We detected 1,238 companies using Github Advanced Security. The most common industry is Software Development (37%) and the most common company size is 2-10 employees (47%). We find new customers by discovering URLs with known URL patterns through web crawling or modifications to subprocessor lists.
Note: We track companies that are using Github Advanced Security in a public Github repo. We also track organizations that use Github here
📊 Who usually uses Github Advanced Security and for what use cases?
Source: Analysis of job postings that mention Github Advanced Security (using the Bloomberry Jobs API)
Job titles that mention Github Advanced Security
i
Based on an analysis of job titles from postings that mention Github Advanced Security.
Job Title
Share
Information Security Engineer
27%
DevOps Engineer / SRE
24%
Director, Information Security
11%
Application Security Engineer
10%
My analysis reveals that GitHub Advanced Security buyers span both security and engineering leadership, with Directors of Information Security (11%) and Directors of Software Engineering (4%) driving purchase decisions. These leaders are focused on scaling secure development practices, implementing DevSecOps at scale, and meeting compliance requirements across SOC 2, federal regulations, and industry standards. Leadership positions represent about 26% of all postings, indicating that GHAS adoption requires executive sponsorship to drive organizational change and cross-functional collaboration.
The day-to-day users are predominantly Information Security Engineers (27%) and DevOps Engineers (24%), who embed GHAS into CI/CD pipelines, configure SAST and SCA scanning, manage vulnerability remediation workflows, and build security automation. Application Security Engineers (10%) use it for secure code review, threat modeling, and developer enablement. These practitioners are implementing shift-left security, creating reusable workflows and templates, tuning quality gates to reduce false positives, and integrating GHAS with tools like SonarQube, Snyk, and cloud security platforms.
The recurring pain points center on scaling security without slowing development velocity and building security into the SDLC by default. Companies seek to "make secure design and delivery the default path for engineering teams" and "enable teams to move quickly without repeatedly solving the same security problems." I noticed emphasis on "shift-left security," "secure-by-design principles," and "reducing risk through secure by default architecture." Organizations want to "empower security teams to stay one step ahead" while "minimizing friction between security and engineering."
👥 What types of companies use Github Advanced Security?
Source: Analysis of Linkedin bios of 1,238 companies that use Github Advanced Security
Company Characteristics
i
Shows how much more likely Github Advanced Security customers are to have each trait compared to all companies. For example, 2.0x means customers are twice as likely to have that characteristic.
Trait
Likelihood
Funding Stage: Secondary market
158.8x
Funding Stage: Series C
53.2x
Industry: Computer Networking Products
42.7x
Funding Stage: Post IPO debt
35.2x
Industry: Computer and Network Security
19.5x
Industry: Software Development
15.4x
I noticed that Github Advanced Security attracts companies building developer-facing infrastructure and technical products. These aren't retail businesses or traditional service companies. They're creating platforms, APIs, databases, cloud services, and open-source tools. Companies like Elastic building search platforms, Docker providing container infrastructure, Dynatrace delivering observability solutions, and Fastly operating edge cloud platforms. Even those in seemingly different industries like Einride (freight) or Utility Warehouse (home services) are fundamentally technology companies building software products.
These companies span the full maturity spectrum, but most are in active growth phases. I see post-IPO giants like Expedia Group and Elastic alongside Series A startups like E2B and pre-seed companies like Wafer. However, the majority cluster around Series A through Series C stages with 50-500 employees. Even mature companies like Docker or Dynatrace position themselves as innovators still scaling. The common thread is that they're all actively building and shipping software at scale, not maintaining legacy systems.
🔧 What other technologies do Github Advanced Security customers also use?
Source: Analysis of tech stacks from 1,238 companies that use Github Advanced Security
Commonly Paired Technologies
i
Shows how much more likely Github Advanced Security customers are to use each tool compared to the general population. For example, 287x means customers are 287 times more likely to use that tool.
I noticed that companies using Github Advanced Security are deeply invested in security-first DevOps practices and modern cloud infrastructure. The extremely high correlation with Dependabot tells me these organizations prioritize automated security scanning and dependency management, which means they're likely running complex applications where vulnerabilities could have serious business consequences. The presence of Helm and Terraform shows they're operating at significant scale with containerized applications and infrastructure as code.
The pairing of Dependabot with Github Advanced Security makes perfect sense because these companies want comprehensive security coverage across their entire codebase, from vulnerabilities in their own code to risks in third-party dependencies. The Terraform and Helm combination is equally telling. These teams are managing sophisticated cloud deployments, probably across multiple environments, and need the kind of security guardrails that Github Advanced Security provides to catch issues before they reach production. The high adoption of AI coding agents alongside these security tools suggests teams that are moving fast and need automated security checks to keep pace with AI-accelerated development.
The full stack reveals these are product-led companies in growth or mature stages. They've moved past scrappy startup phase and built serious engineering teams that need enterprise-grade tooling. The verified Github organizations and Azure Pipelines presence indicates they have formal security requirements, possibly due to enterprise customers, compliance needs, or handling sensitive data. These aren't marketing-led companies focused on acquisition tactics. They're building complex technical products where security and reliability are competitive advantages.
Alternatives and Competitors to Github Advanced Security
Explore vendors that are alternatives in this category