Sign in Agent Mode
Categories
Your Saved List Become a Channel Partner Sell in AWS Marketplace Amazon Web Services Home Help

GitGuardian Platform

GitGuardian

Reviews from AWS customer

3 AWS reviews

External reviews

256 reviews
from and

External reviews are not included in the AWS star rating for the product.


    Mahbub B.

It immediately detects security risks and gives good tips on how to fix them

  • May 22, 2025
  • Review provided by G2

What do you like best about the product?
It is quick in detecting risks and it easily gives tips on fixing those risks
What do you dislike about the product?
Nothing much, the UI could be more intuitive.
What problems is the product solving and how is that benefiting you?
For my personal use, it helps me secure my applications.


    Ari Kalfus

Proactive self-service capabilities remove the burden of the security team and enable faster remediation

  • May 21, 2025
  • Review provided by PeerSpot

What is our primary use case?

GitGuardian Platform is a security tool preventing the exposure of secrets. It is particularly valuable as a tool because it doesn't just identify exposed security issues, but works as a platform that gives developers an intuitive and easy way of reacting to and fixing the issues.

How has it helped my organization?

GitGuardian Platform captures all the major secret types we care about. It tends to be a bit overzealous in some categories, but it covers all the ones that we want to track and keep an eye on. It has great coverage over those.

GitGuardian Platform has helped save significant time for the security team by eliminating the need to seek out development teams and work with them on exposed secrets, as much of this is now handled proactively. The built-in process for developers interacting with exposed secrets saves them time fixing security problems before returning to their tasks. We can also provide customized remediation guidelines to developers.

Automated validity checks are super critical for us. If something is confirmed as valid in the platform, we know there is some externally accessible value that's exposed somewhere. It's then the top priority for us to engage in. It also gives us a lot of confidence. When the development teams come back and say that they have fixed it, GitGuardian Platform confirms that.

We rely a lot on GitGuardian Platform's self-service functionality so that developers handle incidents without us having to take action. We don't rely on automated severity scoring for incident management. While the severity rating is decent, we focus more on the validity feature and detector categories than on GitGuardian's high-risk ratings. We have customized remediation guidelines by providing specific internal context for handling exposed secrets. We use GitGuardian's integrations with other tracking platforms, but we don't have everything funneled into Jira. We use our own prioritization to see which ones we want to funnel into Jira.

The platform has given us a clear picture of the historical landscape, showing what has been fixed versus what remains hidden in historical data. This clarity has been helpful in planning security measures around issues that don't get self-healed.

We have it scanning our GitHub environments, Atlassian suite (Jira tickets, Confluence), and Slack messages. That gives us a nice coverage across the business.

What is most valuable?

The validity and self-healing playbook features of GitGuardian Platform is one of the most useful features for us. It automatically reaches out to developers for any leaks, notifying them immediately via email. We have Slack notifications set up, allowing developers to respond, provide feedback about sensitive values, and self-close issues by attesting completion on the platform. A high number of our exposures are remediated by developers before security needs to step in, as the self-healing playbook process engages them automatically. This results in issues being resolved within minutes, saving significant effort from the security team in tracking down or communicating with developers.

What needs improvement?

The analytics in GitGuardian Platform have a significant opportunity to better reflect the value provided to security teams and demonstrate actual activity occurring. While the self-healing capability and proactive developer actions are important features, the analytics do not provide information around this activity. They only track actions inside the platform when security team members assign themselves to issues and respond. The self-healing activity by developers isn't reflected in the analytics, requiring us to collect this data ourselves. This presents an opportunity for them to better showcase their developer-first remediation mindset.

For how long have I used the solution?

We have been using GitGuardian Platform for approximately nine months.

What do I think about the stability of the solution?

It's a stable platform, we don't often have to think about it. The SaaS platform has experienced two significant moments of downtime or instability in the last six months, requiring notices and retrospectives. We also run a self-hosted cluster which has not experienced these issues, though we've faced some challenges upgrading Kubernetes that required support assistance to prevent internal downtime.

What do I think about the scalability of the solution?

It is scalable. I would rate it a nine out of ten for scalability.

My product security team administrates the platform, with a few other security people accessing it. Access to respond to incidents is deployed for every engineer. Team-based provisioning is not yet supported with SCIM, which makes team-based grouping a hassle, so we do not use it.

How are customer service and support?

I would rate their technical support a nine out of ten.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

We were using a home-grown solution.

How was the initial setup?

The initial setup of the self-hosted cluster was moderately complex. We faced some issues because of the environment we had. We had to fix some installation errors and bugs in their Helm configuration.

In terms of deployment model, we self-host a cluster out of necessity. We have an internal GitHub Enterprise server. We self-host GitGuardian Platform to connect to that environment. We also use their SaaS version for Slack and Atlassian integrations.

What about the implementation team?

We implemented in-house.

What was our ROI?

The majority of our incidents for critical detectors and important secret types are remediated automatically or proactively by developers through GitGuardian's notification system, without security team involvement. It saves a lot of time for the security teams and the developers. It probably saves approximately 10 hours per week. Previously, we needed an extra 20% of our time focused on this subject area, which has now been saved because of this platform.

What's my experience with pricing, setup cost, and licensing?

It's competitively priced compared to others. Overall, the secret detection sector is expensive, but we are happy with the value we get.

Which other solutions did I evaluate?

We evaluated other vendors on the market. The secret detection capabilities of most vendors are basically equivalent, capturing all major types of secrets. The management and administration of findings after scanning is what differentiates vendors. Many alternatives lack strong administration capabilities for security teams after finding detections. GitGuardian's dashboard, self-healing playbooks, and ways for the security team to monitor, track, and deduplicate detections make it easier to manage the program compared to competitors.

What other advice do I have?

I would recommend GitGuardian Platform to other users due to the ease of management for the security team with the dashboard. It offers easy administration of results. The proactive self-service capabilities provided to developers remove the burden from the security team and enable faster remediation of exposed values.

My overall rating for GitGuardian Platform is an eight out of ten.


    Glenn McDonald

Improves coding hygiene and uncovers potentially nasty surprises

  • May 21, 2025
  • Review provided by PeerSpot

What is our primary use case?

We use GitHub as our source code platform. When we shifted from on-premise version control systems, we identified a requirement for capable tooling that could both find secrets that were committed in the past, and prevent and alert on secrets that were being accidentally committed.

How has it helped my organization?

GitGuardian gives us a better understanding of what's going on in our source code. Persistent use of the platform has allowed us to highlight areas where we need to improve; eg. providing training so that people know what information should and should not be in GitHub.

We've managed to use this data to improve practices related to where teams store their secrets, and have also been able to use it to understand where we might be lacking tooling.

When a developer commits a secret or there's a particular pattern in a repository, we often ask them about why they did this. They may turn around and say that there's no better option at the moment because we don't have a platform to suit x, y, or z. We can use that information to then drive decisions around whether or not we need to look into improved tooling or patterns that our engineering teams can use to avoid storing secrets in their source code.

What is most valuable?

Automated validity checks are very helpful; we use them to prioritise incidents, as they give us a quick understanding as to which secrets are still valid. They also help us to confirm that token invalidation - which sometimes has to be done by another team or a third party - has worked as expected.

We also utilize some of the automated playbooks, specifically those around automatic incident closure, allowing us to spend less time making sure that the incidents closed by changes to code are getting closed out.

Instantaneous notifications connected to our Slack platform allow us to deal quickly with incidents if and when they occur.

One of the best features of the solution, though, is the ability to use pre-push hooks. Preventing our developers from committing secrets into their source code before they hit the remote GitHub servers is ideal; it can be quite challenging and time consuming to remediate and rotate secrets once pushed to the remote.

The reporting feature has improved quite a bit since we first used it around five years ago, with filters that allow us to set up quick groups of or collections of filters and statuses to determine which secret detections are still unassigned and which are new. It allows us to easily ship those off to the developers involved in those incidents to get them remediated.

What needs improvement?

We'd love to see notification updates in Slack, as the system does not provide feedback on updates to incidents, which can be problematic when developers resolve issues.

ie. if a developer commits code that triggers an incident, the alert comes into Slack, but by the time someone looks at it through the Slack alerting channel, the developer might have gone and already fixed or closed the issue. There's no feedback loop back into the notification channel to show that it's been addressed.

Another thing that would be good to see is some more metrics on the usage of the GitGuardian pre-push hooks. It would be helpful to see which GitHub users have or do not have the pre-push hook capability turned on. That would allow us to chase people and say that we noticed that you're making commits, but you're not using GitGuardian, and encourage them to install ggshield before an accident happens.

For how long have I used the solution?

My experience with the solution started in November 2020, which is approximately four or five years.

What do I think about the stability of the solution?

It's generally quite stable.

There has been a little bit of downtime of late, and it has been reasonably impactful when it's not been scanning. We set up our repositories in GitHub with GitGuardian as a required check.

We had an incident for about four hours last week and another one about a month before that. Prior to that, it's been really stable.

What do I think about the scalability of the solution?

It handles all the repositories and commit activity we have.

How are customer service and support?

I would rate their technical support an eight out of ten.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

No

How was the initial setup?

We didn't have to do much. They manage all of the backend for us. All we have to do is integrate it into our GitHub organizations, and doing that is straightforward.

The solution does not require any maintenance.

What about the implementation team?

In-house.

What was our ROI?

It's challenging to quantify, but it has saved us from a bit of panic because we know the state of our source code. It's hard to determine what savings might come from having the tooling or not.

What's my experience with pricing, setup cost, and licensing?

It's fairly priced, as it performs a lot of analysis and is a valuable tool.

Which other solutions did I evaluate?

We have tested it against other solutions, such as TruffleHog, the open-source solution, and found the GitGuardian Platform to be about significantly better in terms of detection capabilities. TruffleHog focuses on secrets that it can validate, but in an Enterprise world with lots of internal tools, APIs and platforms it can miss a lot of secrets.

What other advice do I have?

The new multi-vault feature looks useful; we are planning to connect it up to AWS Secrets Manager and HashiCorp Vault.


    Jesus R.

Keep doing GreatJob

  • May 13, 2025
  • Review provided by G2

What do you like best about the product?
I really like how the notified incidents with keys are handled, and the detail for resolving them, plus the files involved in the leak.
What do you dislike about the product?
Instead of getting it by email, I'd like to set up a pipeline so that the email only comes through when something goes wrong.
What problems is the product solving and how is that benefiting you?
The way it notifies you is awesome because it makes sure your keys don't get exposed. But it would be even better to prevent it even more by doing a local test before each commit and showing the results locally before pushing to GitHub. Because once it's on Git, even if you stop tracking it later, if the repo ever goes public, the history is still visible.


    Jiaqi W.

good to be notified of key leaking in the project

  • May 08, 2025
  • Review provided by G2

What do you like best about the product?
promptly inform of any key leaking after pushing my code
What do you dislike about the product?
it only becomes visible to me when something bad happens. I hope it can automize the solution after detection
What problems is the product solving and how is that benefiting you?
detect any leaking key


    Kevin A.

It Actually Saved My ***!

  • April 10, 2025
  • Review provided by G2

What do you like best about the product?
Oh man, since I discover GG like 3 years ago, it has become a MUST-HAVE on all of my repos, I always double-check everything, but still, I'm a human and I can make mistakes… So it is always good to have a (yeah, let's called “Guardian” Lol) Guardian keeping the gates to my endpoints, buckets, etc., safe.
What do you dislike about the product?
Something it's missing it's a Mobile App
What problems is the product solving and how is that benefiting you?
On every project I have sold, I need to demonstrate to my clients that their information and the information of the end-users are properly handled, that includes all the keys/secrets to instances, databases and more. And in order to do so, one of the tools I use the most, is showing GitGuardian to ensure that we're handling the secrets properly.


    Riccardo D.

Saved from hacking

  • March 19, 2025
  • Review provided by G2

What do you like best about the product?
It tells you whenever there are some info leackage in your github repositories in automatic.
What do you dislike about the product?
Can be better functionalities regarding automatic capturing of errors or problems. There can be sometimes that the leakage is a false-positive.
What problems is the product solving and how is that benefiting you?
The problems regards security and information leakage


    Computer Software

Great application - saved my butt a few times

  • February 20, 2025
  • Review provided by G2

What do you like best about the product?
It's proactive and helpful. Easy to use. Great app.
What do you dislike about the product?
would it be possible for gitguardian to fix my repo, at my request, to remove secrets from my repo (including commit history in which secrets were inadvertently commited)?
What problems is the product solving and how is that benefiting you?
I have accidentally committed secret tokens to git a couple of times. It caught the issue and made me aware. It's been a while, though.


    Saurabh R.

Catch your secrets instantly

  • February 19, 2025
  • Review provided by G2

What do you like best about the product?
The steps to integrate the GitGuardian with your version control like GitHub is really easy and also we can integrate it in local as well so that at the time of code commit if you have any secrets like API Keys, IAM Keys or PII etc.gets detected by GitGuardian and it doesn't allow you to commit the code until you remove it. This is very helpful feature of GitGuardian in day to day life of any developer or devops person.
What do you dislike about the product?
There are no cons as such to tell here, it went well so far.
What problems is the product solving and how is that benefiting you?
We wanted something which will block every developer or any other person in our organisation to commit any secrets or PII information which very sensitive for us. And this was solved by GitGuardian and we can now commit and push out code to repositories without any fear of exposing sensitive information.


    Computer Software

Beginner friendly

  • October 07, 2024
  • Review provided by G2

What do you like best about the product?
As a novice, I stumbled upon GitGuardian and utilized it to protect sensitive data, particularly API keys and credentials, from accidental exposure. The tool continuously scans all repositories, including those that are private, in real time, which has been a source of confidence for me. The application is very user-friendly, and alarm bells are raised instantly when any threat is detected. I also appreciate that it does not interrupt my workflow, but rather enhances it by managing to integrate itself within my Git operations so that I devote more time towards coding rather than worrying about managing secrets. Customer support immediately responds with a valid mail about user having lost their confidential information online. This creates ease of implementation for a new member to the github community understanding what to and what not to disclose online. GitGuardian automatically gets active when a potential confidential information is leaked, making it the best among all other security methods. And no matter how many times does somebody repeat a mistake, GitGuardian always has their back which although makes frequency of use more but in the longer run teaches the end user something new each time.
What do you dislike about the product?
GitGuardian has many great functionalities for its users, but one drawback that I found is that some alerts tend to be over sensitive making them pick harmless things that do not require any action. This may be overwhelming especially for the newbie users, who are not yet clear with what a real threat entails. Furthermore, the usability of the software could be enhanced by making alert navigation as well as management easier. Nonetheless, these aspects are only a small fraction compared to the overall functionality commercialized, overall this creates easy environment for learners to protect their data whatsoever reevaluating confidential stuff.
What problems is the product solving and how is that benefiting you?
Anything related to keeping possibly confidential things private, if accidentally leaked on github, is taken care by gitguardian. This in itself is a huge feature.