We use Micro Focus Fortify on Demand to check the vulnerabilities of developments that we perform.
Production Manager for Nearshore SWaT at a computer software company with 1,001-5,000 employees
Stable and shows the vulnerabilities online while checking the code, but it is quite expensive
Pros and Cons
- "The feature that I find the most useful is being able to just see the vulnerabilities online while checking the code and then checking suggestions for fixing them."
- "The thing that could be improved is reducing the cost of usage and including some of the most pricey features, such as dynamic analysis and that sort of functionality, which makes the difference between different types of tools."
What is our primary use case?
What is most valuable?
The feature that I find the most useful is being able to just see the vulnerabilities online while checking the code and then checking suggestions for fixing them.
What needs improvement?
The thing that could be improved is reducing the cost of usage and including some of the most pricey features, such as dynamic analysis and that sort of functionality, which makes the difference between different types of tools.
For how long have I used the solution?
I have been using this product for four years.
Buyer's Guide
OpenText Core Application Security
March 2026
Learn what your peers think about OpenText Core Application Security. Get advice and tips from experienced pros sharing their opinions. Updated: March 2026.
884,873 professionals have used our research since 2012.
What do I think about the stability of the solution?
It is stable.
What do I think about the scalability of the solution?
It is scalable. However, it poses a challenge in terms of pricing and licensing.
How are customer service and support?
I haven't contacted their support, but I know that a team was in touch with Fortify technical support because they do get to have a lot of questions about migrating the software, licensing, and other stuff. They contact the support quite often. I know that they get responses, not always the ones they would like, but they do get a response from them.
Which solution did I use previously and why did I switch?
I have used SonarQube but not at the same level. It has some functionalities that are related to security. It does not go as deep as Micro Focus Fortify on Demand.
We have evaluated other tools that are competitors of Micro Focus Fortify on Demand, but we still decided to keep Micro Focus Fortify on Demand.
How was the initial setup?
I wasn't responsible for setting it up.
What about the implementation team?
We have a team that works with the product. All development teams work with this team to accomplish the goals. Everything was set up by this team, and afterward, the development team just has to look at the reports and vulnerabilities so that they can run scans.
What's my experience with pricing, setup cost, and licensing?
It is quite expensive. Pricing and the licensing model could be improved.
What other advice do I have?
Before using it, evaluate other possibilities because it's quite expensive if you don't have the need to use it. For example, replace it with SonarQube or another competitor's tool that may not do quite the same thing, but it is enough for what you want for your objectives. It could be a cheaper way to get to those goals.
I would rate Micro Focus Fortify on Demand a seven out of ten. Improvement in pricing would be the biggest thing that would improve the scoring.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Vice President - Solution Architecture at a financial services firm with 10,001+ employees
Easy to use and the reporting is good, but does not support dynamic application security testing
Pros and Cons
- "Fortify on Demand is easy to use and the reporting is good."
- "The vulnerability analysis does not always provide guidelines for what the developer should do in order to correct the problem, which means that the code has to be manually inspected and understood."
What is our primary use case?
We are using Fortify on Demand as a static code analyzer. As it scans each application, it checks each line of code. When we are developing mobile applications there might be some kind of security vulnerability. One example is a check to see if information that is being transferred is not encrypted because this would be vulnerable to hackers who are trying to break into the system. We also look at whether were are using the network transport layer security.
Our overall goal at this time is to protect our mobile app because it is one of the ways that hackers can break into the system.
What is most valuable?
Fortify on Demand is easy to use and the reporting is good.
As for the static code analysis functionality, it is doing the job that it is supposed to do.
What needs improvement?
This solution cannot do dynamic application security testing. It needs to be able to simulate a situation where a hacker is trying to break into the system.
The vulnerability analysis does not always provide guidelines for what the developer should do in order to correct the problem, which means that the code has to be manually inspected and understood. Adding more information to provide a better analysis would be an improvement.
This solution would benefit from having more customization available for the reports.
For how long have I used the solution?
We have been evaluating Fortify on Demand for close to a year.
What do I think about the stability of the solution?
Fortify on Demand has been stable from what I have seen. We have not had any problem with the reports, and we have not seen any instability or glitches.
What do I think about the scalability of the solution?
In our trial, there are seven or eight applications that are relying on this solution. Different departments in our company have their own technology centers in different locations, and I am not aware of what the other departments are doing.
How are customer service and technical support?
I have not interacted with the Fortify on Demand technical support team directly. Our own infrastructure support is the group that would deal with them. My team only communicates with our internal support.
Which solution did I use previously and why did I switch?
We did not use another solution prior to starting our evaluation that includes Fortify on Demand. People were relying on some open-source static code analyzers. However, I don't think that it was very reliable.
How was the initial setup?
My understanding is the this is not a difficult solution to manage and maintain.
What about the implementation team?
Our server infrastructure team handles the deployment and maintenance of this solution. They update it regularly as patches or new versions are released. They look into all of the tools that we use and perform the installation, as well as manage them.
Which other solutions did I evaluate?
We are currently using WebInspect but it does not satisfy all of our requirements. We are continuing to research other tools from other vendors, including open-source technologies. We have not fully decided yet. Before deciding on any product or vendor, we have to look at the whole cost of procuring the product license, as well as the recurring cost.
What other advice do I have?
Fortify on Demand is a product that I recommend but the suitability of this solution depends on exactly what the requirements are. Every product has a unique feature as well as limitations with respect to what it can and can not do. What it comes down to is how the application is built, as well as the technology stack. The licensing costs are also something that needs to be considered.
Overall, it is a very good tool and it works well for what it is designed for.
I would rate this solution a seven out of ten.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Buyer's Guide
OpenText Core Application Security
March 2026
Learn what your peers think about OpenText Core Application Security. Get advice and tips from experienced pros sharing their opinions. Updated: March 2026.
884,873 professionals have used our research since 2012.
Sr. Enterprise Architect at a financial services firm with 5,001-10,000 employees
Good development platform integration promotes a culture of Security by design
Pros and Cons
- "The most valuable feature is that it connects with your development platforms, such as Microsoft Information Server and Jira."
- "This solution would be improved if the code-quality perspective were added to it, on top of the security aspect."
What is our primary use case?
I have been using this solution to gain some perspective from different architectures for the security team. I do not use it every day. I do have an overview and it is integrated with our development platform.
I do work for our governance team, so whenever a project is coming I will review products. I need to connect with the project managers for testing them, and these tests include the vulnerability assessment along with other security efforts. One of the things that I suggest is using Micro Focus Fortify on Demand.
The primary use case is core scanning for different vulnerabilities, based on standards. It beings with an architect who designs a model on a security-risk advisor platform. Then you have an idea of what the obstacles are. Once the code is scanned according to standards, you figure out where the gaps are. The team then suggests what needs to be done to the code to fix the vulnerabilities. The process repeats after the code is fixed until all of the vulnerabilities have been eliminated.
When you take all of these things together, it is Security by design.
What is most valuable?
The most valuable feature is that it connects with your development platforms, such as Microsoft Information Server and Jira. When a vulnerability is found then it is classified as a bug and sent to IT.
What needs improvement?
This solution would be improved if the code-quality perspective were added to it, on top of the security aspect. It would rate performance and other things. This is one of the reasons that people are interested in SonarQube. This would make it a more complete and unique platform that would be a great player in the industry.
For how long have I used the solution?
We have been using Micro Focus Fortify on Demand over the past four years.
What do I think about the stability of the solution?
This is a very stable solution. Once it is deployed there are not a lot of challenges.
What do I think about the scalability of the solution?
This platform is very much scalable in terms of integrating with other solutions.
We have about 600 developers, but I think that we have between 300 and 400 who using Fortify on Demand.
How are customer service and technical support?
I have not been in touch with technical support from the vendor.
Our technical support team is comprised of three people. Two of them help to demonstrate the product and instruct people on how it works. The other one is connected to the development team and can help with troubleshooting issues.
Which solution did I use previously and why did I switch?
We also use WebInspect, SonarQube, and other security tools in addition to this solution. The use of particular tools depends on the project and the project manager that I speak with.
Prior to working with Fortify on Demand, we worked using the code analysis capability in Microsoft Visual Studio. That is where you have things like the recommended best practices for .NET. It flags what lools like bugs.
How was the initial setup?
The initial setup was quite simple.
I performed the deployment a couple of times on different platforms and it did not take much effort to set up. I also did the integration with other platforms like Microsoft Information Server and it was quite easy. You just need to know the platform that you are integrating into.
When it came time to deploy, I just had to run through the documentation on the vendor's web site. I spent one day reading it and one the second day, I did my integration. It took about eight hours that day, and I had challenges but they came from the platform that I was integrating into, like Microsoft Information Server. There were things to be done, such as converting XML files. The next day I was able to fix the problems, so in total it took me between nine and twelve hours to integrate it.
The second time that I deployed this solution it took me not more than two or three hours to repeat all of these same steps.
What about the implementation team?
I had one person from Fortify to assist me with the deployment and integration with Microsoft Information Server. We also had some peers working with us. For example, I had the global head of security assurance working with me. Between us, we got everything working.
Which other solutions did I evaluate?
We did not evaluate other vendors beyond the solutions that we are using.
What other advice do I have?
My advice to anybody who is considering this solution is to first get buy-in from the entire organization about adopting a culture of Security by design. Fortify on Demand can scan your code, but you need to have plans in place for what needs to be done when problems are identified. It may mean that things will have to change with regards to how code is being written. It may also require integration with other platforms. You can't just start scanning without first understanding what the security architecture is. You need to understand the vulnerabilities and all of the standards, as well. Essentially, I would recommend a security design overhaul.
I would rate this solution an eight out of ten.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Chief Executive & Certified Security Administrator at Boch Systems Company Limited
Good for banking and financial institutions to manage and test product lifecycles
Pros and Cons
- "This product is top-notch solution and the technology is the best on the market."
- "The technical support is actually a problem that needs to be addressed. Since the acquisition and merger with Hewlett Packard, it has been really hard to know who the technical or salesperson to talk to."
What is our primary use case?
We recommend this product to our customers. We act as vendors and resellers. This is actually one of the solutions we often recommend to our customers most often. Usually, this is the best choice for banking and financial institutions. It is deployed by their development team in-house. They use it to manage and test product lifecycles.
What is most valuable?
We actually find all of the product's features valuable. But at this point, we are trying to upsell by adding additional components like RAFT (Re-usable Automation Framework for Testing) to the test cycle.
What needs improvement?
Strictly in terms of this product, I think it is a top-notch solution and I think the technology is still the best on the market. What might be improved is maybe just look at the pricing. It is a bit confusing compared to other products that we also sell.
Whatever innovation they can come up with would be an excellent addition if it adds useful functionality. The only thing I can think of that they might add is something like features you can find in Codebashing that they have not yet implemented. I don't know if it has all of those features. If not, it would be useful for something like that to be added.
For how long have I used the solution?
We have been suggesting the product since before the merger with Hewlett Packard.
What do I think about the stability of the solution?
This is a very stable product.
What do I think about the scalability of the solution?
This product is scalable. Most of our customers are enterprise customers. I can point out three off the top of my head. If the product can scale to the enterprise level, it makes sense that it is quite scalable.
How are customer service and technical support?
The technical support is actually a problem that needs to be addressed. Since the acquisition and merger with Hewlett Packard, it has been really hard to know who the technical or salesperson to talk to. Micro Focus has a whole lot of solutions that are of value in our region, but it seems that they are not doing a proper job of coordination of knowledge. There is a huge knowledge gap from the Micro Focus team in the way they support businesses. We were hoping that the transition was the thing that affected the lack of better support. But by now we should be able to point to who the person is that is in charge and the person to talk to when it comes to the various products. I really don't know anybody in charge of the technical team to help us properly with issues.
How was the initial setup?
I think the initial setup for the on-demand product is straightforward. The product installed on-premises is somewhat complex. For this reason, it is better that the on-premises version is installed with the help of integrators or consultants.
What other advice do I have?
I would definitely recommend Micro Focus Fortify any day for clients who are looking for a good security solution.
On a scale from one to ten where one is the worst and ten is the best, I would rate Micro Focus Fortify on Demand as a nine out of ten.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer. Reseller
Senior Application Security Analyst at a financial services firm with 10,001+ employees
Has the ability to have related features upgraded on the tools but the tool suffers from latency
Pros and Cons
- "t's a cloud-based solution, so there was no installation involved."
- "The solution has some issues with latency. Sometimes it takes a while to respond. This issue should be addressed."
What is most valuable?
What is most useful is how you can have related features upgraded on the tools. The tools themselves have details for the code as well, where the issues have been flagged, and all the vulnerabilities are there, in one place.
What needs improvement?
The solution has some problems with latency. Sometimes it takes a while to respond. This issue should be addressed.
They should improve the data path where the issue has been flagged. They can improve the flow module details. If you can understand from the data flow or data path what is happening, you can better understand what the issue is.
For how long have I used the solution?
I've been using the solution for two years.
What do I think about the stability of the solution?
The solution is very stable.
What do I think about the scalability of the solution?
The solution is okay in terms of scalability. I'm still not really familiar with the tool, and I'm still learning from it. So far, I think it has a good ability to scale.
How are customer service and technical support?
Technical support is okay. They have a platform that you can create tickets on. Once you raise a ticket, support is quick to help you.
If they wanted to improve technical support they could offer meetings with the developer or security team.
How was the initial setup?
It's a cloud-based solution, so there was no installation involved.
What other advice do I have?
We use the cloud deployment model of the solution.
Whether or not you decide to implement the solution depends on the use case. It depends on if the user has a big application or multiple lines of code which need to be scanned. New users need to do POC so they can investigate if this tool fits in their company or their enterprise before they begin implementation. Everyone should do a comparison before implementing or doing the rollout of any security tool.
I would rate the solution seven out of ten.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Has improved our security through static code analysis
Pros and Cons
- "The static code analyzers are the most valuable features of this solution."
- "The reporting capabilities need improvement, as there are some features that we would like to have but are not available at the moment."
What is our primary use case?
Our primary use case for this solution is static code analysis.
How has it helped my organization?
This solution has helped us to improve our security processes.
What is most valuable?
The static code analyzers are the most valuable features of this solution.
What needs improvement?
The reporting capabilities need improvement, as there are some features that we would like to have but are not available at the moment. It needs a better configuration and more options for reports.
For how long have I used the solution?
Four months.
What do I think about the stability of the solution?
The solution is working, so I would say that its stability is fine.
What do I think about the scalability of the solution?
We have approximately twenty users who perform code scanning. They are developers and security experts. We do plan to increase our usage of this solution in the future.
How are customer service and technical support?
Technical support for this solution is fine.
How was the initial setup?
The initial setup of this solution is straightforward.
It took approximately two hours to deploy, and because it is a cloud-based solution it does not require anybody for maintenance.
What about the implementation team?
We handled the implementation in-house.
What was our ROI?
All I can say is that it is reducing security issues.
Which other solutions did I evaluate?
We evaluated Veracode before choosing this solution.
What other advice do I have?
This solution works, so I suggest using it.
I would rate this solution an eight out of ten.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
CISO at a retailer with 1,001-5,000 employees
Detects vulnerabilities and provides useful suggestions, but doesn't understand complex websites
Pros and Cons
- "The solution scans our code and provides us with a dashboard of all the vulnerabilities and the criticality of the vulnerabilities. It is very useful that they provide right then and there all the information about the vulnerability, including possible fixes, as well as some additional documentation and links to the authoritative sources of why this is an issue and what's the correct way to deal with it."
- "Primarily for a complex, advanced website, they don't really understand some of the functionalities. So for instance, they could tell us that there is a vulnerability because somebody could possibly do something, but they don't really understand the code to realize that we actually negate that vulnerability through some other mechanism in the program. In addition, the technical support is just not there. We have open tickets. They don't respond. Even if they respond, we're not seeing eye to eye. As the company got sold and bought, the support got worse."
What is our primary use case?
We use Fortify on Demand to test our e-commerce website. We do static codes testing before it goes live.
How has it helped my organization?
Before we migrate a new code to our production website, it is scanned with Fortify and all security vulnerabilities are identified. Then we try to remediate them so we don't expose ourselves.
I've been involved in deciding what's right or wrong. I've been involved in deciding on the product early on, and then if we should go on-premise or in the cloud, if we should build it into part of the software development life cycle or if we should do it on demand before we go to production. I've been involved in a lot of that. I've been involved in working with the development team to decide what is a vulnerability and what is not, and which vulnerabilities we need to take to heart, regardless if we understand what it is that we should ignore, and regardless of the fact that we think it's highly critical.
What is most valuable?
The product, in general, is meant to scan the website and identify any vulnerabilities: a known vulnerability across that script and SQL injection or other vulnerabilities from OWASP top 10, etc. That is what we're using this for.
The solution scans our code and provides us with a dashboard of all the vulnerabilities and the criticality of the vulnerabilities. It is very useful that they provide right then and there all the information about the vulnerability, including possible fixes, as well as some additional documentation and links to the authoritative sources of why this is an issue and what's the correct way to deal with it.
What needs improvement?
Primarily for a complex, advanced website, they don't really understand some of the functionalities. So for instance, they could tell us that there is a vulnerability because somebody could possibly do something, but they don't really understand the code to realize that we actually negate that vulnerability through some other mechanism in the program. And they try to look at it saying, "Okay. From a pure standards perspective, this is a critical vulnerability for you." Which in reality, if you would really try to exploit it, you'd see that we actually did cross a little something around it, and the vulnerability is not there. So they would expect to have a certain type of a formatting requirement around a specific field to avoid being able to put in special characters. They would assume that because we don't have that, it's a vulnerability. But in reality, you actually do have a custom function that has been defined somewhere else in the code and these fields are subject to that function. I don't carry along with that in the same way as the application really does. That's something that we found that needs improvement.
We're actually going to transfer from them, and the main reason is that there is nobody home. We could have tickets open with them for months trying to escalate and have them remediate certain false positives as I described. We have had no success bringing this product to a level that we feel there's not too much noise. It gives you specifically what you need. You could take it at face value and run with it.
We're going to switch to Checkmarx. We're in the middle of the deployment.
For how long have I used the solution?
We've been using Fortify on Demand for eight years or so.
What do I think about the stability of the solution?
Stability is good. The product works.
What do I think about the scalability of the solution?
Scalability is irrelevant to us because it's in the cloud. For the past few years, we've been using it in the cloud, so it's a common scanner. It's not handling transactions. It's not a firewall or an antivirus that you have doing real-time transactions. It looks at the code and the volume of code we migrate. We write a lot of code every week, but it's still within reason. We're not talking about thousands of developers sending code at the same time. So I don't think that scalability was much in our conversation.
The product is being used by the e-commerce application development team, and we have senior developers who are responsible to scan and evaluate security concerns that come out of the product. We also have a lead security person and a development team who are responsible to oversee this and ensure that the issues are being addressed.
Deployment and maintenance, are not really applicable because it was somebody at DNH working with the company, setting it up. We did not put it into part of the platform of real-time migration, such that the code automatically goes there, marks it, and allows it to go to production or not. We didn't go that route, so it really didn't need too many people to be involved in the deployment.
How are customer service and technical support?
The technical support is just not there. We have open tickets. They don't respond. Even if they respond, we don't see eye to eye. As the company got sold and bought, the support got worse.
How was the initial setup?
Our website is complex, so the setup is also complex. By definition, we expected it to be complex, and Checkmarx should also be complex because of the culture, habits, and complexity of our custom-developed website. Our website is not an off-the-shelf product, so there's a lot of complexity that comes with it by nature. But that's okay.
The initial deployment goal was to scan every bit and byte of code on the production e-commerce site. That was the plan. We started rolling this out and then we started sending tests. We went back and forth on whether we should make it in-line automatic that we scan sales, in a way that it would not allow the code to move further, or if we should do it off to the side, such that the application development life cycle continues to run separately, while somebody is scanning it making sure we dissolve all the issues. So we tried both routes. There are benefits to each, and it's definitely safer to do it in-line. Again, the culture, habits, and technology's use mean that it is not always best to do it in-line because it could become too complicated and break too many things. So we actually switched that. There is a person that does that. It's not built into the migration system by default. Somebody is scanning it and then moves to the next one.
What about the implementation team?
We worked with them and they helped us deploy. We tried a few different versions. We tried on-premise, and then we went to the cloud. Fortify on Demand is the cloud-based version, which we're using now.
Our experience with their developer team was good. But now, over time, the company went from a partner to a disconnected environment. Overall, the experience started out with a back and forth and an active relationship but over time, they became very disconnected.
What's my experience with pricing, setup cost, and licensing?
It's a yearly contract, but I don't remember the dollar amount.
Which other solutions did I evaluate?
I don't remember if we evaluated anybody else. I think Fortify was recommended through a consultant. Some years ago, there were not so many vendors at a time playing in this arena. There's not so many today for static analysis, but I don't think that we really evaluated any others.
What other advice do I have?
I would advise others not to use Fortify, but rather get something like Veracode or Checkmarx. The most important thing is not the functionality of the product. The most important thing is the knowledge, support, and availability of the team of security specialists as a vendor, that you have somebody to work with and talk to. Everybody's website is different, and if you try to use the product out of the box the way they built it and you have nobody to talk to to figure out how to tweak your application or the product to reduce the noise and the false positives, it becomes literally useless. So I would not advise anybody to go to Fortify based on the fact that they really don't have a very forthcoming support team and availability.
Could be the other options would provide professional services, but that's not the point. The point is that if you want to pick up the phone and send them an email, open a ticket saying that, "This is a false positive," somebody should get back to you. So I don't think that Fortify's a viable option still these days based on the fact of where they sit and how they operate.
I would rate the product a four out of ten. It works. The reason why I give it a four is because of the limitations of the product to understand the dynamics of our website and the number of things that are not working smoothly due to the fact that our website is complex.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Director Consulting at a tech services company with 10,001+ employees
It is very configurable. The installation was also very easy.
Pros and Cons
- "I do not remember any issues with stability."
- "The licensing was good."
- "The installation was easy."
- "There were some regulated compliances, which were not there."
What is our primary use case?
My primary use case is to help the teams in development. It helps us scan.
How has it helped my organization?
First, you don't have very high requirement and we could do it quickly and efficiently. Second, it was easy for us to install the reading bot facing challenges and such, while doing that installation. Third, when we were doing the scan, it was self intuitive and we were able to scan faster while we had two challenges in the other two solutions that we were using. In terms of finding out where to configure, what are the next steps to configure what we are missing and those kind of areas.
Usually what happens, because we were part of the COE, we had to find those faster and go through old ECs and deliver the results to the short duration income. So, that's where it helped us, it helped us setting up that environment quickly on a laptop, do the scan and come back.
What is most valuable?
The features I found most valuable is that it is very configurable. The installation was also very easy.
What needs improvement?
Yeah, some of the technologies and framework for libraries were not available at that point of time. For example, if it was in the back end, at that point in time we had to look at other tools. There were some analytical compliances so when we had more tools, it took all the technologies frameworks that Fortify was having. We required this because we were widely working with different clients for the different varieties of technology and domains. There were some regulated compliances, which were not there, but these were the factors because of which we had to use some instances of other tools as well.
For how long have I used the solution?
One to three years.
What do I think about the stability of the solution?
I do not remember any issues with stability. Of course, it is common that if there is some misconfiguration, it can lead to crashes and the site of the code can crash. But, this is something we have learned to tweak and estimate the length of code before the site of the application. Then, we can consider which technology could be configured, what technology should be excluded, and then scan to optimize some of the related issues.
What do I think about the scalability of the solution?
In terms of the scalability of the solution, we did not have a centralized server connecting to multiple clients. We did not have scalablility issues due to our small-scale use.
How is customer service and technical support?
We had a good tech support experience.
How was the initial setup?
It was very straightforward in comparison to other solutions that we had used in the past.
What's my experience with pricing, setup cost, and licensing?
The licensing was good because the licenses have the heavy centralized server. It connects to the other PTs, or even if it connects to the old EC servers. We had to put it within an old EC, in order for the licensing to be available at all scales.Then, you had to open multiple ports in that scenario that was not possible. But, you can do it at the application level, which is faster. You can buy a license, do a scan at that level, as well as scale up. So we also had multiple requests in terms of helping a client before they start in terms of doing something easy so that you do not require a complete license to be purchased.
Which other solutions did I evaluate?
We were using many other tools like TechAbility, IBM AppScan and I think these were the predominant ones.
What other advice do I have?
Today's security has become so complex that you cannot lean completely dependent on one tool. What I have learned is that you should have multiple tools. Now, with different areas coming into space, all of these tools have to co-exist. To make the right choice of a tool is really important. A solution must have ease-of-use. If it becomes too difficult for installing, configuring, learning the scan, then the add option becomes a challenge.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Buyer's Guide
Download our free OpenText Core Application Security Report and get advice and tips from experienced pros
sharing their opinions.
Updated: March 2026
Popular Comparisons
Checkmarx One
Coverity Static
GitHub Advanced Security
Sonatype Lifecycle
PortSwigger Burp Suite Professional
GitGuardian Platform
Qualys Web Application Scanning
Buyer's Guide
Download our free OpenText Core Application Security Report and get advice and tips from experienced pros
sharing their opinions.
Quick Links
Learn More: Questions:
- What Is The Biggest Difference Between Fortify on Demand And SonarQube?
- What are the costs for Micro Focus Fortify on Demand?
- If you had to both encrypt and compress data during transmission, which would you do first and why?
- When evaluating Application Security, what aspect do you think is the most important to look for?
- What are the threats associated with using ‘bogus’ cybersecurity tools?
- What are the Top 5 cybersecurity trends in 2022?
- Which application security solutions include both vulnerability scans and quality checks?
- We're evaluating Tripwire, what else should we consider?
- Is SonarQube the best tool for static analysis?
- Why Do I Need Application Security Software?
















