We use the solution for scanning pipelines.
A stable and available solution that helps users scan and fix vulnerabilities in the pipeline
Pros and Cons
- "The product helps users to scan and fix vulnerabilities in the pipeline."
- "The technical support team must be proactive."
What is our primary use case?
What is most valuable?
It is a good solution. We get good feedback about the product from our clients. The product helps users to scan and fix vulnerabilities in the pipeline.
What needs improvement?
The technical support team must be proactive. The team must advise users about the available features, how to find them, and how to use them better.
For how long have I used the solution?
We have been using the solution for a customer for six to eight months.
Buyer's Guide
OWASP Zap
January 2025
Learn what your peers think about OWASP Zap. Get advice and tips from experienced pros sharing their opinions. Updated: January 2025.
831,265 professionals have used our research since 2012.
What do I think about the stability of the solution?
We have not experienced any challenges in the tool's maintenance, availability, and stability.
What do I think about the scalability of the solution?
The scalability could be better. I rate the tool’s scalability a seven out of ten. Our customers are medium-sized businesses.
How are customer service and support?
The technical support is very good. We had some issues during installation. We reached out to the support team and got it clarified immediately. We have reached out to the support team only once. If we continue getting good support from the team, I might rate support a nine or ten out of ten in the future. For now, I rate it an eight out of ten.
How would you rate customer service and support?
Positive
How was the initial setup?
The installation and integration are easy. It's not challenging. The implementation was done in different phases. Our customers took a few days to install the solution. They needed two engineers to install it. We do not have any problem in maintaining the tool. It is deployed on the cloud.
What other advice do I have?
I would recommend the solution to my clients since it is a proven product. We have no issues with stability, scalability, and technical support. Overall, I rate the product an eight out of ten.
Disclosure: My company has a business relationship with this vendor other than being a customer: Consultant
Security Officer at UnDisclosed
Stable dynamic testing solution with unreliable manual processes
Pros and Cons
- "Stability-wise, I rate the solution a nine out of ten. I think it's stable enough. I don't see any crashes within the application, so its stability is high."
- "The solution is somewhat unreliable because after we get the finding, we have to manually verify each of its findings to see whether it's a false positive or a true finding, and it takes time."
What is our primary use case?
OWASP Zap is used for dynamic testing. So when any kind of application, like, a web application, needs to be tested for its security and vulnerabilities. It is also used to crawl the site and then to enumerate all the input or the possible exploitation points, and then we try to exploit any blockings within OWASP Zap.
How has it helped my organization?
It improved our company's functioning because it integrates and can automate most of our workflow, so it helps. Based on its automation abilities, I rate it a seven out of ten. But there are many things that I have to do manually for safety and better clarification.
What is most valuable?
I think the automation feature is the one I used the most in the tool. For the crawling and enumeration one and the feature, we can manipulate the insides of the response. So, we can manipulate web responses and use them to test a certain website's security.
What needs improvement?
Since it is a community-based tool, I am unsure if OWASP Zap is quite up to date with recent weaknesses currently exploitable in work. So, sometimes we have to add to do it manually. How to differentiate between the false positive and the true findings need improvement. In general, the shortcomings in the accuracy of the findings need to be improved.
The automation process can help us perform website attacks using the latest exploit techniques and procedures, often used in reverse scenarios. Although other commercial solutions have this feature, I hope OWASP Zap can catch up and offer similar capabilities.
For how long have I used the solution?
I have been using the solution for four or five years. We got the information from the community that it is open-source software, so we are using it as part of the community. We are using the open-source version. It is not difficult to upgrade to the latest version.
What do I think about the stability of the solution?
Stability-wise, I rate the solution a nine out of ten. I think it's stable enough. I don't see any crashes within the application, so its stability is high. I never found the applications crashing.
What do I think about the scalability of the solution?
Scalability-wise, I rate the solution a five out of ten.
The solution is somewhat unreliable because after we get the finding, we have to manually verify each of its findings to see whether it's a false positive or a true finding, and it takes time. Five users who are IT security engineers in my company use the tool. I plan to increase the usage of the tool in the future.
How are customer service and support?
Since it's a community-based tool, I rate the solution's technical support as less than five. It's community support. We do not have technical support, so we have to manually read the documentation and check the community forums.
How would you rate customer service and support?
Neutral
How was the initial setup?
I rate the initial setup a ten out of ten since it is easy. The server is easily deployed because it's an open-source and free solution. I think it's very easy to install on every computer authorized to use it.
Which other solutions did I evaluate?
I am still currently using Burp Suite, which is free.
What other advice do I have?
I can recommend others to use the solution for a quick and easy introduction to dynamic testing. But for the more advanced solution and for users like myself who understand the application suite itself for others and any organization to use the commercial solution as a proxy. I rate the overall solution a seven out of ten.
Which deployment model are you using for this solution?
On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Buyer's Guide
OWASP Zap
January 2025
Learn what your peers think about OWASP Zap. Get advice and tips from experienced pros sharing their opinions. Updated: January 2025.
831,265 professionals have used our research since 2012.
Head Of Development at VALOORES
An easy-to-install product that discovers more vulnerabilities than any other tool in the market
Pros and Cons
- "The product discovers more vulnerabilities compared to other tools."
- "The product should allow users to customize the report based on their needs."
What is our primary use case?
We use the product to ensure that our source code is safe enough and has no vulnerabilities before delivering a new release for our AML product. We also used the product for dynamic testing to test applications as a black box.
What is most valuable?
The report design is very useful. The explanation is very clear. It also provides additional solutions and plugins. The product discovers more vulnerabilities compared to other tools. It might have additional plugins and features for testing.
What needs improvement?
The product should allow users to customize the report based on their needs. For example, suppose the user needs to test only the vulnerability of SQL injection and not any other category or vulnerabilities. In that case, it's better to provide end users with a way to choose the subject they want to audit and the severity of the vulnerability.
If I need to figure out only the critical or the high severity, I shouldn’t have to figure out the low severity vulnerabilities or the smell codes. These services could be helpful for the end user and save time whenever we need to generate a new report. The execution time is a little bit exaggerated. This process can optimize the report’s performance.
For how long have I used the solution?
I have been using the solution for two to three months.
What do I think about the stability of the solution?
The solution is very stable. I rate the solution’s stability a nine out of ten.
What do I think about the scalability of the solution?
Two resources from our security team work on generating and implementing reports. However, many other developers use the product to fix vulnerabilities and penetrate or audit the whole source code for products. The owner of the product and the developers are involved in the correction and the long-term plan to cover or close the vulnerability.
How was the initial setup?
I rate the ease of setup an eight out of ten.
What about the implementation team?
The installation is quick. It can be done in a couple of hours.
What's my experience with pricing, setup cost, and licensing?
The solution’s pricing is high. I rate the pricing a nine or ten out of ten. There is an indirect cost on the resources and specs needed to deploy or implement the product. When we run the report, it consumes a lot of du from the servers.
What other advice do I have?
We use SonarQube for penetration testing. We are most likely to have hybrid solutions. However, the deployment model depends on our clients, the data, and the type of product we will deploy. I didn't use automatic scalability for our deliveries and deployment.
The solution is worth using. We've used many tools and discovered that OWASP detects multiple high vulnerabilities, which the other tools do not detect. Overall, I rate the product an eight out of ten.
Disclosure: My company has a business relationship with this vendor other than being a customer:
Manager, Quality Assurance at Managed Markets Insight & Technology, LLC
It's easy to use and the automated scan is powerful, but the cloud integration could be improved
Pros and Cons
- "ZAP is easy to use. The automated scan is a powerful feature. You can simulate attacks with various parameters. ZAP integrates well with SonarQube."
- "ZAP's integration with cloud-based CICD pipelines could be better. The scan should run through the entire pipeline."
What is our primary use case?
We use ZAP for penetration testing.
What is most valuable?
ZAP is easy to use. The automated scan is a powerful feature. You can simulate attacks with various parameters. ZAP integrates well with SonarQube.
What needs improvement?
ZAP's integration with cloud-based CICD pipelines could be better. The scan should run through the entire pipeline.
For how long have I used the solution?
We have used ZAP for more than six months.
What do I think about the stability of the solution?
ZAP is stable.
How are customer service and support?
I rate ZAP support seven out of 10. It's good.
How would you rate customer service and support?
Neutral
How was the initial setup?
Deploying ZAP is straightforward. It took me and one other person three or four days to install and configure ZAP.
What's my experience with pricing, setup cost, and licensing?
We use the community version.
Which other solutions did I evaluate?
We did a POC for a tool by NetSuite, but that was a paid tool.
What other advice do I have?
I rate OWASP ZAP seven out of 10. It's an excellent penetration testing tool for developers. That scanning part is solid, but the integration with AWS and Azure pipelines could be better.
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Director - Head of Delivery Services at Ticking Minds Technology Solutions Pvt Ltd
Inexpensive licensing, free to use, and has good community support
Pros and Cons
- "The OWASP's tool is free of cost, which gives it a great advantage, especially for smaller companies to make use of the tool."
- "There's very little documentation that comes with OWASP Zap."
What is our primary use case?
I focus on software application security. In most of the scenarios that we come across, the customers want complete assurance on security of their platforms/products/applications. Clients reach out to us for our abilities to unearth security issues.
I get to use these tools to assess products/platforms before they go live to the market.
How has it helped my organization?
We recently ran into an issue where we had to test the OAuth token validation, where the REST API calls had OAuth token change every time a request was being sent. Somebody from the support community had contributed a sample code to accomplish this. In terms of the community support that is available, OWASP Zap has great set of features to use.
What is most valuable?
The OWASP's tool is free of cost, which gives it a great advantage, especially for smaller companies to make use of the tool and at the same time give a comprehensive report with great confidence to the client for helping them in their go-live decision. In terms of technical supremacy, I would put PortSwigger's Burp Suite ahead in terms of the ease with which I can retry the request with different combinations or conduct different attacks.
What needs improvement?
OWASP Zap has the award for best token authentication. A lot of applications are getting into this space where there are token barriers. Moreover ZAP Proxy security scans are excellent providing a comprehensive coverage.
One area where the tool can be improved is specifically, if there's some more intelligence that can be added on to the reporting feature, it would be great.
There's some element of intelligence that can be built into it as to how reports can be generated. Currently, there are only a few ways, i.e. a couple of templates with which you can generate these reports. If there are additional templates that could be put in place, the reports would come out very well, and we'd be able to edit it along reading the report.
That could be good for us to make it through. Because that is an area that we've seen typically, where it's common in the other tools. We run the test. We run the scans. We do the vulnerability assessment, analyze their impacts and then we generate the report.
There's the element of documentation that we need to create along with that. If there is a provision to enter inputs like below as part of report generation:
- Project information
- Client name
- Organization name
- Platform against which this test has been done
If these small inputs can be handled, at the end of the report, I would have a customized report which I could easily give across to the customer.
Today it's this is something not easily available in not at that level in the tool. In the reporting presentation format, Acunetix tool has a much better "look and feel" appearance. The clients love it when we do it in that.
For how long have I used the solution?
We have been using OWASP Zap for more than eight months.
What do I think about the stability of the solution?
The only place that I faced issues with the OWASP was testing for a large broadcasting company. The number of requests that come forward is quite large. When the requests are quite huge, we found that ZAP Proxy tool tends to be a little more slow to respond. We're not sure whether it's progressing at the background or whether the application is frozen. We have faced the encounter when we are sending in large payloads, i.e. the multiple requests pull through defensive issues there.Other than that we have not seen significant issue with the tool.
What do I think about the scalability of the solution?
Currently, we have three of us who have been using the OWASP Zap proxy tool. There are times when we even propose this ZAP proxy tool to customers. Sometimes, we get requests from clients who want us to use a specific solution like Acunetix, BurpSuite.
For the choice of which tool to use in the long run, the decision is driven by the customers. When customers ask us for a tool recommendation, we do a security tool comparison analysis, and make a recommendation that best suits them, explaining the pros and cons of each tools. i.e when you use a solution like OWASP Zap versus going on with a tool like Burp Suite or Acunetix.
How are customer service and technical support?
For OWASP, I've been only looking at their community, but I felt that PortSwigger has much better tech support. In terms of community support, OWASP Zap is very much there.
For example, we expected PortSwigger to have OAuth token to be available by default, but that was not on their product road map. Fortunately for us, we had somebody from the community who had created several extensions which were a great help to us.
In terms of product support, I would say, Port Swigger support has been very good.
How was the initial setup?
The initial setup of OWASP Zap was straightforward. That's not an issue at all with OWASP.
What's my experience with pricing, setup cost, and licensing?
As far as pricing concerns, for value in the commercial solutions when it comes to security testing tools, it is Burp Suite. Some Burp Suite licenses are available for $300 over a 1-year term, which is pocket-friendly for us. We feel that PortSwigger Burp Suite is the best value for the money that we get. When it comes to clients looking for non-commerical licenses, OWASP Zap tool is the best fit.
What other advice do I have?
When people are trying to make use of OWASP Zap, I would advise first read through and understand the OWASP vulnerabilities very well. Then start looking at features, tutorials of the OWASP ZAP Proxy that are made available online.
There are a lot of YouTube videos, articles in the internet that talk about how to use the tools. These are quite easy to understand. Do a small POC. Pick an application which is already having vulnerabilities and assess the application around with the ZAP Proxy tool.
In terms of ZAP Proxy tool ease of use, I would rate it nine out of ten.
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Security Engineer at Eon Health
Has a good application scanning feature but reporting needs improvement
Pros and Cons
- "The application scanning feature is the most valuable feature."
- "The reporting feature could be more descriptive."
What is our primary use case?
We use it for our security scanning for our applications.
What is most valuable?
The application scanning feature is the most valuable feature.
What needs improvement?
The reporting feature could be more descriptive.
For how long have I used the solution?
I have been using OWASP Zap for four years.
What do I think about the stability of the solution?
It is a stable solution.
What do I think about the scalability of the solution?
Presently seven people use this solution. It is scalable.
How was the initial setup?
The initial setup is straightforward.
What's my experience with pricing, setup cost, and licensing?
It's open source.
What other advice do I have?
Overall, i would rate the solution a seven out of ten.
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Information Security Professional at AEDC
Fast and easy to set up but uses a lot of memory
Pros and Cons
- "You can run it against multiple targets."
- "There isn't too much information about it online."
What is our primary use case?
It's running on my system. I use it to scan URLs and can check things if I find something.
What is most valuable?
There's a way to set up jobs where you can get it to run all the processes against the target to avoid doing so manually. You can run it against multiple targets.
It is easy to set up.
The solution is stable.
What needs improvement?
I don't have any notes for improvements.
It should have more visibility. Everybody defaults to Burp. However, this is a free version that deserves more visibility.
There isn't too much information about it online. You need to self-teach in order to really learn how to use it. There isn't a lot of documentation available.
It takes up a lot of memory and RAM.
For how long have I used the solution?
I've been using the solution for roughly six months. I've used it on and off. However, I really started using it constantly over the last six months.
What do I think about the stability of the solution?
The solution is mostly stable. However, it requires a lot of RAM and memory. There are no bugs or glitches.
What do I think about the scalability of the solution?
It is not very scalable.
I'm the only security engineer. Only I use it in my company.
How are customer service and support?
I've never used technical support. I'm not sure how helpful or responsive they are.
Which solution did I use previously and why did I switch?
I used to use Portswigger Burp. This solution is free and has a lot of the paid versions Burp offers. I haven't used Burp Professional. I used the community version. I chose this solution as it is faster, at least compared to the community version. My understanding it the paid version of Burp is very fast.
How was the initial setup?
The initial setup was very simple and straightforward. I didn't find any difficulty installing it on my system.
It takes about ten to 15 minutes to deploy. It depends on the machine you have.
What's my experience with pricing, setup cost, and licensing?
The solution is free to use. I don't pay any licensing fees.
What other advice do I have?
I'm an end-user.
I'm not sure which version of the solution I'm using.
I would rate the solution seven out of ten. While it is free to use, it does take up a lot of memory. I also find Burp easier to use than this product.
Which deployment model are you using for this solution?
On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Works at a retailer with 1,001-5,000 employees
Finds Vulnerabilities And Gives The Latest Attacks And How To Protect Against Them
Pros and Cons
- "The vulnerabilities that it finds, because the primary goal is to secure applications and websites."
- "It doesn't run on absolutely every operating system."
What is most valuable?
The vulnerabilities that it finds, because the primary goal is to secure applications and websites.
How has it helped my organization?
When I checked the CVE and MITRE databases, that gives the latest attacks that are out there for a particular software, hardware and how to protect against it.
What needs improvement?
It's possibly just a limitation of the product itself but sometimes it won't scan a particular website so you have to manually go in and make some configuration changes.
Also, it needs to have more feeds such as from the Darknet, RSS or intelligence like US-CERT, or some of those like NISTs or other standing bodies because right now it's got some CVEs in there but there's more to it than just that. So if it could tie into those, somehow, so you could do some research, like a "research tab" under tools and some one-click access to those forums and feeds.
In addition, it doesn't run on absolutely every operating system.
For how long have I used the solution?
Five years.
What do I think about the stability of the solution?
As far as stability goes, perhaps if you're running it in a Kali Linux virtual machine, sometimes it doesn't close out right away so I don't know if it takes too much time to flush that RAM out. It won't crash but it will lag. On Windows, it'll just close right away.
What do I think about the scalability of the solution?
Not at this point. Normally I just play with it on Windows but lately I've been using it on Kali.
How are customer service and technical support?
I haven't used it. If I have a question I'll just Google it.
Also, if you go into a forum, while that's kind of like calling a human, you're really not. It's a very well developed and very mature forum with a lot of people from different organizations all over the world, so it's top notch.
Which solution did I use previously and why did I switch?
I use a lot of different tools, the right tool for the job. Burp Suite, IBM Security AppScan, InMap, NIKTO, Wpscan. Depending on what you find, you might have to use better tools so OWASP Zap. I don't know if it's copyright infringement or not, given that it's open source, but it's possible they could build someone else's tools into the GUI of OWASP Zap. As the months and years go by, you'll probably see more features in there.
I'd have to say Burp Suite Pro, which is the licensed, paid-for version, is better but that's just because it's got more funding.
How was the initial setup?
If you're talking about Kali, which is the Linux Pentesting operating system, it comes built in. The only thing you have to do is update it from time to time and you can automate that with like a cron or a script. With Windows you have to download it manually, install it manually and check for updates.
Which other solutions did I evaluate?
Burp Suite. It's part of the pool in terms of the tools that do the job, whether they're free or commercially based. So Burp Suite and Nikto, and WPScan, that's for WordPress. They're all website security checkers per se, but they're not all created equal, some are specialized for certain things.
What other advice do I have?
If you're a company and you've got your own websites, internally and externally, it's great. It's a great free, open source tool to get your security staff and even your web developers to use it. If you already have a mature SDLC framework in place or web development, then maybe you should get even maybe more serious and buy the Burp Suite Professional license or other tools out there like Acunetix.
But overall I think it's a great product. It finds, I'd say, 90% if not more of the things that it needs to and helps you remediate any security findings.
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Buyer's Guide
Download our free OWASP Zap Report and get advice and tips from experienced pros
sharing their opinions.
Updated: January 2025
Product Categories
Static Application Security Testing (SAST)Popular Comparisons
SonarQube Server (formerly SonarQube)
GitLab
Veracode
Checkmarx One
Coverity
SonarQube Cloud (formerly SonarCloud)
Fortify on Demand
Acunetix
PortSwigger Burp Suite Professional
HCL AppScan
Qualys Web Application Scanning
Invicti
Kiuwan
Rapid7 AppSpider
Contrast Security Assess
Buyer's Guide
Download our free OWASP Zap Report and get advice and tips from experienced pros
sharing their opinions.
Quick Links
Learn More: Questions:
- Is OWASP Zap better than PortSwigger Burp Suite Pro?
- What is the biggest difference between OWASP Zap and PortSwigger Burp?
- What is the biggest difference between OWASP Zap and Qualys?
- What Application Security Solution Do You Use That Is DevOps Friendly?
- Which is the most comprehensive open source Web Security Testing tool?
- What is the best Application Security Testing platform?
- When evaluating Application Security Testing, what aspect do you think is the most important to look for?
- SAST vs. DAST: Which is better for application security testing?
- What tools do you rely on for building a DevSecOps pipeline?
- What does the Log4j/Log4Shell vulnerability mean for your company?