Happy Hour at OWASP Global 2024 AppSec

Endor Labs Happy Hour at OWASP Global 2024 AppSec

Click to view

Event

OWASP - LA Monthly Meet-up In-Person, June 2024

Meet Endor Labs at OWASP - Los Angeles, Monthly Meet-up

Click to view

Event

Meet Endor Labs at Evanta New York CISO Executive Summit

Register for CISO Executive Summit by Evanta today!

Click to view

Event

OWASP 2024 Global AppSec, Lisbon 2024

Meet Endor Labs at OWASP Global AppSec Lisbon

Click to view

Event

London Java Community Summer Unconference 2024

Schedule a Meeting

Click to view

Event

OWASP Amsterdam, Netherlands - June 2024 Chapter Meetup

Join us for a conversation on harnessing reachability analysis to discern real threats.

Click to view

Event

Managing Open Source Vulnerabilities for PCI DSS Compliance

Click to view

Event

OWASP AppSec Days Pacific Northwest Conference - 2024

Register for OWASP AppSec Days PNW today!

Click to view

Event

Engineering Leader Mixer

An interactive event for engineering leaders to network and get ideas for how to ship secure code

Click to view

Event

OWASP Porto, Portugal - May 2024 Chapter Meetup

Join us in Porto for a conversation on harnessing reachability analysis to discern real threats.

Click to view

Event

OWASP Lisboa - May 2024 Chapter Meetup

Join us in Lisboa for a conversation on harnessing reachability analysis to discern real threats.

Click to view

Product

Endor SBOM Hub

Centralize your SBOM management with Endor SBOM Hub, featuring comprehensive risk analysis and continuous monitoring capabilities.

Click to view

Product

Endor CI/CD

Optimize your CI/CD pipelines with Endor Labs for superior code security, complete build integrity verification, and robust repository protection.

Click to view

Product

Endor Open Source

Automate OSS selection and approval, identify applicable risks, reduce SCA noise by 92%, and remediate issues faster.

Click to view

Use case

Code Scanning

Endor Labs brings together Reachability-Based SCA, SAST, Secrets, CI/CD, and Container Scanning in a single, remediation-focused platform. Go beyond detection—correlating findings across scanners and cutting through the noise with reachability and deep program analysis.

Click to read

Use case

SBOM Ingestion

A one-stop-shop to store, manage, and analyze SBOMs with continuous risk monitoring.

Click to read

Use case

AI Apps

SCA for Python-based AI applications

Click to read

Use case

Bazel Monorepos

SCA for Bazel including native Bazel rules for Java, Python, and Golang.

Click to read

Use case

Digital Operational Resilience Act (DORA)

Achieve DORA compliance for managing open source software vulnerabilities.

Click to read

Use case

PCI DSS

Achieve PCI DSS v4 compliance for managing open source software vulnerabilities.

Click to read

Use case

RSPM

Enforce source code best practices with Repository Security Posture Management.

Click to read

Use case

GitHub Actions

Prevent pipeline attacks caused by vulnerabilities and malware in CI workflows.

Click to read

Use case

CI/CD Discovery

Establish automated controls to reveal what’s running in your pipelines.

Click to read

Use case

Artifact Signing

Enable application provenance for admission control, incident response, and compliance.

Click to read

Use case

Upgrades & Remediation

Fix what’s easy, and magically patch hard-to-upgrade packages

Click to read

Use case

Container Scanning

Reduce noise by consolidating SCA and containers.

Click to read

Use case

SAST & Secret Detection

Consolidate SAST, SCA, Container Scanning, and Secret Detection into a single platform with Endor Labs.

Click to read

Use case

AI Code Governance

Evaluate open source packages and AI Models for security, popularity, quality and activity.

Click to read

Use case

Compliance & SBOM

Centrally manage SBOMs and VEX for compliance, including legal and licensing integrity.

Click to read

Use case

SCA with Reachability

Target the most critical vulnerabilities in your OSS packages for better code health and security.

Click to read

Sorry, we couldn't find what you're looking for.
View All Results