Sign in Agent Mode
Categories
Your Saved List Become a Channel Partner Sell in AWS Marketplace Amazon Web Services Home Help

Reviews from AWS customer

2 AWS reviews
  • 5 star
    0
  • 2
  • 3 star
    0
  • 2 star
    0
  • 1 star
    0

    Biswajit Jena

Centralized security testing has improved vulnerability remediation and compliance reporting

  • March 16, 2026
  • Review from a verified AWS customer

What is our primary use case?

My main use case for Nucleus Security is for both SAST and DAST mechanisms to test the code and dynamic code and static code together because I get a single dashboard for both, and that is really a centralizing finding that helps and also helps to remove duplicate vulnerabilities, fixing critical issues, and faster remediation. So, it's not just starting from a centralized dashboard to dev tool integration and risk, but also gives a better reporting where you can see improved compliance and metrics together.

One way the developer uses the code is that as soon as they incorporate the code, they use purely on Jira webhook, GitHub, GitLab, CI/CD model. They have their own codebase configured into their Integrated Development Environment. Then we start testing with different kinds of scanners including Fortify, Checkmarx, Veracode, and so on. In this case, you see the code vulnerabilities and also it fits the Open Web, OWASP jab and so on. Once you check these different tools, you can identify the vulnerabilities of one application in one place. In a similar way, as you run all these tools and the codebase at the same time, that is part of the application level, database level, front-end level, and back-end level. So all together, we can test from the codebase to application front. That is self-sufficient.

I could add more to my main use case for Nucleus Security, especially because there is a mobile application. The mobile application tests more on different TestNG and various behavior testing, where you can do front-end, back-end, and some code test, which will be easier to do. In the case of the Rich Client Platform, such as RCP, Eclipse RCP, and NetBean RCP kind of environments, what happens is that the code is written in different ways and across different systems, resulting in occasional link failures. I would like to know whether the on-premises tool, specifically Nucleus Security, has a mechanism for that. In another way, there is a mechanism of Eclipse RCP or NetBean RCP kind of Rich Client Platform where users can install on-premises, remotely, or locally. In this case, sometimes we feel we only manually pull the code and test it independently, and everything is done. Then, once it is installed and the installer is ready, it becomes challenging to test everything together compared to the web front and other local or remote deployments of the web application compared to the RCP.

What is most valuable?

I think the best features that Nucleus Security offers are purely the faster remediation to dev tools, which is crucial for managing, prioritizing, and fixing vulnerabilities while helping operational pipelines run these vulnerability management tools. It stands out as one of the best compared with others.

Regarding faster remediation and managing, prioritizing, and fixing vulnerabilities across the pipeline, we use multiple tools—not only is Nucleus Security one of them, but we also perform multiple testing tools, manual tests, and regression tests including various unit tests, system tests, integration tests, and so on. We employ different tools for performance loading, capacity, and API testing. However, in this case, the tool is limited. As I mentioned, there are substantial benefits to using this tool. The unique aspect is that some of the other tools do not facilitate duplicate vulnerability removal. Here, we have a de-duplication mechanism, and if some tools provide easier remediation, that is also a significant advantage compared to the other tools.

The way Nucleus Security positively impacts my organization is that the team feels very focused, and they trust the reports generated from the tools compared to others. I often recommend the tool to a few of our customers based on my experience, and when I receive any positive feedback from any tool, I also suggest Nucleus Security to the team.

What needs improvement?

I recommend more enhancements focusing on penetration testing for both SSL over HTTP and non-SSL over HTTP, specifically targeting the RCP Rich Client Platform and Equinox frameworks that allow on-premises desktop applications to be tested simultaneously. I believe those would significantly improve the tool in the future.

I choose eight as my rating primarily because of the installer app; it becomes challenging to identify the actual vulnerabilities. Once we build this installer—rather than just working on the codebase—sometimes, we face gaps considering the build parameters and conversions to the installer. Identifying those gaps is an area that could use improvement after the installer or desktop application testing, which would be beneficial. That is the only reason; otherwise, I could easily rate it a ten out of ten given its smooth operational process.

For how long have I used the solution?

I have been using Nucleus Security for the last seven to eight years.

What do I think about the stability of the solution?

Nucleus Security is indeed stable.

What do I think about the scalability of the solution?

Its scalability in application is substantial. It supports larger applications and can easily scale, accelerating both application performance and business growth since it efficiently manages multiple user bases and applications running concurrently.

How are customer service and support?

The customer support is very nice.

Which solution did I use previously and why did I switch?

In the past, we have utilized different solutions. Previous tools involved a partnership with an Ireland-based company, which we utilized over a couple of years. Although they were somewhat costly, we relied on these for various compliance checks and reports on several platforms, including both medical applications and clinical trial platforms. However, we recognized certain limitations in visibility with those tools, prompting us to train developers better and avoid duplication during reporting, ultimately leading us to switch to tools that provide enhanced visibility and reporting.

What was our ROI?

I can assert that there is a tangible return on investment (ROI). While discussing with customers, they follow the investment ROI guidelines. Quality, vulnerability management, and security hold significant value for us as a solution provider. However, we do not specifically count ROI for these tools; I justify using the tool whenever I recommend it to customers, and they tend to agree based on that justification.

What's my experience with pricing, setup cost, and licensing?

I do not believe that the cost for Nucleus Security setup is excessively high. The pricing appears reasonable; it varies based on workload but still embodies value-driven services that justify the investment.

Which other solutions did I evaluate?

Before choosing Nucleus Security, we did evaluate other options, such as Parasoft. Although we had not used it extensively—only trialed it on one or two projects—before ultimately deciding to move forward with Nucleus Security. We also explored some open-source tools and other licensed penetration testing solutions, but limited in usage, thus examining multiple options.

What other advice do I have?

I think there are many features, but due to time constraints, I feel my inputs would be valuable. We would be actively using these tools, and I would suggest that people utilize them. For instance, if you cannot compare with Parasoft Jtest and others, including SonarQube, there are indeed many tools. However, this is one tool where you can process workflows smoothly, step-by-step. You have all the dashboards in one place with easy usability and clear reporting and metrics in view also. I would recommend that developers utilize all this visibility in one setup—not just at the application level, but also by linking to your repository directly where you implement the CI/CD model, pipelines, repository APIs, and comprehensive visibility. Right now, if there is a scripting or API layer vulnerability, it could be critical in failure. Therefore, you need to manage it adequately and also comply with different frameworks. Automated compliance reporting and security metrics are significant advantages of this dashboard.

Most customers look for the abstraction layer that I provide. Whatever you do from the beginning of writing code, the abstraction and code abstraction are very important. It defines everything. You see the outcome, which is often sufficient for the customer. Code abstraction, along with detailed drill-down of all elements highlighting key areas to work on, provides better visibility.

The advice I would give to those considering using Nucleus Security is that it really depends on the type of users they are. They need to evaluate based on their industry domain. Most individuals look into whether they adhere to different compliance standards. If they follow compliance regulations such as SOC 2, SOX, PCI, ISO 27,001, they can better control risk, reporting, application behavior, and metrics. There are various compliance standards such as GDPR and CCPA as well. Tools that provide improved visibility will undoubtedly meet customer expectations and queries. I rated Nucleus Security an eight out of ten in this review.


    reviewer2808414

Improved radiation safety and compliance has supported patient care but daily workflows still need refinement

  • March 11, 2026
  • Review from a verified AWS customer

What is our primary use case?

I have been using Nucleus Security for the past few years in my company, particularly in the healthcare field.

I use Nucleus Security especially for understanding radiation safety, nuclear medicine, and risk management in clinical settings. For healthcare, I use it most often to support safe handling practices including patient and staff protection, regulatory awareness, and broader health-related preparedness planning.

A specific example is reviewing work related to nuclear medicine exams. I use it to identify procedures such as PET scans or bone scans to ensure that radiation safety protocols, patient identification, documentation, and handling procedures are being followed correctly. On a day-to-day basis, I use that knowledge to support safe care, reduce risks, and help ensure compliance with healthcare standards.

What is most valuable?

The best features are strong risk prevention with clear safety protocols and incident preparedness. For us, the good regulatory support is very important.

These features help strengthen safety culture, improve protocol adherence, and reduce operational risks, especially in healthcare settings involving radiation and nuclear medicine use. They also support better staff awareness regarding clear handling procedures. Strong compliance practice is something we worry about considerably, and this really helps us a great deal. We also feel more confidence that patient teams and all actors involved are protected.

We have seen clear compliance and risk control outcomes more than other operational metrics. A specific positive result is fewer process gaps during documentation and safety checks, as well as strong consistency in following protocols for handling, traceability, and staff awareness. In practice, this means better audit readiness, a lower chance of procedure errors, and faster escalation when something appears out of standard, which is very important for us in the healthcare sector. The main improvements I have noticed are related to better compliance with safety procedures, more consistent documentation, and quick identification of potential risks.

What needs improvement?

I think it can be improved by making it more practical, integrated, and easier for teams to apply in real-world workflow from a healthcare perspective. The main improvements I can see right now are better user training with real-case scenarios rather than only theory, and clear and simple protocols for day-to-day operations. Strong integration between safety compliance and documentation systems would help significantly in practice for the healthcare field, which is a niche field. The biggest gain would come from making security processes easier to follow consistently, especially in busy environments where teams need to be aware of clarity and really need to rely on the documentation they are using.

I chose a rating of seven because it offers strong value in safety, risk reduction, and compliance, especially in healthcare. However, there is still room for improvement in usability and day-to-day integration. Protocols can be too complex in practice sometimes, and some processes can feel heavy and disconnected from our daily workflow.

For how long have I used the solution?

I have used the solution for the past few years.

What do I think about the stability of the solution?

The solution is stable.

What do I think about the scalability of the solution?

It has good potential for scalability.

How are customer service and support?

The support is very good. I have addressed a few questions, and I have no problem receiving answers in a good way.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

I think we used a different solution, but I was not aware of it when we used it. I am not quite sure which it was and why it was changed.

What was our ROI?

I have been seeing some returns on investment related to time saved and fewer employee needs. However, I don't have these numbers formally tracked. It is more of a feeling I have, along with the improvements in workflows.

What's my experience with pricing, setup cost, and licensing?

I have a good experience with that, so we don't have much problem dealing with pricing, setup, and licensing.

Which other solutions did I evaluate?

I evaluated four other solutions.

What other advice do I have?

My advice would be to focus first on a practical fit, not only on technical capability. Make sure it supports your real operational workflows, compliance needs, and incident response processes. In healthcare, which is such a high-risk environment, the best approach is to choose a solution that is clear for teams to use in daily life and easy to integrate. I would recommend involving both operational and safety teams early, because adoption works much better when the system is not seen as separate from the daily work. I gave this solution a rating of seven out of ten.

Which deployment model are you using for this solution?

Hybrid Cloud

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?


showing 1 - 2