Comparison between Fluid Attacks and BHIS | Fluid Attacks

Black Hills

How does Fluid Attacks' solution compare to Black Hills Information Security's (BHIS)? The following comparison table enables you to discern the performance of both providers across various attributes essential for meeting your company’s cybersecurity needs. To better understand each attribute, read their descriptions in the dedicated page.

Criteria
Fluid Attacks Essential
Fluid Attacks Advanced
BHIS
Accuracy
Fluid Attacks' SAST tool achieved the best possible result against the OWASP Benchmark: a TPR (True Positive Rate) of 100% and an FPR (False Positive Rate) of 0%.
Fluid Attacks identifies 90% of the evaluated systems' risk exposure. (Accuracy is calculated with the F1 score. Risk exposure is calculated with the formula CVSSF=4^(CVSS-4).)
BHIS does not show information regarding false positive or false negative rates.

Binary SAST
Yes. Fluid Attacks Essential supports APK files.
Yes. Fluid Attacks Advanced's capability is equal to that of the Essential plan.
No
Languages (source code SAST)
YesFluid Attacks Essential supports the following languages and technologies: Android, C#, CloudFormation, Configuration files, Dart, Docker, Docker Compose, Go, HTML, HTML5, jBASE, Java, JavaScript, Kotlin, Kubernetes, PHP, Python, Razor, Shell Scripting, Storybook, Swift, Terraform, TypeScript and YAML.
YesFluid Attacks Advanced supports all languages and technologies supported in the Essential plan, as well as the following: ABAP, ActionScript, Apex, Assembler, ATS, Awk, C, C++, Clean, ClojureScript, Colm, cScript, Dale, Elvish, F#, Falcon, Fish, Fortran, Guile, Hana SQL Script, Haskell, Haxe, Idris, Ion, Janet, JCL, Joker, JScript, JSP, Lisp, Lobster, Natural, Nim, Objective C, Pascal, Perl, PL-SQL, PL1, PL/SQL, PowerScript, PowerShell, Prolog, R, RC, RPG4, Rust, Scala, SQL, SQR, Standard ML, T24, TAL, tcsh, Transact-SQL, VB.NET, VBA, VisualBasic 6, XML, among others.
No




Frameworks (source code SAST)
Yes. Fluid Attacks Essential supports the following frameworks: .NET, .NET Core, Angular, ASP.NET, Bootstrap, Django, Express, FastAPI, Flask, Flutter, Ktor, Laravel, Nest, Next.js, Node.js, React Native, React.js, Spring, Spring Boot and Vue.js.
Yes. Fluid Attacks Advanced supports all frameworks supported in the Essential plan, as well as the following: Apache Struts, Ember.js, Gatsby, Meteor, Phoenix, Ruby Sinatra, Ruby on Rails, Svelte, Symfony, Tornado, among others.
No
DAST
YesFluid Attacks Essential scans unauthenticated HTTP endpoints, including headers, DNS records, HTML content, and SSL connections for encryption suites, protocols, and X509 certificates.
YesFluid Attacks Advanced's capability is equal to that of the Essential plan.
No
IAST
No
No
No
SCA
YesFluid Attacks Essential supports the following package managers: Cargo, Composer, Conan, Docker Images, GitHub Actions, Go, Gradle, Hex, Maven, NPM, NuGet, pNPM, pip, Poetry, Pub, RubyGems, SBT, SwiftPM and Yarn.
YesFluid Attacks Advanced's capability is equal to that of the Essential plan.
No

Secrets
Yes. Fluid Attacks Essential detects secrets in API keys, AWS credentials, database connection passwords, express-session secrets, hardcoded emails (in security-related contexts), hardcoded environment variables (e.g., api_key, password, secret), hardcoded secrets in cryptographic calls, JWT, private keys, RSA keys, salts, SSH keys, symmetric keys, initialization vectors, SonarQube tokens and passwords (in identifiable fields).
Yes. Fluid Attacks Advanced's capability is equal to that of the Essential plan, with the addition of manual reviews to verify other attack vectors and the exploitability of secrets.
No
Containers
Yes. Fluid Attacks Essential scans containers based on the following distributions: Alpine, Arch, Debian, and RedHat.
Yes. Fluid Attacks Advanced's capability is equal to that of the Essential plan.
No
PTaaS
No
Yes
No. BHIS offers one-shot MPT.
Reverse engineering
No
Secure code review
No
CSPM
No
ASPM
No
SCM integrations
It offers the same integrations as the Essential plan.
None
Ticketing integrations
It offers the same integrations as the Essential plan.
None
ChatOps integrations
None
None
None
IDE integrations
It offers the same integrations as the Essential plan.
None
CI/CD integrations
AWS CodePipeline, Bamboo, CircleCI, GitHub Actions, GitLab CI, Jenkins, TeamCity, Travis CI, and any other CI/CD system that supports Docker
It offers the same integrations as the Essential plan.
None
Cloud Integrations
It offers the same integrations as the Essential plan.
None
Compliance integrations
None
NoneNone
SCA integrations
Native scanner (included, no integration needed)
Its capability is equal to that of the Essential plan.
None
SAST integrations
Native scanner (included, no integration needed)
Its capability is equal to that of the Essential plan.
None
DAST integrations
Native scanner (included, no integration needed)
Its capability is equal to that of the Essential plan.
None
IAST integrations
None
None
None
Secrets integrations
Native scanner (included, no integration needed)
Its capability is equal to that of the Essential plan.
None
Container integrations
Native scanner (included, no integration needed)
Its capability is equal to that of the Essential plan.
None
CSPM integrations
Native scanner (included, no integration needed)
Its capability is equal to that of the Essential plan.
None
Compliance
Fluid Attacks Essential validates some requirements based on these standards and guidelinesAgile Alliance, BSIMM, BIZEC-APP, BSAFSS, CAPEC™, CASA, C2M2, CCPA, CERT-C, CERT-J, CIS, CMMC, CPRA, CWE™, CWE TOP 25, ePrivacy Directive, FACTA, FCRA, FedRAMP, FERPA, FISMA, GDPR, GLBA, HIPAA, HITRUST CSF, ISA/IEC 62443, ISO/IEC 27001, ISO/IEC 27002, ISSAF, LGPD, MITRE ATT&CK, MISRA-C, MVSP, NERC CIP, NIST 800-53, NIST 800-63B, NIST 800-115, NIST 800-171, NIST CSF, NIST SSDF, NYDFS, NY SHIELD Act, OSSTMM3, OWASP API Security Top 10, OWASP ASVS, OWASP MASVS, OWASP-M TOP 10, OWASP SAMM, OWASP SCP, OWASP Top 10 Privacy Risks, OWASP TOP 10, PA-DSS, PCI DSS, PDPA, PDPO, POPIA, PTES, Resolution SB 2021 2126, SANS 25, SIG Core, SIG Lite, SOC2®, SWIFT CSCF, WASC and WASSEC.
Fluid Attacks Advanced validates all the requirements according to the same standards and guidelines as the Essential plan.
BHIS validates requirements based on these standards and guidelines: CISCMMCMITRE ATT&CKNIST 800-53, OWASP TOP 10among others.
Certifications or attestationsIt is covered by the same certifications and attestations as the Essential plan.No
Marketplaces
It is available in the same marketplace as the Essential plan.
No
Fast and automatic
No
Remediation
Fluid Attacks Essential provides detailed documentation on fixes and features both on its platform and in its VS Code extension, which uses generative AI to offer custom step-by-step correction guidance. Additionally, its extension leverages gen AI to offer automated fixes capabilities.
In addition to the Essential plan features, Fluid Attacks Advanced offers the option of "Talk to a hacker" in which its experts help clients understand the most challenging vulnerabilities, which helps as a basis to figure out remediation.
BHIS provides detailed documentation on the fixes in the reports it delivers to the client along with the pentest results.
CI/CD security 
Fluid Attacks Essential can integrate with CI/CD systems and trigger a build pipeline failure to prevent from deploying a noncompliant software version into production (break the build).
Fluid Attacks Advanced's capability is equal to that of the Essential plan.
No
Vulnerability detection method
Hybrid (automated tools + AI + human intelligence)
Human intelligence (as part of its MPT offering
Vulnerability chaining
No
By combining vulnerabilities A and B, Fluid Attacks Advanced discovers a new, higher impact vulnerability C.
No information available
Delivery of evidence
Fluid Attacks Essential's evidence is delivered in (a) PDF executive reports, (b) XLSX technical reports, (c) code pieces and (d) graphs and metrics of the system's security status.
Fluid Attacks Advanced delivers all the types of evidence mentioned in the Essential plan, and additionally, (a) video recordings of the attack and (b) screenshots with explanatory annotations.
No information available
Exploitation
No
Fluid Attacks Advanced can do exploitation as long as the client provides an available environment.
BHIS can do exploitation as part of its MPT offering.
Zero-day vulnerabilities
No
Fluid Attacks Advanced's security researchers search for zero-day vulnerabilities in open-source software.
No
AI/ML triage
No
Using artificial intelligence (AI), Fluid Attacks Advanced prioritizes potentially vulnerable files for assessment. Its AI is specially trained by machine learning (ML) with thousands of snippets of vulnerable code.
No
Deployment
Same as the Essential plan
No
Open source
Yes. MPL-2.0 license. Totally equivalent to the paid version.
Yes. MPL-2.0 license. Partially equivalent to the paid version.
No
Year founded
Same as the Essential plan
Number of employees
Same as the Essential plan
Other services
Focus on automated offensive testing for applications in development.
Focus on both automated and manual offensive testing for applications in development.
Reputation sites (on a scale of 1 to 10)
Between 9.16 and 10.00 based on 31 reviews over 6.3 years from the following three sources: Clutch, Gartner Peer Insights and PeerSpot.
Same as the Essentials plan
No reviews
Status page
No
Demo
No
Free trial
No

Note on reference review date
References were last checked on Oct 24, 2024.
Free trial message
Free trial
Search for vulnerabilities in your apps for free with Fluid Attacks' automated security testing! Start your 21-day free trial and discover the benefits of the Continuous Hacking Essential plan. If you prefer the Advanced plan, which includes the expertise of Fluid Attacks' hacking team, fill out this contact form.