Try our new research platform with insights from 80,000+ expert users

Cequence Security vs Fortify on Demand comparison

 

Comparison Buyer's Guide

Executive Summary
 

Categories and Ranking

Cequence Security
Ranking in Application Security Tools
25th
Average Rating
10.0
Reviews Sentiment
6.3
Number of Reviews
1
Ranking in other categories
Bot Management (5th), API Security (6th)
Fortify on Demand
Ranking in Application Security Tools
9th
Average Rating
8.0
Reviews Sentiment
7.8
Number of Reviews
59
Ranking in other categories
Static Application Security Testing (SAST) (8th)
 

Mindshare comparison

As of December 2024, in the Application Security Tools category, the mindshare of Cequence Security is 0.1%, down from 0.1% compared to the previous year. The mindshare of Fortify on Demand is 5.0%, up from 4.8% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Application Security Tools
 

Featured Reviews

reviewer2395431 - PeerSpot reviewer
Detect and mitigate attacks with API protection
Compliance with standards like those in Europe often requires ensuring that APIs adhere to OAuth and other security protocols. Many organizations need to verify that their APIs meet these compliance requirements. We can include information about where an API was first recorded and create a detailed chart. Some competitors already offer this feature. It is simple to integrate. Overall, I rate the solution a ten out of ten.
Jonathan Steyn - PeerSpot reviewer
Source code analyzer, FPR file generation, reduction of false positives and generates compliance reports, for in-depth analysis
Not challenges with the product itself. The product is very reliable. It does have a steep learning curve. But, again, one thing that Fortify or OpenText does very well is training. There are a lot of free resources and training in the community forums, free training as well as commercial training where users can train on how to use the back-end systems and the scanning engines and how to use command-line arguments because some of the procedures or some of the tools do require a bit of a learning curve. That's the only challenge I've really seen for customers because you have to learn how to use the tool effectively. But Fortify has, in fact, improved its user interface and the way users engage the dashboards and the interfaces. It is intuitive. It's easy to understand. But in some regards, the cybersecurity specialist or AppSec would need a bit of training to engage the user interface and to understand how it functions. But from the point of the reliability index and how powerful the tool is, there's no challenge there. But it's just from a learning perspective; users might need a bit more skill to use the tool. The user interface isn't that tedious. It's not that difficult to understand. When I initially learned how to use the interfaces, I was able to master it within a week and was able to use it quite effectively. So training is required. All skills are needed to learn how to use the tool. I would like to see more enhancements in the dashboards. Dashboards are available. They do need some configuration and settings. But I would like to see more business intelligence capabilities within the tool. It's not particularly a cybersecurity function, but, for instance, business impact analysis or other features where you can actually use business intelligence capabilities within your security tool. That would be remarkable because not only do you have a cybersecurity tool, but you also have a tool that can give you business impact analysis and some other measurements. A bit more intelligence in terms of that from a cybersecurity perspective would be remarkable.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"It uses machine learning algorithms to detect attacks and manage API inventory."
"I don’t know of any other On-Demand enterprise solution like this one where we can load the details and within a few days, receive the results of intrusion attacks, and work with HP Security Experts when needed for clarification"
"The solution scans our code and provides us with a dashboard of all the vulnerabilities and the criticality of the vulnerabilities. It is very useful that they provide right then and there all the information about the vulnerability, including possible fixes, as well as some additional documentation and links to the authoritative sources of why this is an issue and what's the correct way to deal with it."
"The most valuable feature is that it connects with your development platforms, such as Microsoft Information Server and Jira."
"Once we have our project created with our application pipeline connected to the test scanning, it only takes two minutes. The report explaining what needs to be modified related to security and vulnerabilities in our code is very helpful. We are able to do static and dynamic code scanning."
"It's a stable and scalable solution."
"The source code analyzer is the most effective for identifying security vulnerabilities."
"The solution is user-friendly. One feature I find very effective is the tool's automatic scanning capability. It scans replicas of the code developers write and automatically detects any vulnerabilities. The integration with CI/CD tools is also useful for plugins."
"The user interface is good."
 

Cons

"It is expensive."
"The UI could be better. Fortify should also suggest new packages in the product that can be upgraded. Currently, it shows that, but it's not visible enough. In future versions, I would like more insights about the types of vulnerabilities and the pages associated with the exact CVE."
"This solution would be improved if the code-quality perspective were added to it, on top of the security aspect."
"It does scanning for all virtual machines and other things, but it doesn't do the scanning for containers. It currently lacks the ability to do the scanning on containers. We're asking their product management team to expand this capability to containers."
"They could provide features for artificial intelligence similar to other vendors."
"The products must provide better integration with build tools."
"An improvement would be the ability to get vulnerabilities flowing automatically into another system."
"I would like the solution to add AI support."
"Temenos's (T-24) info basic is a separate programming interface, and such proprietary platforms and programming interfaces were not easily supported by the out-of-the-box versions of Fortify."
 

Pricing and Cost Advice

Information not available
"Despite being on the higher end in terms of cost, the biggest value lies in its abilities, including robust features, seamless integration, and high-quality findings."
"The pricing model it's based on how many applications you wish to scan."
"It's a yearly contract, but I don't remember the dollar amount."
"I believe the rental license is not too expensive, but it provides a lot of information about the vulnerabilities."
"Fortify on Demand is affordable, and its licensing comes with a year of support."
"The subscription model, on a per-scan basis, is a bit expensive. That's another reason we are not using it for all the apps."
"If I exceed one million lines of code, there might be an extra cost or a change in the pricing bracket."
"There are different costs for Micro Focus Fortify on Demand depending on the assessments you want to use. There is only a standard license needed to use the solution."
report
Use our free recommendation engine to learn which Application Security Tools solutions are best for your needs.
824,053 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Financial Services Firm
17%
Computer Software Company
16%
Manufacturing Company
9%
Educational Organization
6%
Financial Services Firm
20%
Manufacturing Company
14%
Computer Software Company
12%
Government
9%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
No data available
 

Questions from the Community

Cequence Security vs Jscrambler: What are the advantages and disadvantages of each?
From a Cequence perspective: There are several reasons to consider Cequence. First, we're an API security solution. We protect APIs that act as the glue that makes your applications work. Since API...
How does Cequence Security establish a baseline of normal application behavior and detect anomalies?
Cequence Security employs advanced machine learning and AI techniques to analyze the behavior of our applications in real-time. By continuously monitoring and processing data from user interactions...
What is Cequence Security's API Spartan and how can it help defend our company's infrastructure from bot attacks?
Cequence Security's behavior-based bot defense relies on the industry's largest threat database of bot behaviors, enabling users to track and block automated attacks with unparalleled efficacy rate...
What do you like most about Micro Focus Fortify on Demand?
It helps deploy and track changes easily as per time-to-time market upgrades.
What is your experience regarding pricing and costs for Micro Focus Fortify on Demand?
In comparison with other tools, they're competitive. It is not more expensive than other solutions, but their pricing is competitive. The licenses for Fortify On Demand are generally bought in unit...
What needs improvement with Micro Focus Fortify on Demand?
Not challenges with the product itself. The product is very reliable. It does have a steep learning curve. But, again, one thing that Fortify or OpenText does very well is training. There are a lot...
 

Also Known As

Cequence ASP, Cequence Unified API Protection Platform
Micro Focus Fortify on Demand
 

Overview

 

Sample Customers

American Express, Lbrands, Ulta Beauty
SAP, Aaron's, British Gas, FICO, Cox Automative, Callcredit Information Group, Vital and more.
Find out what your peers are saying about Sonar, Veracode, Checkmarx and others in Application Security Tools. Updated: December 2024.
824,053 professionals have used our research since 2012.