No more typing reviews! Try our Samantha, our new voice AI agent.

Defensics Protocol Fuzzing vs OpenText Core Application Security comparison

 

Comparison Buyer's Guide

Executive Summary

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Defensics Protocol Fuzzing
Average Rating
8.6
Number of Reviews
4
Ranking in other categories
Fuzz Testing Tools (4th)
OpenText Core Application S...
Average Rating
8.0
Reviews Sentiment
7.0
Number of Reviews
64
Ranking in other categories
Application Security Tools (12th), Static Application Security Testing (SAST) (9th)
 

Mindshare comparison

While both are Quality Assurance solutions, they serve different purposes. Defensics Protocol Fuzzing is designed for Fuzz Testing Tools and holds a mindshare of 16.0%, down 25.3% compared to last year.
OpenText Core Application Security, on the other hand, focuses on Application Security Tools, holds 3.1% mindshare, down 4.4% since last year.
Fuzz Testing Tools Mindshare Distribution
ProductMindshare (%)
Defensics Protocol Fuzzing16.0%
PortSwigger Burp Suite Professional33.6%
GitLab29.2%
Other21.200000000000003%
Fuzz Testing Tools
Application Security Tools Mindshare Distribution
ProductMindshare (%)
OpenText Core Application Security3.1%
SonarQube13.6%
Checkmarx One8.8%
Other74.5%
Application Security Tools
 

Featured Reviews

SK
Senior Technical Lead at HCL Technologies
Product security tests for switches and router sections
Codenomicon Defensics should be more advanced for the testing sector. It should be somewhat easy and flexible to install. What I see in the documentation isn't that. Even if something doesn't malfunction, sometimes it is hard to install and execute. The product needs video documentation. This would help a lot more.
Himanshu_Tyagi - PeerSpot reviewer
Lead Cybersecurity at TBO
Supports secure development pipelines and improves issue detection but limits internal visibility and needs broader dashboard integration
If you have an internal team and you want your internal team to validate false positives, basically to determine whether it's a valid issue or an invalid issue, then I wouldn't recommend it much. That was the only reason we migrated from Fortify on Demand to another solution. Fortify has another tool which is Fortify WebInspect. On Demand is the outsourcing solution, and WebInspect you can use with your in-house team, which is basically the product developed by the Fortify team. For automated scanning, Fortify helps a lot. Regarding the visibility for the internal team, everyone is moving toward the DevSecOps side, and Fortify team has made good progress that you can integrate into your CICD pipeline. One thing I would highlight is if Fortify can focus more on the centralized dashboard of the tools because nowadays, tools such as SentinelOne also exist for identifying security issues, but they have a centralized dashboard that merges their cloud solution and application security side solution together. If you have one tool that works for different solutions, it helps a lot. They are doing good, but they should invest more on the AI side as well because AI security is evolving these days. On the cloud side, they have already made good progress, but I believe they should explore the new area related to AI security as well.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"ROI was 100%. Since there are no product suites available that provide the level of testing available with Codenomicon, the development, quality and security assurance departments know that the investment was correct."
"The product is related to US usage with TLS contact fees, i.e. how more data center connections will help lower networking costs."
"Simple and straightforward GUI."
"We have found multiple issues in our embedded system network protocols, related to buffer overflow. We have reduced some of these issues."
"Whatever the test suit they give, it is intelligent. It will understand the protocol and it will generate the test cases based on the protocol: protocol, message sequence, protocol, message structure... Because of that, we can eliminate a lot of unwanted test cases, so we can execute the tests and complete them very quickly."
"Whatever the test suit they give, it is intelligent; it will understand the protocol and it will generate the test cases based on the protocol: protocol, message sequence, protocol, message structure, and because of that, we can eliminate a lot of unwanted test cases so we can execute the tests and complete them very quickly."
"The stability of this product is great; we tested it under multiple constraints and even on cloud services it is absolutely stable."
"Fortify supports most languages, integrates with lots of tools, and has API support, whereas other tools are limited to typical languages and IBM's solutions are not flexible enough to support any language."
"The installation was easy."
"Audit workbench: for on-the-fly defect auditing."
"I use the solution in my company for security code scans."
"It is valuable in improving our overall security posture by catching significant errors."
"The process was easy to follow and we were supported 24/7 by TAM personnel to help with any fire drills, which was helpful many times when I needed a quick answer late at night or early in the morning."
"Fortify helps us to stay updated with the newest languages and versions coming out."
"OpenText Core Application Security helps maintain compliance standards with a faster remediation cycle, as we know the vulnerabilities, and everybody knows that the developers can perform fixes more quickly."
 

Cons

"Sometimes, when we are testing embedded devices, when we trigger the test cases, the target will crash immediately. It is very difficult for us to identify the root cause of the crash because they do not provide sophisticated tools on the target side. They cover only the client-side application... They do not have diagnostic tools for the target side. Rather, they have them but they are very minimal and not very helpful."
"Codenomicon Defensics should be more advanced for the testing sector. It should be somewhat easy and flexible to install."
"It does not support the complete protocol stack. There are some IoT protocols that are not supported and new protocols that are not supported."
"It requires understanding the Defensics protocol."
"Sometimes, when we are testing embedded devices, when we trigger the test cases, the target will crash immediately. It is very difficult for us to identify the root cause of the crash because they do not provide sophisticated tools on the target side."
"Codenomicon Defensics should be more advanced for the testing sector. It should be somewhat easy and flexible to install."
"You can't implement proprietary ciphering algorithms, nor can you modify protocol models if you need to test customized public protocols."
"There are many false positives identified by the solution."
"Micro Focus Fortify on Demand can improve by having more graphs. For example, to show the improvement of the level of security."
"The reporting capabilities need improvement, as there are some features that we would like to have but are not available at the moment."
"I would say OpenText Core Application Security is not very user-friendly in terms of price; it is quite high."
"Micro Focus Fortify on Demand can improve by having more graphs. For example, to show the improvement of the level of security."
"Reporting could be improved. It would nice to export to an Excel sheet or another spreadsheet."
"It could have a little bit more streamlined installation procedure. Based on the things that I've done, it could also be a bit more automated. It is kind of taking a bunch of different scanners, and SSC is just kind of managing the results. The scanning doesn't really seem to be fully integrated into the SSC platform. More automation and any kind of integration in the SSC platform would definitely be good. There could be a way to initiate scans from SSC and more functionality on the server-side to initiate desk scans if it is not already available."
"Takes up a lot of resources which can slow things down."
 

Pricing and Cost Advice

"Licensing is a bit expensive."
"The pricing can be improved because it is complex when compared to the competition."
"We are still using the trial version at this point but I can already see from the trial version alone that it is a good product. For others, I would say that Fortify on Demand might look expensive at the beginning, but it is very powerful and so you shouldn't be put off by the price."
"The solution is expensive and the price could be reduced."
"Fortify on Demand is moderately priced, but its pricing could be more flexible."
"It is cost-effective."
"The licensing was good because the licenses have the heavy centralized server."
"It is not more expensive than other solutions, but the pricing is competitive."
"It is quite expensive. Pricing and the licensing model could be improved."
report
Use our free recommendation engine to learn which Fuzz Testing Tools solutions are best for your needs.
894,830 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Computer Software Company
16%
Manufacturing Company
11%
Financial Services Firm
9%
Retailer
6%
Financial Services Firm
14%
Manufacturing Company
13%
Computer Software Company
7%
Government
7%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
No data available
By reviewers
Company SizeCount
Small Business18
Midsize Enterprise8
Large Enterprise46
 

Questions from the Community

Ask a question
Earn 20 points
What is your experience regarding pricing and costs for Micro Focus Fortify on Demand?
In comparison with other tools, they're competitive. It is not more expensive than other solutions, but their pricing is competitive. The licenses for Fortify On Demand are generally bought in unit...
What needs improvement with Micro Focus Fortify on Demand?
Areas for improvement should be contextualized post the OpenText acquisition, but back when I was working with Micro Focus, they focused heavily on enterprise-centric solutions. Now, after the acqu...
What is your primary use case for Micro Focus Fortify on Demand?
For OpenText Core Application Security, I currently support a couple of my clients who are using Fortify on Demand for their web application, CRM, and sales platform. Many good features of Fortify ...
 

Also Known As

Codenomicon Defensics
Micro Focus Fortify on Demand
 

Overview

 

Sample Customers

Coriant, CERT-FI, Next Generation Networks
SAP, Aaron's, British Gas, FICO, Cox Automative, Callcredit Information Group, Vital and more.
Find out what your peers are saying about Defensics Protocol Fuzzing vs. GitLab and other solutions. Updated: April 2026.
894,830 professionals have used our research since 2012.