Latka logo

Top 19 Static Application Security Testing (SAST) Software SaaS Companies in May 2026

As of May 2026, there are 19 SaaS companies in Static Application Security Testing (SAST) Software. They have combined revenues of $135.4M and employ 1.1K people. They have raised $40.3M and serve - customers combined.

Static Application Security Testing (SAST) software refers to tools and methodologies that analyze source code, bytecode, or binary code to identify security vulnerabilities within applications prior to deployment. This approach, often described as white-box testing, enables developers to detect and resolve potential security flaws early in the development lifecycle, thereby reducing the risk of vulnerabilities in production environments. The primary use cases of SAST software include scanning the source code for issues such as input validation errors, insecure coding practices, and dependencies that may pose security risks. Typical features of SAST tools encompass automated scanning, detailed reporting on vulnerabilities, integration with continuous integration/continuous deployment (CI/CD) pipelines, and support for various programming languages. The common buyer personas for SAST solutions typically include software developers, security teams, and DevOps engineers who seek to enhance application security while maintaining development efficiency.

Companies
19
Revenue
$135.4M
Funding
$40.3M
Employees
1.1K

Filters

Sorting: Highest -> Lowest

Filters

Top Static Application Security Testing (SAST) Software Companies

Showing 10 of 6 companies ranked by annual revenue.

1
SEWORKS

San Francisco, California, United States

Operator of a platform intended to offer offensive and defensive application security services. The company's platform ensures applications are safe from dangerous hacking threats that can destroy intellectual property and expose sensitive user information, enabling developers to focus on building great products by providing comprehensive and easy-to-use security services.

Revenue
$4.8M
Customers
-
Year founded
2013
Funding
-
Team size
28
Growth
979.97%
2
DeepFactor

San Jose, California, United States

DeepFactor enables developers to ship secure code without sacrificing productivity by observing application telemetry events.

Revenue
$3.9M
Customers
-
Year founded
2019
Funding
$15M
Team size
39
Growth
22.67%
3
SOOHO

Seoul, South Korea

Provider of a SaaS platform intended for auditing smart contract vulnerabilities and blockchain transactions in real-time. The company's platform will allow an automated/API-based smart contract audit and patching platform, which will enable continuous secure development of an anti-fraud and AML compliance module that analyzes suspicious transaction activity, enabling the users to identify flaws in a codebase earlier which can save money and time.

Revenue
$3.1M
Customers
-
Year founded
2019
Funding
-
Team size
28
Growth
48.19%
4
Software Secured

Ottawa, Ontario, Canada

Developer of network security technology intended to integrate security earlier into software development lifecycle. The company's platform helps to bridge the gap between development teams and security by integrating open source security tools into SDLC, enabling organization's software development teams to identify vulnerabilities faster in their code, which reduces the cost of finding and fixing bugs.

Revenue
$2.9M
Customers
-
Year founded
2010
Funding
-
Team size
18
Growth
46.35%
5
Pixee

Palo Alto, California, United States

Pixee is an AI-powered platform that automatically identifies and fixes code vulnerabilities, improves code quality, and enhances performance. It integrates into developers' workflows, providing real-time fixes and suggestions without disrupting productivity. Pixee aims to reduce the security burden on developers by automatically hardening code and allowing them to focus on creating features rather than fixing bugs.

Revenue
$2.8M
Customers
-
Year founded
2022
Funding
-
Team size
25
Growth
-
6
Threatrix

Dallas, Texas, United States

Threatrix is revolutionizing software supply chain security and license compliance with our advanced IDE plugin. Our cutting-edge technology ensures that your code is secure and compliant from the very first line, integrating seamlessly into your development environment. We offer continuous, automated compliance checks and real-time security assessments directly within developers IDE. Our platform swiftly detects and remediates AI-generated and copy/pasted code snippets across more than 420 programming languages, ensuring comprehensive protection and compliance. Our user-friendly interface allows compliance teams to set up and enforce policies effortlessly, providing instant alerts for infractions. This proactive approach minimizes risks, saves valuable developer time, and reduces costly remediation efforts. At Threatrix, we empower your development team to focus on innovation while maintaining the highest security and compliance standards. Join us in transforming how you manage open source risks and license compliance. Actionable results drive measurable reductions in risk and compliance, saving organizations developer time and costly remediation efforts for compliance teams. We specialize in cost-effective audits requiring less than one week of an organization's time. Threatrix identifies all open source vulnerabilities and third-party code with snippet-level license detection, providing organizations with a complete health assessment of the target's code. We would appreciate the opportunity to enable your team to produce secure and compliant code in a simplified way.

Revenue
$1.4M
Customers
-
Year founded
2019
Funding
-
Team size
13
Growth
-

Inclusion Criteria

- Must offer automated scanning of source code, bytecode, or binaries for security vulnerabilities - Should provide detailed reporting on identified vulnerabilities and remediation guidance - Must integrate with CI/CD workflows to facilitate continuous security testing - Should support multiple programming languages and development frameworks - Not just focused on dynamic analysis; must also include static code analysis capabilities - Should offer features for prioritizing vulnerabilities based on severity