

HCL AppScan and OpenText Core Application Security are both strong contenders in the application security domain. HCL AppScan appears to have an edge due to its capabilities in code scanning tools, scalability, and vulnerability detection, leading to higher user satisfaction.
Features: HCL AppScan offers key features such as effective vulnerability detection, integration with development pipelines, and low false-positive rates. OpenText Core Application Security is notable for its focus on DevOps lifecycle improvements, error reduction, and enhancing application security postures.
Room for Improvement: HCL AppScan users suggest enhancements in handling false positives, support for mobile applications, and integration capabilities. OpenText Core Application Security could improve false positive reduction, report visualizations, and third-party tool integration.
Ease of Deployment and Customer Service: Both solutions provide versatile deployment options like on-premises, public cloud, and hybrid setups. HCL AppScan is recognized for user-friendliness and swift deployment, while OpenText Core Application Security is commended for its responsive customer support.
Pricing and ROI: While both products have similar pricing models, HCL AppScan's higher cost is often justified by its extensive features. OpenText Core Application Security is seen as cost-effective, especially for subscription models, with both delivering solid ROI by minimizing vulnerabilities and operational costs.
Veracode provides excellent assistance and regularly scheduled calls to address customer concerns and updates.
There is still room for improvement when it comes to the speed of response.
I had direct interaction with them, which facilitated how we onboarded Fortify.
Support tickets often stay open for one month to three months, which leads to customer frustration.
If a customer wants to know the tools and the technology used for their application to scan their application, they provide less information on that.
Since we've been using HCL AppScan for about three months, we really have not encountered a false positive.
Currently, you can find out the components belonging to a specific software, but if detailed reporting became available, you would be in a better position to identify vulnerabilities.
It would be beneficial if Fortify could check for CVEs (Common Vulnerabilities and Exposures) in third-party libraries, which I currently use a separate dependency checker tool for.
One thing I would highlight is if Fortify can focus more on the centralized dashboard of the tools because nowadays, tools such as SentinelOne also exist for identifying security issues, but they have a centralized dashboard that merges their cloud solution and application security side solution together.
It would be better for Fortify on Demand if they could analyze not only the security pillar but also maintainability, portability, and reliability, covering all pillars of ISO 25000.
Companies often choose based on budget constraints, with Veracode being on the higher end cost-wise.
We were able to identify security issues such as certificate-related issues, authentication-related issues, and weak encryption-related issues.
AppScan's most valuable features include its ability to identify vulnerabilities accurately, provide detailed remediation steps, and the newly introduced AI-powered features that enhance its functionality further.
Fortify helps me find serious issues, such as developers inadvertently leaving access tokens, including API access tokens, in the source code.
On demand you have two levels of reports: the first from the tool, which is the same as we can get from Fortify on-premises, and a next level reporting made by experts from OpenText, leading to a more condensed and precise report as level three.
Additionally, you can integrate Fortify in CICD pipeline, so you get real-time updates about the security issues in your pipeline.
| Product | Market Share (%) |
|---|---|
| OpenText Core Application Security | 3.2% |
| HCL AppScan | 2.3% |
| Other | 94.5% |


| Company Size | Count |
|---|---|
| Small Business | 14 |
| Midsize Enterprise | 6 |
| Large Enterprise | 31 |
| Company Size | Count |
|---|---|
| Small Business | 17 |
| Midsize Enterprise | 8 |
| Large Enterprise | 44 |
IBM Security AppScan enhances web application security and mobile application security, improves application security program management and strengthens regulatory compliance. By scanning your web and mobile applications prior to deployment, AppScan enables you to identify security vulnerabilities and generate reports and fix recommendations.
OpenText Core Application Security offers robust features like static and dynamic scanning, real-time vulnerability tracking, and seamless integration with development platforms, designed to enhance code security and reduce operational costs.
OpenText Core Application Security is a cloud-based, on-demand service providing accurate and deep scanning capabilities with detailed reporting. Its integrations with development platforms ensure an enhanced security layer in the development lifecycle, benefiting users by lowering operational costs and facilitating efficient remediation. The platform addresses needs for intuitive interfaces, API support, and comprehensive vulnerability assessments, helping improve code security and accelerate time-to-market. Despite its strengths, challenges exist around false positives, report clarity, and language support, alongside confusing pricing and package options. Enhancements are sought in areas like CI/CD pipeline configuration, report visualization, scan times, and integration with third-party tools such as GitLab, container scanning, and software composition analysis.
What features define OpenText Core Application Security?Industries like mobile applications, e-commerce, and banking leverage OpenText Core Application Security for its ability to identify vulnerabilities such as SQL injections. Integrating seamlessly with DevSecOps and security auditing processes, this tool supports developers in writing safer code, ensuring secure application deployment and enhancing software assurance.
We monitor all Application Security Tools reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.