Flexnet Code Insight

End-to-end solution for on-premise OSS licence compliance and vulnerability risk management

FlexNet Code Insight Life Cycle

FlexNet Code Insight manages OSS license compliance and vulnerability risk by automating the full process, including the request-to-use OSS and third-party code, scanning and reconciliation of actual to requested content, production of compliance documents and ongoing vulnerability scanning and intellectual property alerts. Its robust compliance library includes over 12.9 million open source components and over 2.5 million automated detection rules as well as integrated request and authorization workflow.


Growing library of 12.9 million open source components, including vulnerability database


Over 2.5 million automated detection rules


Integrated request and authorisation workflow


100% on-premise availability for secure deployments


Source code fingerprint and snippet matching

Communicating with Technology

Who uses FlexNet Code Insight?

FlexNet Code Insight is used by over 400 software vendors, intelligent device and Internet of Things manufacturers as well as internal application development teams at enterprise and government organizations to simplify and manage their end-to-end policy for use of open source.


Flexible analysis

Multiple levels of analysis from quick assessment to detailed forensic analysis satisfy varying business needs. Patented scan and analysis technology yields comprehensive scan results for both source and binary materials.


Stay current with automated updates

Update service adds components, versions, licenses, rules and vulnerabilities weekly (sometimes daily) so your systems use the latest information.


Quickly locate OSS components

Over 12.9 million open source components help you quickly find specific OSS or commercial components in use within your portfolio of products.


Track compliance quickly and accurately

FlexNet Code Insight identifies, approves, and tracks third-party content elements used in your code for compliance with your IP and security policies. Over 2.5 million automated detection rules make analysis faster and more accurate.


Act immediately on security alerts

Vulnerability alerts notify development and security teams if new application security vulnerabilities are reported for components in use.


Guide Developers

Proven request and authorization workflow enables developers to request and receive permission before new code enters the code base and maintains a history of the request and usage details.