What is Cartography?
Aims to enable a broad set of exploration and automation scenarios. It is particularly good at exposing otherwise hidden dependency relationships between your service's assets so that you may validate assumptions about security risks.
Cartography is a tool in the Security category of a tech stack.
Cartography is an open source tool with 955 GitHub stars and 45 GitHub forks. Here’s a link to Cartography's open source repository on GitHub
Who uses Cartography?
No developer stacks found
Amazon EC2, Amazon S3, AWS Elastic Load Balancing (ELB), Neo4j, and Amazon Elasticsearch Service are some of the popular tools that integrate with Cartography. Here's a list of all 5 tools that integrate with Cartography.
Why developers like Cartography?
Here’s a list of reasons why companies and developers use Cartography
Be the first to leave a pro
- Open source
Cartography Alternatives & Comparisons
What are some alternatives to Cartography?
See all alternatives
Let’s Encrypt is a free, automated, and open certificate authority brought to you by the non-profit Internet Security Research Group (ISRG).
We make the best rated Two-Factor Authentication smartphone app for consumers, a Rest API for developers and a strong authentication platform for the enterprise.
It is a framework that focuses on providing both authentication and authorization to Java applications. The real power of Spring Security is found in how easily it can be extended to meet custom requirements.
AWS WAF is a web application firewall that helps protect your web applications from common web exploits that could affect application availability, compromise security, or consume excessive resources.
Sqreen is a security platform that helps engineering team protect their web applications, API and micro-services in real-time. The solution installs with a simple application library and doesn't require engineering resources to operate. Security anomalies triggered are reported with technical context to help engineers fix the code. Ops team can assess the impact of attacks and monitor suspicious user accounts involved.
No related comparisons found