Veracode Security Profile

CATEGORY

Security

Organization Details

What is

Veracode

?

This simple and scalable solution enables you to create more secure software so that you can boost your business and reduce risk without hindering innovation.

HEADQUARTERS

HOSTING

HOSTING LOCATION

SUBDOMAINS

  • pendo.veracode.com
  • login.analysiscenter.veracode.com
  • status.veracode.com
  • securityflawheatmap.veracode.com
  • community.veracode.com
  • api.status.veracode.com
  • sca.malachite.veracode.com
  • beta.status.veracode.com
  • airwatch.veracode.com
  • mail.veracode.com
  • asfy23.veracode.com
  • tools.veracode.com
  • info.veracode.com
  • lyncdiscover.veracode.com
  • ui.analysiscenter.veracode.com
  • sip.veracode.com
  • www.surveys.veracode.com
  • pages.veracode.com
  • web.analysiscenter.veracode.com
  • login.malachite.veracode.com
  • partner.veracode.com
  • mobile.veracode.com
  • downloads.veracode.com
  • sca-api.veracode.com
  • cdn.pendo.veracode.com
  • pt.analysiscenter.veracode.com
  • autodiscover.veracode.com

CURRENT USERS IN YOUR ORG

Start a trial to find out

Security Program

SECURITY PORTAL

BUG BOUNTY

VULNERABILITY DISCLOSURE

SECURITY CERTIFICATIONS

SOC2 Compliance
PCI Compliant
HIPAA Compliant
SOC2 Compliance
SOC 2 Compliant
GDPR Compliant
ISO 27001 Compliant
FedRamp Compliant
CSA Star Level 1
Compliant

supply chain

  • Bizzabo
  • Statuspage
  • Amazon Web Services (AWS)
  • Okta
  • Pendo
  • Ceros
  • VMware Workspace ONE
  • Salesforce Experience Cloud
  • Marketo
  • Google Analytics
  • Mimecast
  • DocuSign
  • Zoom Video Communications
  • CloudHealth by VMware
  • Apple Business Manager
  • Atlassian
  • Ensighten
  • New Relic
  • OneTrust
  • Intentsify
  • Cloudflare
  • Drift
  • Greenhouse Software
  • Google Tag Manager

Authentication

AUTHENTICATION / SSO

Supported Okta Features
  • SAML
Login with Google support
Login with Microsoft support
Supports SSO
Two-factor authentication via SMS
Two-factor authentication via E-mail
Two-factor authentication via Hardware
Two-factor authentication via Software
Two-factor authentication via TOTP
Two-factor authentication via U2F

OAUTH GRANTS in your org

Start a trial to find out

oauth details

Stop worrying about shadow IT security risks.

With an unrivaled, patented approach to SaaS discovery, Nudge Security inventories all cloud and SaaS assets ever created across your organization on Day One, and alerts you as new SaaS apps are adopted.