Send message to

Do you want to send the message without a subject?
Please note that your message can be maximum 1000 characters long
Special characters '<', '>' are not allowed in subject and message
reCaptcha is invalid.
reCaptcha failed because of a problem with the server.

Your message has been sent

You can find the message in your personal profile at "My messages".

An error occured

Please try again.

Make an appointment with

So that you can make an appointment, the calendar will open in a new tab on the personal profile of your contact person.

Create an onsite appointment with

So that you can make an onsite appointment, the appointment request will open in a new tab.

JFrog of the it-sa 365
Supplier

JFrog

DevOps-Centric Security: Protect from Code to Edge

About us

south_east

Employees

south_east

Products

south_east

Actions

south_east

We offer

  • Data recovery
  • Cloud (computing) security
  • Application security
21 Boulevard de la Marquette
31000 Toulouse
France

About us

JFrog Ltd. (Nasdaq: FROG), is on a mission to create a world of software delivered without friction from developer to device. Driven by a “Liquid Software” vision, the JFrog Software Supply Chain Platform is a single system of record that powers organizations to build, manage, and distribute software quickly and securely, ensuring it is available, traceable, and tamper-proof. The integrated security features also help identify, protect, and remediate against threats and vulnerabilities. JFrog’s hybrid, universal, multi-cloud platform is available as both self-hosted and SaaS services across major cloud service providers. Millions of users and 7K+ customers worldwide, including a majority of the Fortune 100, depend on JFrog to secure their mission-critical software supply chains. Once you leap forward, you won’t go back! Learn more at jfrog.com and follow us on Twitter: @jfrog.

  ... read more

Employees

show more

Products

Keywords

Container Security | Application Security | DevSecOps | Open Source Software Security | Software Security | Software Vulnerability

close

This content or feature is available to the it-sa 365 community. 
Please register or log in with your login data.