TrustRadius: an HG Insights company

Aikido Security

Score8.1 out of 10

2 Reviews and Ratings

What is Aikido Security?

Aikido's security platform supports developers and security teams alike with full security visibility, insights, and automatic vulnerability fixes. Aikido helps security teams with:

- False-positive reduction

- AI Autotriage & AI Autofix

- Deep integration into the dev workflow (from IDEs and task managers to CI/CD gating)

- Automated Compliance


Aikido's covers the entire Software Development Lifecycle (SDLC), including: static application security testing (SAST), dynamic application security testing (DAST), infrastructure-as-code (IaC), container scanning, secrets detection, open source license scanning (SCA), cloud posture management (CSPM), and runtime protection.

Media

Screenshot of an example of no bullsh*t security for devs. Aikido Security can secure code, cloud, and runtime environments.
Screenshot of an overview of how Aikido Security provides total security coverage across company infrastructure.
Screenshot of where to find Aikido's Al Autotriage, deduplication, and custom rules.
Screenshot of how Aikido Al fixes vulnerabilities automatically. Features like AI Autotriage and AI Autofix help prioritize and remediate vulnerabilities proactively.
Screenshot of some of Aikido's available integrations.

1 / 5

Screenshot of an example of no bullsh*t security for devs. Aikido Security can secure code, cloud, and runtime environments.

Top Performing Features

  • Vulnerability Intelligence

    Software that is able to label and store information about vulnerabilities to access for future use cases.

    Category average: 8.2

  • Threat Recognition

    Detection and recognition of malicious software within a network that could pose a threat to sensitive information.

    Category average: 7.9

  • Automated Alerts and Reporting

    Systems in place to automatically alert, report, or notify of issues that may need timely remediation.

    Category average: 8.1

Areas for Improvement

  • Web Scanning

    Specifically scans webpages for potential threats or vulnerabilities.

    Category average: 7.8

  • Vulnerability Classification

    Prioritizing vulnerabilities, to determine which vulnerabilities are most urgent and require a quicker resolution.

    Category average: 8.7

  • Threat Analysis

    Analyzing known factors such as behavior patterns, affected areas, and other specific features to more easily identify a threat.

    Category average: 8.1

Aikido Security, an indispensable tool in our security toolkit.

Use Cases and Deployment Scope

Infrastructure Vulnerabilities:
Aikido Security helps us identify and mitigate vulnerabilities before they can be exploited.

Code Security Flaws:
Aikido Security scans our codebase to detect security flaws, ensuring that potential threats are addressed early in the development cycle.

Compliance and Regulatory Requirements:
Aikido Security provides tools that help us ensure compliance.

Pros

  • Engage with their customer
  • Ease our mind, knowing that we will not be overloaded with false-positive vulnerability warnings

Cons

  • It would be nice to add Aikido RMM agents to our infrastructure that report to security statusses to the Aikido cloud

Return on Investment

  • By avoiding an overload of false positive vulnerability reports, we can focus on resolving the actual positives, instead of wasting time on triage

Usability