Try our new research platform with insights from 80,000+ expert users

Cequence Security vs OpenText Core Application Security comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Jun 19, 2025

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Cequence Security
Ranking in Application Security Tools
23rd
Average Rating
10.0
Reviews Sentiment
5.4
Number of Reviews
1
Ranking in other categories
Bot Management (5th), API Security (7th)
OpenText Core Application S...
Ranking in Application Security Tools
14th
Average Rating
8.0
Reviews Sentiment
7.8
Number of Reviews
60
Ranking in other categories
Static Application Security Testing (SAST) (12th)
 

Mindshare comparison

As of July 2025, in the Application Security Tools category, the mindshare of Cequence Security is 0.2%, up from 0.1% compared to the previous year. The mindshare of OpenText Core Application Security is 4.3%, down from 5.1% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Application Security Tools
 

Featured Reviews

reviewer2395431 - PeerSpot reviewer
Detect and mitigate attacks with API protection
Compliance with standards like those in Europe often requires ensuring that APIs adhere to OAuth and other security protocols. Many organizations need to verify that their APIs meet these compliance requirements. We can include information about where an API was first recorded and create a detailed chart. Some competitors already offer this feature. It is simple to integrate. Overall, I rate the solution a ten out of ten.
Jonathan Steyn - PeerSpot reviewer
Source code analyzer, FPR file generation, reduction of false positives and generates compliance reports, for in-depth analysis
Not challenges with the product itself. The product is very reliable. It does have a steep learning curve. But, again, one thing that Fortify or OpenText does very well is training. There are a lot of free resources and training in the community forums, free training as well as commercial training where users can train on how to use the back-end systems and the scanning engines and how to use command-line arguments because some of the procedures or some of the tools do require a bit of a learning curve. That's the only challenge I've really seen for customers because you have to learn how to use the tool effectively. But Fortify has, in fact, improved its user interface and the way users engage the dashboards and the interfaces. It is intuitive. It's easy to understand. But in some regards, the cybersecurity specialist or AppSec would need a bit of training to engage the user interface and to understand how it functions. But from the point of the reliability index and how powerful the tool is, there's no challenge there. But it's just from a learning perspective; users might need a bit more skill to use the tool. The user interface isn't that tedious. It's not that difficult to understand. When I initially learned how to use the interfaces, I was able to master it within a week and was able to use it quite effectively. So training is required. All skills are needed to learn how to use the tool. I would like to see more enhancements in the dashboards. Dashboards are available. They do need some configuration and settings. But I would like to see more business intelligence capabilities within the tool. It's not particularly a cybersecurity function, but, for instance, business impact analysis or other features where you can actually use business intelligence capabilities within your security tool. That would be remarkable because not only do you have a cybersecurity tool, but you also have a tool that can give you business impact analysis and some other measurements. A bit more intelligence in terms of that from a cybersecurity perspective would be remarkable.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"It uses machine learning algorithms to detect attacks and manage API inventory."
"The solution is user-friendly."
"The quality of application security testing reduces risk and gives very few false positives."
"The licensing was good."
"The user interface is good."
"I use the solution in my company for security code scans."
"The most valuable feature is the capacity to be able to check vulnerabilities during the development process. The development team can check whether the code they are using is vulnerable to some type of attack or there is some type of vulnerability so that they can mitigate it. It helps us in achieving a more secure approach towards internal applications. It is an intuitive solution. It gives all the information that a developer needs to remediate a vulnerability in the coding process. It also gives you some examples of how to remediate a vulnerability in different programming languages. This solution is pretty much what we were searching for."
"Audit workbench: for on-the-fly defect auditing."
"I do not remember any issues with stability."
 

Cons

"It is expensive."
"With Rapid7 I utilized its reporting capabilities to deliver Client Reports within just a few minutes of checking the data. I believe that HP’s FoD Clients could sell more services to clients if HP put more effort into delivering visually pleasing reporting capabilities."
"There are frequent complaints about false positives from Fortify. One day it may pass a scan with no issues, and the next day, without any code changes, it will report vulnerabilities such as password exposure."
"This solution would be improved if the code-quality perspective were added to it, on top of the security aspect."
"Fortify on Demand could be improved with support in Russia."
"The thing that could be improved is reducing the cost of usage and including some of the most pricey features, such as dynamic analysis and that sort of functionality, which makes the difference between different types of tools."
"It lacks of some important features that the competitors have, such as Software Composition Analysis, full dead code detection, and Agile Alliance's Best Practices and Technical Debt."
"We would like a reduction in the time frame of scans. It takes us three to five days to run a scan now. We would like that reduced to under three days."
"The technical support is actually a problem that needs to be addressed. Since the acquisition and merger with Hewlett Packard, it has been really hard to know who the technical or salesperson to talk to."
 

Pricing and Cost Advice

Information not available
"It is quite expensive. Pricing and the licensing model could be improved."
"Buying a license would be feasible for regular use. For intermittent use, the cloud-based option can be used (Fortify on Demand)."
"It's a yearly contract, but I don't remember the dollar amount."
"The subscription model, on a per-scan basis, is a bit expensive. That's another reason we are not using it for all the apps."
"The licensing was good because the licenses have the heavy centralized server."
"The solution is a little expensive."
"The solution is expensive and the price could be reduced."
"Fortify on Demand is more expensive than Burpsuite. I rate its pricing a nine out of ten."
report
Use our free recommendation engine to learn which Application Security Tools solutions are best for your needs.
861,524 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Financial Services Firm
16%
Computer Software Company
15%
Educational Organization
8%
Manufacturing Company
7%
Financial Services Firm
19%
Manufacturing Company
15%
Computer Software Company
11%
Government
8%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
No data available
 

Questions from the Community

What is your primary use case for Cequence Security?
We use the solution to detect and mitigate attacks. It helps prevent them while also protecting APIs and effectively managing API inventory.
What advice do you have for others considering Cequence Security?
Compliance with standards like those in Europe often requires ensuring that APIs adhere to OAuth and other security protocols. Many organizations need to verify that their APIs meet these complianc...
What do you like most about Micro Focus Fortify on Demand?
It helps deploy and track changes easily as per time-to-time market upgrades.
What is your experience regarding pricing and costs for Micro Focus Fortify on Demand?
In comparison with other tools, they're competitive. It is not more expensive than other solutions, but their pricing is competitive. The licenses for Fortify On Demand are generally bought in unit...
What needs improvement with Micro Focus Fortify on Demand?
There are frequent complaints about false positives from Fortify. One day it may pass a scan with no issues, and the next day, without any code changes, it will report vulnerabilities such as passw...
 

Also Known As

Cequence ASP, Cequence Unified API Protection Platform
Micro Focus Fortify on Demand
 

Overview

 

Sample Customers

American Express, Lbrands, Ulta Beauty
SAP, Aaron's, British Gas, FICO, Cox Automative, Callcredit Information Group, Vital and more.
Find out what your peers are saying about Sonar, Veracode, Checkmarx and others in Application Security Tools. Updated: June 2025.
861,524 professionals have used our research since 2012.