Bytesafe is a firewall for dependencies. Using the source code and vulnerability management platform, businesses can protect applications, stay in control and keep unwanted dependencies out of the organization.
Bytesafe is a firewall for dependencies. Using the source code and vulnerability management platform, businesses can protect applications, stay in...

Deployment

  • Cloud-based
  • On-premise

Support Options

  • Email/Help Desk
  • FAQs/Forum
  • Knowledge Base
  • Phone Support
  • 24/7 (Live rep)
  • Chat
BIMA by Perisai integrates elements from EDR, NDR, XDR, and SIEM into a unified cybersecurity framework, offering a comprehensive defense strategy.

Deployment

  • Cloud-based
  • On-premise

Support Options

  • Email/Help Desk
  • FAQs/Forum
  • Knowledge Base
  • Phone Support
  • 24/7 (Live rep)
  • Chat

Starting from

US$1,100.00/month

  • Free Version
  • Free Trial
  • Subscription

Starting from

Not provided by vendor

  • Free Version
  • Free Trial
  • Subscription

Overall rating

4.6 /5
(7)

Ease of Use

4.3/ 5

Features

4.3/ 5

Customer Service

4.8/ 5

Value for Money

4.5/ 5

Overall rating

5 /5
(4)

Ease of Use

5/ 5

Features

5/ 5

Customer Service

5/ 5

Value for Money

5/ 5

Total features 77

  • Access Controls/Permissions
  • Activity Dashboard
  • Activity Tracking
  • Ad hoc Reporting
  • Alerts/Notifications
  • Anomaly/Malware Detection
  • Application Security
  • Approval Workflow
  • Assessment Management
  • Asset Discovery
  • Audit Trail
  • Authentication
  • Automated Containment
  • Bug Tracking
  • Bug/Issue Capture
  • Code Repository Integration
  • Collaboration Tools
  • Compliance Management
  • Configuration Automation
  • Continuous Deployment
  • Continuous Integration
  • Customizable Reports
  • Encryption
  • Endpoint Management
  • For Developers
  • Goal Setting/Tracking
  • Incident Management
  • Inventory Management
  • Issue Management
  • Issue Tracking
  • KPI Monitoring
  • License Inventory
  • License Tracking
  • Mobile Access
  • Monitoring
  • Multi-User Collaboration
  • Multiple Programming Languages Supported
  • Network Scanning
  • Password Protection
  • Patch Management
  • Performance Metrics
  • Policy Management
  • Prioritization
  • Real-Time Analytics
  • Real-Time Data
  • Real-Time Monitoring
  • Real-Time Reporting
  • Reporting & Statistics
  • Reporting/Analytics
  • Repository Management
  • Risk Analysis
  • Risk Assessment
  • Risk Management
  • Role-Based Permissions
  • SSL Security
  • Search/Filter
  • Security Auditing
  • Self Service Portal
  • Single Sign On
  • Source-Code Scanning
  • Static Analysis
  • Status Tracking
  • Task Management
  • Task Progress Tracking
  • Third-Party Integrations
  • Threat Intelligence
  • Threat Protection
  • Threat Response
  • Trial License
  • Two-Factor Authentication
  • Usage Tracking/Analytics
  • User Management
  • Visual Analytics
  • Vulnerability Assessment
  • Vulnerability Management
  • Vulnerability Protection
  • Vulnerability Scanning
  • Vulnerability/Threat Prioritization
  • Web-Application Security
  • Workflow Management

Total features 23

  • Access Controls/Permissions
  • Activity Dashboard
  • Activity Tracking
  • Ad hoc Reporting
  • Alerts/Notifications
  • Anomaly/Malware Detection
  • Application Security
  • Approval Workflow
  • Assessment Management
  • Asset Discovery
  • Audit Trail
  • Authentication
  • Automated Containment
  • Bug Tracking
  • Bug/Issue Capture
  • Code Repository Integration
  • Collaboration Tools
  • Compliance Management
  • Configuration Automation
  • Continuous Deployment
  • Continuous Integration
  • Customizable Reports
  • Encryption
  • Endpoint Management
  • For Developers
  • Goal Setting/Tracking
  • Incident Management
  • Inventory Management
  • Issue Management
  • Issue Tracking
  • KPI Monitoring
  • License Inventory
  • License Tracking
  • Mobile Access
  • Monitoring
  • Multi-User Collaboration
  • Multiple Programming Languages Supported
  • Network Scanning
  • Password Protection
  • Patch Management
  • Performance Metrics
  • Policy Management
  • Prioritization
  • Real-Time Analytics
  • Real-Time Data
  • Real-Time Monitoring
  • Real-Time Reporting
  • Reporting & Statistics
  • Reporting/Analytics
  • Repository Management
  • Risk Analysis
  • Risk Assessment
  • Risk Management
  • Role-Based Permissions
  • SSL Security
  • Search/Filter
  • Security Auditing
  • Self Service Portal
  • Single Sign On
  • Source-Code Scanning
  • Static Analysis
  • Status Tracking
  • Task Management
  • Task Progress Tracking
  • Third-Party Integrations
  • Threat Intelligence
  • Threat Protection
  • Threat Response
  • Trial License
  • Two-Factor Authentication
  • Usage Tracking/Analytics
  • User Management
  • Visual Analytics
  • Vulnerability Assessment
  • Vulnerability Management
  • Vulnerability Protection
  • Vulnerability Scanning
  • Vulnerability/Threat Prioritization
  • Web-Application Security
  • Workflow Management
  • Auth0
  • Azure DevOps Services
  • Bitbucket
  • CircleCI
  • Eclipse IDE
  • GitHub
  • GitLab
  • Google App Engine
  • Google Cloud Build
  • Heroku
  • Jenkins
  • Microsoft Azure
  • Microsoft Visual Studio
  • OAuth
  • PyCharm
  • Slack
  • TeamCity
  • WebStorm
Not provided by vendor