Seamless integration with various platforms and products, providing a centralized and comprehensive security analysis solutionand
How has it helped my organization?
We used Fortify for static code analysis, dynamic security testing, and both white box and black box testing. We applied these scanning methods to our business-critical applications such as Temenos (T-24), which was our core banking application.
Additionally, other business-critical applications like Murex and various applications in trade finance or treasury security services also rely on Fortify.
What is most valuable?
Our CSD team used multiple tools for different scenarios. When dealing with sophisticated threats or vulnerabilities, manual analysis was necessary alongside Fortify's machine-based analysis. So, in handling complicated vulnerabilities, we couldn't rely on just one tool. Multiple tools were required. One such tool was OS Zap Proxy. We integrated Zap Proxy with Fortify, and this integration proved quite useful. Instead of relying solely on Fortify's dashboard, we integrated it with other tools, which made more sense. The security analysts, up to the level of the CSO, wouldn't rely only on a single dashboard. They used multiple tools to detect and work on vulnerabilities across various platforms and products. Fortify seamlessly integrates all these aspects.
What needs improvement?
Temenos's (T-24) info basic is a separate programming interface, and such proprietary platforms and programming interfaces were not easily supported by the out-of-the-box versions of Fortify. Although Fortify already supports around 25 programming languages, during our evaluation, we found it lacking in terms of support.
So Fortify on Demand doesn't support all programming languages. Additionally, automating everything from the pipeline, which means the build will stop if any single vulnerability is found by their particular tool during the scan.
For how long have I used the solution?
Fortify has been with our bank since its inception in 2008.
What do I think about the stability of the solution?
Fortify is very reliable and doesn't experience frequent crashes. It provides a stable and dependable tool for our needs.
What do I think about the scalability of the solution?
It is a quite scalable product. We can start small with single instances and gradually scale up with multiple instances. This scalability aspect is similar to SonarQube as well.
When the scan load increases, we reach a threshold where we may need to purchase additional resources or adjust our pricing brackets. For instance, if I exceed one million lines of code, there might be an extra cost or a change in the pricing bracket.
However, the cost we see initially is different and covers up to one million lines of code. Overall, it's quite manageable to handle the loads we encounter.
How are customer service and support?
Whenever required, we have reached out to the technical support team. Our architecture team thoroughly evaluated Fortify along with our stakeholders. We always prioritize leveraging our existing applications from an inventory of over 340 applications, rather than opting for new ones.
When we onboarded Fortify in 2008, we had other choices for tools and products as well, but we didn't choose them. This decision was made by the cybersecurity defense team, who are the primary users of the product.
They were satisfied with Fortify, and we didn't require extensive support. However, whenever needed, we can rely on the support included with the license.
How was the initial setup?
I am the architecture manager, and my team evaluated and onboarded Fortify based on reviews and evaluations from GQ, Peerspot, Gartner, and even Forrester.
During the setup process, we had concerns regarding the cost. From the CSD perspective, Fortify was not very cost-friendly. The CSD has a separate budget and reports directly to the CEO and CIO. We had to consider our budget limitations because we have been leveraging Fortify since the bank's inception in 2008. Although we have utilized it extensively, the cost appeared higher compared to SonarQube. Hence, we decided to go with SonarQube. However, I must say that Fortify offered a lot of value.
It was quite manageable to maintain. We have a dedicated team that supports Fortify in production. So, it was quite manageable.
What about the implementation team?
We have a support team consisting of around five or six engineers, specifically CICD engineers from the platform support team. They handle the deployment and maintenance tasks.
For version upgrades, the team takes care of it as and when needed. Additionally, if there are any junior members required, they assist in the maintenance process. The primary user of Fortify is the CSD team.
What's my experience with pricing, setup cost, and licensing?
We were on a subscription-based model. The subscription was expiring in December 2022, and we have decided not to renew it for this year.
Which other solutions did I evaluate?
We are already decommissioning Fortify and have already implemented SonarQube. We are currently using SonarQube Enterprise.
Fortify on Demand was utilized for a considerable period. However, we have now transitioned away from Fortify on Demand. It was primarily used by our CSD team, the cybersecurity defense team at the bank.
Initially, we performed penetration testing and vulnerability assessments within the Fortify platform. However, we have since implemented a DevSecOps pipeline in partnership with Red Hat. Currently, all testing, including penetration testing and vulnerability assessments, is automated within the pipeline. The pipeline runs on Tecton, enabled on the OpenShift site.
Therefore, any tool we use, be it Fortify or SonarQube, must be integrated into that pipeline. This approach has addressed most of the pain points we faced previously. Consequently, we are satisfied with SonarQube's performance now.
Fortify on Demand only offers static analysis and lacks dynamic security testing capabilities. However, if it's integrated into the pipeline, we can incorporate another tool for dynamic security testing. This was not possible with Fortify alone.
Additionally, Fortify has limited programming language support compared to SonarQube. The recent global launch of SonarQube in the GA version expanded its support for various programming platforms, such as CSM and .NET on the Java side, among others.
In our bank, we use T24 as our core banking system, which relies on a proprietary programming language called Infobasic. SonarQube also supports this language. When we place the code into the pipeline and perform builds, including the repository, we scan the entire codebase, including Infobasic code for the banking application. In summary, SonarQube offers broader programming language support. Previously, we only scanned other business-critical applications, but now we can scan our most critical banking application, T24, using SonarQube.
What other advice do I have?
Fortify has excellent support for various programming languages. Each bank may have its own core banking applications with proprietary support for different programming languages. This makes Fortify particularly relevant and advantageous in those cases. This advantage may not be present in SonarQube.
Additionally, if a feature is not offered out of the box, Fortify allows customization, providing flexibility. Apart from dynamic security testing, Fortify is reliable for generating and distributing v-scan reports to multiple stakeholders, making it less of a hassle for the CAC team as most tasks are automated.
I would rate Fortify on Demand as an eight.
Which deployment model are you using for this solution?
On-premises
Provides good depth of scanning but is unfortunately not fully integrated with CIT processes
What is our primary use case?
We use Fortify on Demand to look at dependency vulnerabilities and vulnerabilities in the source code. We are customers of Micro Focus.
What is most valuable?
We've found the depth of scanning that the product provides and the results we get are the most valuable features.
What needs improvement?
We need something that's going to be fully integrated with CIT processes from setting up a new microservice to scanning and managing other vulnerabilities. As of now, we don't have that which makes it a painful process.
For how long have I used the solution?
I've been using this solution for three years.
What do I think about the stability of the solution?
How was the initial setup?
The solution was implemented prior to my joining the company so I have no information regarding the initial setup.
What's my experience with pricing, setup cost, and licensing?
We're changing our licensing model because we currently pay 1,000 euro per scan which is ridiculous. We're working on changing it to a flat rate.
What other advice do I have?
Whether or not this solution will be useful depends on the maturity of your organization. If you understand what all the messages and the analysis mean, and you can usefully react to it then I think you should absolutely use it. If you're still working out these things, you should probably first go through some learning process and start with some simpler tooling that gives you some insights.
The challenge is always how to make things actionable and that is lacking to some extent. If, for example, there is something that depends on scans for vulnerability for all your dependencies and just pulls requests for you, Fortify doesn't action anything. It leaves all the actioning things to you so in a sense, it creates more work for the developers, but it doesn't help them to do the work.
We're not happy with the solution as a process because of the way it's internally implemented in the bank. On the other hand, the features are quite good so I would rate that aspect higher. On average, I rate this solution seven out of 10.
Which deployment model are you using for this solution?
On-premises
Fortify, one stop shop for Application Security Testing
What do you like best about the product?
Fortify provides excellent drill-down capabilities for analyzing vulnerabilities and recommended steps for fixing or remediation.
What do you dislike about the product?
It would be nice to see more Dashboards and Metrics out of the box.
What problems is the product solving and how is that benefiting you?
It provides a powerful platform for validating all of our Applications and provides comprehensive recommendations for addressing any identified vulnerabilites.
Recommendations to others considering the product:
When starting out I strongly recommend that you leverage the expertise and experience of the Fortify on Demand team. They have a lot of resources around best practices, cases studies, scaling up your program, creating roadmaps, etc.
FoD is an excellent way to find vulnerabilities in Apps
What do you like best about the product?
How the vulnerabilities are presented. There's always detailed information to determine if the vulnerability is true false or false positive, etc.
What do you dislike about the product?
False positives and no auto report generator after a dynamic scan.
What problems is the product solving and how is that benefiting you?
Securing applications written in many programming languages.
Micro Focus Application Defender is a good program, just not the bes for us
What do you like best about the product?
What I like best about Micro Focus Application Defender is the elimination of current threats very quickly, thereby saving us lots of time and money
What do you dislike about the product?
What I dislike about Micro Focus Application Defender is that it can be very confusing to use and some of our employees don't have the patience it requires
What problems is the product solving and how is that benefiting you?
We are solving the problems of threats thru the internet. With many temporary satellite offices, this is a beneficial software.
Recommendations to others considering the product:
Keep up the good work, just try to make it simpler to use for everyone.
Real-time control of the security of the company's extranet
What do you like best about the product?
For years I have been working with this company and the truth is that except for some setbacks of lost files, the overall assessment is positive. All the tools available to the company and the possible threats are controlled in real time.What I like most about this product are the neutralization of current threats and the actaulizations that occur quickly and efficiently. The speed of the resolution of them from my point of view is one of the best options available in the market today.
What do you dislike about the product?
As a negative point I would say that the documentation of the guides that are included as the notes guides are quite complex and difficult to understand. Anyway, the support team solves doubts quickly
What problems is the product solving and how is that benefiting you?
One of the main solutions that this tool generates in our company is the amount of time and money that saves us and the security we have when working every day.
Doesn't really do as it says
What do you like best about the product?
Scans are thorough, easily distributed. Branding. Perceived integration.
What do you dislike about the product?
Returns many false positives - for example identifies any variable with the name 'key' as a stored encryption key violation. Doesn't understand the context of code, or entry points for an exploit. Cumbersome in execution (will monopolize a machine's resources while running).
What problems is the product solving and how is that benefiting you?
Intended use for security reasons and strengthening code. Unsure of benefits at this time.
Recommendations to others considering the product:
Shop around. Identify what need it for first before signing on.
Flexible security monitoring for applications
What do you like best about the product?
Fortify has a magical dashboard where you can find and detect your security issues in your applications.
What do you dislike about the product?
I would like a more flexible GUI to edit and design reports.
What problems is the product solving and how is that benefiting you?
Application Security
Recommendations to others considering the product:
Best tool for detect application issues.
Overall a good experience
What do you like best about the product?
There is a good flexibility of the demand ability
What do you dislike about the product?
Customer service has not been great. Not intuitive so takes some time to get really into it.
What problems is the product solving and how is that benefiting you?
It is a great tool as part of the «toolbox». We use the software for testing for us to meet the security standards. It benefits us in the sense that we feel confident that we meet the requirements of the security standards.
Recommendations to others considering the product:
I guess it works great for securing data, but it takes time to really learn how to use it. If you have problems are basically left to figure it out yourself.