Listing Thumbnail

    OpenText Core Application Security (Fortify)

     Info
    Sold by: OpenText 
    Deployed on AWS
    Build software resilience from a partner you can trust with application security as a service. Achieve all the advantages of security testing, vulnerability management, tailored expertise, and support without the need for additional infrastructure or resources.

    Overview

    Play video

    Fortify is the only application provider to offer static application security testing (SAST), dynamic application security testing (DAST), interactive application security testing (IAST), and mobile application testing (MAST) on demand so you can choose the solution that is right for your business. Our Application Security Testing solutions are best for organizations looking for software resilience for modern development from a partner they can trust.

    When Security Matters in DevOps Fortify integrates into your existing development toolchain seamlessly, giving you the highest quality findings and remediation advice during every stage, creating more secure software. With Fortify, you don't need to trade quality of results for speed.

    Modern AppSec for your Cloud Transformation Whether your app is fully cloud-native or just beginning to modernize, Fortify has you covered every stop of the way. Fortify is purpose built to secure the rapidly evolving technologies and architectures with the flexibility to recognize no two applications are the same - all backed by constantly evolving intelligence on new attack vectors.

    Evolve the security of your software supply chain Be confident in everything that goes into the applications you deliver to your customers and users by evolving the security of your software supply chain. Protect the integrity of your software and SDLC with precise identification, matching, and results from proprietary research data on custom code and third-party risks. With Fortify, trust the future of your software supply chain.

    Your trusted partner for enterprise grade AppSec Make application security part of your organizations fabric as you scale from one to hundreds or even thousands of apps with a partner and ecosystem you can trust. Fortify delivers a holistic, inclusive and extensible platform that supports the breadth of your software portfolio and teams with a comprehensive suite of products and services that guide you throughout your journey.

    We have pre-packaged scan bundles listed. Different scanning services would require various quantity of assessment units - AU. Please visit: https://www.microfocus.com/media/guide/fortify-on-demand-service-description.pdf  for more information. Please click this URL to request a private offer: http://www.microfocus.com/FOD_privateproposal 

    Highlights

    • Static assessments detect over 1137 unique categories of vulnerabilities across 29 programming languages that span over 1 million individual APIs. CyberRes Fortify is Iron Bank approved and included in Platform One - P1 as part of the United States Department of Defense Enterprise DevSecOps initiative
    • Automate security in the CI/CD pipeline with Swagger-supported RESTful APIs, GitHub repository, and plugins for a large set of ecosystem partners offering DevOps, VSTS, and Jenkins.
    • First and leading application security as a service solution to be JAB authorized and FedRAMP certified. Fortify has been a Leader in the Gartner Magic Quadrant for application security testing for 8 consecutive years

    Details

    Delivery method

    Deployed on AWS

    Unlock automation with AI agent solutions

    Fast-track AI initiatives with agents, tools, and solutions from AWS Partners.
    AI Agents

    Features and programs

    Buyer guide

    Gain valuable insights from real users who purchased this product, powered by PeerSpot.
    Buyer guide

    Financing for AWS Marketplace purchases

    AWS Marketplace now accepts line of credit payments through the PNC Vendor Finance program. This program is available to select AWS customers in the US, excluding NV, NC, ND, TN, & VT.
    Financing for AWS Marketplace purchases

    Pricing

    OpenText Core Application Security (Fortify)

     Info
    Pricing is based on the duration and terms of your contract with the vendor. This entitles you to a specified quantity of use for the contract duration. If you choose not to renew or replace your contract before it ends, access to these entitlements will expire.
    Additional AWS infrastructure costs may apply. Use the AWS Pricing Calculator  to estimate your infrastructure costs.

    12-month contract (12)

     Info
    Dimension
    Description
    Cost/12 months
    1 AU
    Assessment Units (at least 4 and less than 99 quantity)
    $996.00
    1 AU (>100)
    100+ Assessment Units with Managed Support
    $864.00
    15 Static AU
    15 Static Applications, Single Security Assessments
    $14,190.00
    60 Static AU
    15 Static Applications, Security Assessment Subscriptions
    $54,360.00
    10 Mobile AU
    10 Mobile Applications, Single Security Assessments
    $9,960.00
    40 Mobile AU
    10 Mobile Applications, Security Assessment Subscriptions
    $37,840.00
    30 Dynamic AU
    15 Dynamic Website, Single Security Assessment
    $28,380.00
    90 Dynamic AU
    15 Dynamic Website, Security Assessment Subscriptions
    $81,540.00
    20 API AU
    10 Dynamic API, Single Security Assessments
    $18,920.00
    60 API AU
    10 Dynamic API, Security Assessment Subscriptions
    $54,360.00

    Vendor refund policy

    No Refunds

    How can we make this page better?

    We'd like to hear your feedback and ideas on how to improve this page.
    We'd like to hear your feedback and ideas on how to improve this page.

    Legal

    Vendor terms and conditions

    Upon subscribing to this product, you must acknowledge and agree to the terms and conditions outlined in the vendor's End User License Agreement (EULA) .

    Content disclaimer

    Vendors are responsible for their product descriptions and other product content. AWS does not warrant that vendors' product descriptions or other product content are accurate, complete, reliable, current, or error-free.

    Usage information

     Info

    Delivery details

    Software as a Service (SaaS)

    SaaS delivers cloud-based software applications directly to customers over the internet. You can access these applications through a subscription model. You will pay recurring monthly usage fees through your AWS bill, while AWS handles deployment and infrastructure management, ensuring scalability, reliability, and seamless integration with other AWS services.

    Support

    Vendor support

    Live Support via Chat, Email, Portal, and Digital Courseware https://ams.fortify.com/contact-us , https://emea.fortify.com/contact-us ,

    AWS infrastructure support

    AWS Support is a one-on-one, fast-response support channel that is staffed 24x7x365 with experienced and technical support engineers. The service helps customers of all sizes and technical abilities to successfully utilize the products and features provided by Amazon Web Services.

    Product comparison

     Info
    Updated weekly

    Accolades

     Info
    Top
    100
    In Testing
    Top
    10
    In Testing
    Top
    50
    In Agile Lifecycle Management

    Customer reviews

     Info
    Sentiment is AI generated from actual customer reviews on AWS and G2
    Reviews
    Functionality
    Ease of use
    Customer service
    Cost effectiveness
    4 reviews
    Insufficient data
    Insufficient data
    Positive reviews
    Mixed reviews
    Negative reviews

    Overview

     Info
    AI generated from product descriptions
    Application Security Testing
    Comprehensive security testing approach including static (SAST), dynamic (DAST), interactive (IAST), and mobile (MAST) application testing methodologies
    DevOps Integration
    Seamless integration into existing development toolchains with support for CI/CD pipelines, RESTful APIs, and plugins for ecosystem partners
    Multi-Language Vulnerability Detection
    Detects vulnerabilities across 29 programming languages with coverage of over 1 million individual APIs
    Software Supply Chain Security
    Precise identification and matching of risks in custom code and third-party components with proprietary research data
    Compliance Certification
    FedRAMP certified and JAB authorized security solution with Department of Defense Enterprise DevSecOps compliance
    Static Application Security Testing
    Comprehensive vulnerability scanning for custom code across 25+ programming languages and frameworks
    Software Composition Analysis
    Automated identification and prioritization of vulnerabilities in open source software and third-party library dependencies
    Infrastructure as Code Analysis
    Detection of security misconfigurations in infrastructure template deployments to prevent potential security risks
    Real-time IDE Security Scanning
    Background vulnerability scanning during code development with immediate identification of risks in human and AI-generated code
    AI-Powered Remediation
    Context-aware AI agent that generates code remediation suggestions using proprietary databases and customized AI models
    Application Risk Contextualization
    Proprietary Risk Graph technology that contextualizes security findings based on likelihood and potential impact of risks
    Security Tool Integration
    Aggregates and enriches security findings from multiple tools including SAST, SCA, CSPM, and runtime API security platforms
    Source Control Management
    API-based integration with source control managers to create comprehensive inventory of application and supply chain components
    Code Change Monitoring
    Advanced monitoring of code commits to identify anomalous developer behavior and surface risky material code changes
    Remediation Guidance
    LLM-powered remediation guidance that ties risks to specific code owners with contextual recommendations

    Contract

     Info
    Standard contract
    No
    No
    No

    Customer reviews

    Ratings and reviews

     Info
    3.5
    1 ratings
    5 star
    4 star
    3 star
    2 star
    1 star
    0%
    0%
    100%
    0%
    0%
    1 AWS reviews
    |
    45 external reviews
    Star ratings include only reviews from verified AWS customers. External reviews can also include a star rating, but star ratings from external reviews are not averaged in with the AWS customer star ratings.
    Himanshu_Tyagi

    Supports secure development pipelines and improves issue detection but limits internal visibility and needs broader dashboard integration

    Reviewed on Nov 11, 2025
    Review from a verified AWS customer

    What is our primary use case?

    I have been working with AWS  cloud for the past six to seven years, and in my current role, I am working on AWS  cloud.

    Fortify was used for scanning applications to identify dynamic security vulnerabilities. Another solution from Fortify named Fortify Source Code Analyzer, basically SCA , scans lines of code for different technologies, such as ASP.NET , VB.NET, and Java-based applications. It scans different lines of code for an application and flags vulnerabilities, and on the basis of that vulnerability, a security professional has to identify false positives and then report it to the internal application team.

    When security issues are identified in the early stage of the software development life cycle, it really helps because if threats are identified early, the product being developed by the application development team has fewer security issues. There is no product that doesn't have any issues. Obviously, the team tries to build a solution that has zero issues, but that is hypothetical. When threats are identified in the early software development life cycle, it gives confidence among the team and provides a fair idea that the application being developed will be a viable solution for the customer.

    Whenever any security vulnerability is identified by Fortify or OpenText , it gives information about whether that particular security issue is non-compliant related to PCI, ISO 27001, or SOC 2. It provides a fair understanding that this security vulnerability should be prioritized because if you don't fix this vulnerability, your application will be non-compliant and your compliance goal will ultimately fail. So it helps a lot.

    What is most valuable?

    Fortify on Demand is a good service. Since it is fully being managed by OpenText , after Micro Focus acquired Fortify, all services are managed by the Fortify team when a customer is using Fortify on Demand. When you are seeing the application and the vulnerabilities which have been identified by their tool, you can see the issues. However, the visibility of the actual work being done is by the Fortify team. If you want to fully outsource your services, then it's a very good solution.

    The best feature is that it supports many language frameworks. VB.NET was not available previously, but later they onboarded VB.NET as well, which is a legacy-based application, but some organizations still use VB.NET, so they have onboarded it, which is a good thing. Another aspect I appreciated about Fortify is that it gives a good understanding of the issues. The false positive rate is less, and they give valid issues. The invalid issues identified by Fortify are fewer. That is a good aspect. Additionally, you can integrate Fortify in CICD pipeline, so you get real-time updates about the security issues in your pipeline.

    What needs improvement?

    If you have an internal team and you want your internal team to validate false positives, basically to determine whether it's a valid issue or an invalid issue, then I wouldn't recommend it much. That was the only reason we migrated from Fortify on Demand to another solution.

    Fortify has another tool which is Fortify WebInspect . On Demand is the outsourcing solution, and WebInspect  you can use with your in-house team, which is basically the product developed by the Fortify team. For automated scanning, Fortify helps a lot.

    Regarding the visibility for the internal team, everyone is moving toward the DevSecOps  side, and Fortify team has made good progress that you can integrate into your CICD pipeline. One thing I would highlight is if Fortify can focus more on the centralized dashboard of the tools because nowadays, tools such as SentinelOne also exist for identifying security issues, but they have a centralized dashboard that merges their cloud solution and application security side solution together. If you have one tool that works for different solutions, it helps a lot.

    They are doing good, but they should invest more on the AI side as well because AI security is evolving these days. On the cloud side, they have already made good progress, but I believe they should explore the new area related to AI security as well.

    For how long have I used the solution?

    I have been using Fortify on Demand, Veracode , Checkmarx, and SonarQube  for close to ten years. If you are asking particularly about Fortify, I will say seven years.

    What do I think about the stability of the solution?

    I have not experienced any issue with stability, reliability, crashes, or downtimes. The support was very good, and since I had direct interaction with the Fortify team, I didn't raise any escalation because the support was very good in my experience.

    What do I think about the scalability of the solution?

    It was very good and scalable. The only thing I mentioned before was that they provide limited understanding of what tools they're working on. If a customer wants to know the tools and the technology used for their application to scan their application, they provide less information on that.

    How are customer service and support?

    My experience with the technical support customer service team of Fortify was pretty good; I would rate it four out of five.

    I had direct contact with Fortify team and the sales director. I had direct interaction with them, which facilitated how we onboarded Fortify.

    How would you rate customer service and support?

    Neutral

    Which solution did I use previously and why did I switch?

    We switched to Checkmarx.

    When you talk about the key differences between Fortify and Checkmarx, we migrated from Fortify to Checkmarx because at that time, Fortify was not supporting VB.NET application, and our main application was using VB.NET. We raised the case with Fortify team about any plan in their future release to onboard VB.NET, but they didn't give us a good answer because they were saying they would try to onboard VB.NET into their platform in a year. A customer won't wait for one year to assess their application.

    How was the initial setup?

    When you talk about static application source code testing, we had to involve the Fortify team to create an LDAP role for us. Regarding Fortify on Demand, it was pretty much straightforward because we just needed to configure our application in their platform. We had to enter the information for our application, and the rest was done by the Fortify team. Fortify on Demand was very simple. Regarding the SAST  part, I won't say it was hard, but it was a little bit complicated, and when we raised cases with their technical support team, they resolved our queries and we onboarded the tool into our environment.

    What about the implementation team?

    It depends upon your license which you have used. We were assessing 180 applications, and our license cost was $200,000.

    It depends upon if you get a good offer from Fortify team. Regarding the cost-effective part, it is a bit expensive to be honest because some good organizations can obviously afford it, but if you talk about small organizations, I'm afraid they won't be going ahead with Fortify because it's an expensive solution.

    Which other solutions did I evaluate?

    When you talk about the key differences between Fortify and Checkmarx, we migrated from Fortify to Checkmarx because at that time, Fortify was not supporting VB.NET application, and our main application was using VB.NET. We raised the case with Fortify team about any plan in their future release to onboard VB.NET, but they didn't give us a good answer because they were saying they would try to onboard VB.NET into their platform in a year. A customer won't wait for one year to assess their application.

    The pros of Fortify include that you get a good understanding of the issues identified by the application. They continuously send notifications that the scan is being paused and the customer has to initiate the scan because the application scan has failed for some reason. The timely notification and visibility of issues identified is good, and the false positive aspect is also good.

    Coming to Checkmarx, when we onboarded it, our primary reason was the VB.NET issue, and Checkmarx also has very good coverage on Java-based applications. The majority of our applications were on Java, and Checkmarx did a great job on the coverage of assessing our applications. Regarding the accuracy of issues, I find it almost the same for Fortify and Checkmarx. I didn't find much difference on the false positive side either.

    What other advice do I have?

    If you want to onboard a solution for your application security side, I will definitely recommend Fortify because for your application, when you get a fair understanding of the security issues in the early stage of the software development life cycle, it's a very good thing.

    I have worked on Fortify on Demand. I have used it six months ago.

    Our applications were hosted on AWS cloud, and Fortify identified security vulnerabilities on our cloud platform. Our application which was hosted in AWS cloud showed that they provide good visibility. However, every tool has some pros and cons. If you ask me that if I want to recommend Fortify on Demand, it's obviously a good service which can be used by any organization when they are building a team. But if you have an in-house team which is working on many solutions, then it won't fit into their umbrella.

    Fortify on Demand was the on-demand service provided by Fortify that was assessing all our applications. When applications hosted on AWS cloud were being assessed, Fortify was identifying issues for the application which was hosted on AWS cloud.

    My experience with the technical support customer service team of Fortify was pretty good; I would rate it four out of five. Overall, I would rate this review a seven.

    Which deployment model are you using for this solution?

    On-premises

    If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

    Amazon Web Services (AWS)
    Diego Caicedo Lescano

    Allows portfolio-wide analysis and reporting but needs better support and integration

    Reviewed on Nov 10, 2025
    Review provided by PeerSpot

    What is our primary use case?

    I am familiar with all of the ADM portfolio, Application Delivery Management, including UFT, Unified Functional Testing, and we are building LoadRunner  for security, specifically for the Cyber Res portfolio, which is Fortify, and for the other portfolio, SMAX for Service Desk and monitoring.

    What is most valuable?

    The best features with Fortify on Demand include having analysis for any product based on analysis points. With on-premise, you have to buy the license for each application. The licensing model is better on demand than on-premises. Another feature is that on demand you have two levels of reports: the first from the tool, which is the same as we can get from Fortify on-premises, and a next level reporting made by experts from OpenText , leading to a more condensed and precise report as level three.

    What needs improvement?

    It would be better for Fortify on Demand if they could analyze not only the security pillar but also maintainability, portability, and reliability, covering all pillars of ISO 25000. We have another tool that does that, such as SonarQube .

    A quality code analysis feature is needed, as our customers often ask for those features, which are not available in Fortify on Demand or on-premises, where we only have static and dynamic code analysis.

    OpenText Core Application Security 's integration with existing systems has a lack of integration, and it would be better if it had more open integration.

    For how long have I used the solution?

    We have been dealing with Fortify for around eight years. The initial installation for on-demand was one of the first installations. Licenses in each product vary. The licensing in on-demand SaaS is different than on-premises, and that is the main difference.

    How are customer service and support?

    I would rate the support for OpenText  at no more than three out of ten; it is really bad, and we encounter a lot of problems when getting support.

    Support tickets often stay open for one month to three months, which leads to customer frustration. The wait time for a customer is too much. We understand the technology, but customers do not like paying for that kind of support.

    How would you rate customer service and support?

    Neutral

    Which solution did I use previously and why did I switch?

    SonarQube  is used as a different solution for SAST .

    The main difference between Fortify and SonarQube is that SonarQube is a complete solution for SAST  plus quality code analysis, focusing on five pillars, which according to ISO 25000 includes security as one pillar.

    Q1 from Idera is another solution that covers five pillars and is great compared to Fortify, which only addresses the security pillar. There are significant differences in findings, as each solution has different findings, but SonarQube is the best for SAST findings.

    How was the initial setup?

    The setup for on-demand is straightforward and better because we do not have to install any components like we do for on-premises, making it easy.

    What other advice do I have?

    I do have experience with OpenText.

    I would be willing to provide a review for an OpenText product, and we are partners from OpenText, selling a lot of products since UFT, functional testing, performance testing, and some of those products.

    Andres has experience with LoadRunner Cloud , so Andres is the person to contact.

    I do have experience with Fortify on Demand as well as Fortify on-premises, but I am the general manager, not the technician. Andres is the technician, and you can have a call with Andres, Alex, or Henry to get any review or feedback on the products.

    For Fortify on Demand, the experience is less than three years—around two years, not more than that.

    I am familiar with Fortify and Real User Monitoring.

    The pricing is better for the customer, but it is not easy to understand the new pricing points. For us as partners, it is cheaper than the other licensing models, but for the customer, understanding how many points apply to each application can be confusing.

    The overall review rating for this product is 7 out of 10.

    reviewer2646048

    Security tool identifies access token exposure while improvement needed in false positives handling

    Reviewed on Jan 31, 2025
    Review provided by PeerSpot

    What is our primary use case?

    I primarily use Fortify to check for sensitive information disclosure in the source code and for identifying security vulnerabilities. These types of issues are scanned by Fortify.

    What is most valuable?

    Fortify helps me find serious issues, such as developers inadvertently leaving access tokens, including API access tokens, in the source code. Fortify is effective in identifying such oversights, making it a really helpful tool despite its problems. It is valuable in improving our overall security posture by catching significant errors.

    What needs improvement?

    There are frequent complaints about false positives from Fortify. One day it may pass a scan with no issues, and the next day, without any code changes, it will report vulnerabilities such as password exposure.

    Additionally, it would be beneficial if Fortify could check for CVEs (Common Vulnerabilities and Exposures) in third-party libraries, which I currently use a separate dependency checker tool for. Implementing AI technologies for enhanced security testing would also be a positive development.

    For how long have I used the solution?

    This product has been used in my company for more than two years.

    How was the initial setup?

    We have a dedicated Fortify team, along with service teams with developers involved in the deployment process. It does not take longer than thirty minutes to deploy.

    What other advice do I have?

    Based on the experience of our company, I would recommend Fortify. It is helpful despite its problems, and I rate it as a seven out of ten.

    It effectively detects serious security issues, adding to our confidence in using it as a vital tool in our processes.

    Jonathan Steyn

    Source code analyzer, FPR file generation, reduction of false positives and generates compliance reports, for in-depth analysis

    Reviewed on Aug 12, 2024
    Review provided by PeerSpot

    What is our primary use case?

    Fortify On Demand is a cloud-based service/software-as-a-service model. Fortify On-Prem, which I have implemented, is an on-prem service where the customer provides the server infrastructure, and then Fortify On Demand comes fully implemented out of the box.

    But you're still able to connect all of your Git repositories and your build environments like Maven and Gradle and all these different build environments, even like Jenkins that customers are using. It's fully connected either whether it's on-prem or cloud, and then you can do a full scan analysis of your security posture.

    SAST and DAST scanning. Dynamic application scanning as well as static application scanning. So that would be websites, and you can do an audit and crawl scan of your web-based or web-facing applications, and then also scan your source code of your static application code.

    How has it helped my organization?

    The source code analyzer is the actual tool. It's the engine that sits behind Fortify. And this engine or this intelligence is within your tools. So, the great thing about Fortify is that you have plugins for your build environment. So when you're building and executing that code, you can scan that code at that interval. You can shift left. The commonality is that you want to shift left. You want to find threats early in production, as early as before it actually goes into production. It saves money that way, so you don't have to recode or reinvent your entire architecture.

    We also have plugins for your actual interface. We call them IDEs. It's the interface where the developer will actually code and write programs. So from there, the source analyzer will give an analysis, and the developer can fix the code.

    Then the second gateway that we have is our plugins work in both environments. So when the developer has written and remediated and fixed some of the issues, in the build environment, when he's testing his code, when it's actually running the application, the Source Code Analyzer will then analyze it again, and then there can be remediation. The code can be fixed.

    We even have a tool called RASP, which is a tool that works in production. So even when your code is now being published, it's now an actual application, it's a live application, we have a RASP tool also in Fortify that also further on, in real-time, will scan and do an analysis of your code to find any zero-day attacks or threats or emerging threats. And then, again, from the dashboard interface, you'll be able to remediate.

    And you can also do on-demand, we build AI Audit Assistance 2.0. It's the GEM 2.0 tool that we now have in Fortify that uses artificial intelligence where you can set thresholds. You can set a score to say that if I am sure, or if the system is sure with absolute certainty, with 90% accuracy, there is, in fact, a threat or a high risk; it will find those vulnerabilities and give you a score.

    So, what it does is actually reduce the time spent on false positives. When you have false positives, you have to scrutinize all of them. We've got a lot of new technologies and methods within Fortify that allow us to reduce the false-positive rate that you generally find with scanning tools because we're using artificial intelligence as well as the source code analyzer tool. All of this has been built over years and years of development and research, and it actually gives you a better rate of reducing false positives, and you can then remediate actual threats. So, the tool has a lot of value.

    The reduction of false positives is in the region of 98% or more. We now have even a new tool or AI product line called Aviator. So Fortify, OpenText Fortify now harnesses the power of artificial intelligence within the architecture, which will reduce your false-positive rate and actually give you scores on actual threats that it finds. Then, the threats and the threshold scores, the threats that are not seen as a low risk or a medium risk, can still be tended to.

    So, it doesn't exclude the thresholds. It will still give you a full analysis, but it will, with surety and with the correct analysis, give you the threats that do matter, the threats that you do need to tend to immediately.

    By doing this, you also reduce the time to threat response because in cybersecurity, your time to threat response is very important. You need to ensure that you detect the threats early and that your response time is also very quick to reduce any business impact or downtime to a business. So, this is where Fortify really excels with all the new technology and artificial intelligence metrics that we have within our architecture.

    What is most valuable?

    The source code analyzer is the most effective for identifying security vulnerabilities. It is the engine or the artificial intelligence behind the scanning engine that does the actual analysis of the data, and they then create an FPR file. This FPR file can then be further analyzed and tested at ScanCentral, which is your centralized dashboard for security auditing and remediation.

    So from there, once you've got the artifact or this file, which is created from scanning all of your applications, it gives you a comprehensive overview of the vulnerability scores or the bug densities of your code, and then you can further analyze and test those codes and draw reports from ScanCentral.

    So, these reports are against the OWASP Top ten. So you've got different reports that will give you a detailed analysis of your scan data, and it also does it in a dashboard format. So you then get a comprehensive report, and you can also draw a developer's workbook report, which you can send to developers where they actually have a bird's eye view or code-level view of the vulnerabilities and the recommendations are made by Fortify on how you can remediate those threats or vulnerabilities.

    And you can then improve your bug density and scores, and you can also do that from the dashboard interface. You can also remediate and within the dashboard, change your score. So you have the dashboard, which gives you a comprehensive overview across all the applications. Also, as you remediate and fix your code, the dashboards update your scores, and then you have a view, and you can control your bug densities across all of the applications once you've onboarded each and every application. And that's across all your DAST and SAST applications. And this is on a centralized dashboard.

    Fortify is constantly improving. Their tools and their interfaces are modernized with every new feature or every new version. I constantly see improvements by OpenText. OpenText is very intuitive. They're also implementing a lot of new AI capabilities with the NerdTools, which I think is remarkable.

    What needs improvement?

    Not challenges with the product itself. The product is very reliable. It does have a steep learning curve. But, again, one thing that Fortify or OpenText does very well is training. There are a lot of free resources and training in the community forums, free training as well as commercial training where users can train on how to use the back-end systems and the scanning engines and how to use command-line arguments because some of the procedures or some of the tools do require a bit of a learning curve.

    That's the only challenge I've really seen for customers because you have to learn how to use the tool effectively.

    But Fortify has, in fact, improved its user interface and the way users engage the dashboards and the interfaces. It is intuitive. It's easy to understand.

    But in some regards, the cybersecurity specialist or AppSec would need a bit of training to engage the user interface and to understand how it functions. But from the point of the reliability index and how powerful the tool is, there's no challenge there. But it's just from a learning perspective; users might need a bit more skill to use the tool. The user interface isn't that tedious. It's not that difficult to understand. When I initially learned how to use the interfaces, I was able to master it within a week and was able to use it quite effectively.

    So training is required. All skills are needed to learn how to use the tool.

    I would like to see more enhancements in the dashboards. Dashboards are available. They do need some configuration and settings. But I would like to see more business intelligence capabilities within the tool.

    It's not particularly a cybersecurity function, but, for instance, business impact analysis or other features where you can actually use business intelligence capabilities within your security tool. That would be remarkable because not only do you have a cybersecurity tool, but you also have a tool that can give you business impact analysis and some other measurements. A bit more intelligence in terms of that from a cybersecurity perspective would be remarkable.

    For how long have I used the solution?

    I've been working with Fortify On Demand for two years.

    What do I think about the stability of the solution?

    I would rate the stability a ten out of ten. It is very stable.

    What do I think about the scalability of the solution?

    It is a very scalable solution. Our customers are in banking and insurance. It's currently used by some of the major US banks. So, a lot of our clients are in the banking, insurance, and services industries.

    I would rate the scalability a ten out of ten. It is suitable for medium to large businesses.

    How are customer service and support?

    Customer support is amazing. They've got community forums, customer resources, a lot of free resources, and their premium support is very effective. So they have proper support internationally. They've been very good.

    How would you rate customer service and support?

    Positive

    How was the initial setup?

    Fortify on Demand is fully functional and fully integrated with an open-source analysis tool that's fully integrated with Fortify on Demand. So, Fortify on Demand is easy to use. It's intuitive. No implementation or training is required.

    Fortify on-prem requires a bit of work, but I was able to set up, in a lab environment, the controllers, the scanners, the architecture, and all of the different servers in a virtualized environment. You could set it up quite relatively easily without requiring major training because the user guides are very easy to follow. I've set up lab environments within an hour.

    So you could literally set up your entire on-prem Fortify solution within an hour because it is a very simple process to follow. The setup, installation, and configuration of the files are not that difficult to do. So you could effectively do it within an hour. You could set up the entire environment.

    I would rate my experience with the initial setup an eight out of ten, where ten being easy and one being difficult.

    Cloud and on-prem. So that it's hybrid. There's three tiers for deployment model. You can do Fortify on Demand, which is a fully functional system on the cloud. Fortify On Prem, which is a system where your Fortify system is installed on client servers or on-premises. And then hybrid would be a combination of both services where you have some implementation with the client and some in the cloud.

    What about the implementation team?

    I am the implementer.

    What was our ROI?

    Fortify on Demand improved the overall security posture our customers. Fortify on Demand has reduced not only bug densities but also their attack surface quite drastically. And it's in real-time because it's got real-time dashboards, and their security teams are more proactive. It's a lot easier for them to implement their security mechanisms and gateways because Fortify allows that. I have seen a dramatic reduction in bug densities and incidents. So, a major reduction in security incidents as a result of using Fortify.

    What's my experience with pricing, setup cost, and licensing?

    In comparison with other tools, they're competitive. It is not more expensive than other solutions, but their pricing is competitive.

    The licenses for Fortify On Demand are generally bought in units. So it's scalable in terms of pricing. It's tailored for the customer in terms of the amount of units the customer requires or the number of applications or users that the customer will onboard onto the system. So it is scalable in that regard.

    What other advice do I have?

    As an expert, a lot of what I've seen in the tool is to use the principle of defense in-depth. Because that is the objective of Application Security, Fortify. Customers often need to look at their current security architecture, security gateways, rules, and policies.

    To best utilize Fortify is to shift left, to use all of the tools and plugins that Fortify has throughout the SDLC process, to use the IDE tools, including the board tools, to use all of these respective tools together. And to shift left, to start from the IDE perspective, before source code even goes into production, before it even reaches a build environment. It is to reduce bug densities by shifting left. Use Fortify to get your bug densities and your security or your attack surfaces to reduce it by shifting left from inception, before the code is even written. They can scrutinize, go into Fortify tools, analyze them, and progressively test your code using all the tools that Fortify provides.

    A lot of customers already use their own tools and their own third-party tools. It's best to use one security architecture. So for instance, rather use Fortify with Brakeman and RASP, use the Fortify suite of tools as your one architecture instead of using several third-party tools. It's always good to centralize your security architecture and use one architecture for your entire security posture instead of using different tools. Fortify has all the capabilities to centralize your security attack methodology.

    So, your attack surface comes from different perspectives. It comes from an open-source code perspective. So you've got open-source code. You have proprietary code. You have repositories. You have different places where your code is, even in Azure. We even have a plugin for Azure. The point is to use all of the capabilities of Fortify as your central tool instead of using disparate tools that do not integrate with Fortify, that do not work with Fortify. It's always good to have one solid architecture as opposed to multiple disjointed tools.

    Overall, I would rate it a ten out of ten. I've used several technologies and tools, even open-source or free tools, over the last fifteen years. In my opinion, from the perspective of the many tools used and other competitors, I have found Fortify to be the most reliable. They kind of align with my principles and the principles of cybersecurity specialists with defense-in-depth and shifting left. Because those are very important principles to me. And also confidentiality, integrity, and availability. They align with all of those pillars and building blocks of cybersecurity.

    reviewer1610562

    Useful for security code scans but needs to work on the false positives

    Reviewed on Jun 18, 2024
    Review provided by PeerSpot

    What is our primary use case?

    I use the solution in my company for security code scans.

    What needs improvement?

    The product has a lot of false positives. If the outputs can have fewer false positives, then that will be the greatest benefit the tool can offer.

    For how long have I used the solution?

    I have experience with Fortify on Demand. I manage the product in my company.

    How are customer service and support?

    The solution's technical support is okay and not outstanding.

    Which other solutions did I evaluate?

    It is a costly process to evaluate tools.

    What other advice do I have?

    I rate the tool a six out of ten.

    View all reviews