Flexnet Code Insight

End-to-end solution for on-premise OSS licence compliance and vulnerability risk management

FlexNet Code Insight Life Cycle

FlexNet Code Insight manages OSS license compliance and vulnerability risk by automating the full process, including the request-to-use OSS and third-party code, scanning and reconciliation of actual to requested content, production of compliance documents and ongoing vulnerability scanning and intellectual property alerts. Its robust compliance library includes over 12.9 million open source components and over 2.5 million automated detection rules as well as integrated request and authorization workflow.

library_books

Growing library of 12.9 million open source components, including vulnerability database

search

Over 2.5 million automated detection rules

loop

Integrated request and authorisation workflow

home_filled

100% on-premise availability for secure deployments

fingerprint

Source code fingerprint and snippet matching

Communicating with Technology

Who uses FlexNet Code Insight?

FlexNet Code Insight is used by over 400 software vendors, intelligent device and Internet of Things manufacturers as well as internal application development teams at enterprise and government organizations to simplify and manage their end-to-end policy for use of open source.

analytics

Flexible analysis

Multiple levels of analysis from quick assessment to detailed forensic analysis satisfy varying business needs. Patented scan and analysis technology yields comprehensive scan results for both source and binary materials.

feed

Stay current with automated updates

Update service adds components, versions, licenses, rules and vulnerabilities weekly (sometimes daily) so your systems use the latest information.

troubleshoot

Quickly locate OSS components

Over 12.9 million open source components help you quickly find specific OSS or commercial components in use within your portfolio of products.

fact_check

Track compliance quickly and accurately

FlexNet Code Insight identifies, approves, and tracks third-party content elements used in your code for compliance with your IP and security policies. Over 2.5 million automated detection rules make analysis faster and more accurate.

published_with_changes

Act immediately on security alerts

Vulnerability alerts notify development and security teams if new application security vulnerabilities are reported for components in use.

switch_access_shortcut_add

Guide Developers

Proven request and authorization workflow enables developers to request and receive permission before new code enters the code base and maintains a history of the request and usage details.