Criteria
|
Fluid Attacks Essential
|
Fluid Attacks Advanced
|
Enso
|
Accuracy
|
Fluid Attacks' SAST tool achieved the best possible result against the OWASP Benchmark: a TPR (True Positive Rate) of 100% and an FPR (False Positive Rate) of 0%.
|
Fluid Attacks identifies 90% of the evaluated systems' risk exposure. (Accuracy is calculated with the F1 score. Risk exposure is calculated with the formula CVSSF=4^(CVSS-4).)
|
Enso does not show information regarding false positive or false negative rates.
|
Binary SAST
|
Yes. Fluid Attacks Essential supports APK files.
|
Yes. Fluid Attacks Advanced's capability is equal to that of the Essential plan.
|
No
|
Languages (source code SAST)
|
Yes. Fluid Attacks Essential supports the following languages and technologies: Android, C#, CloudFormation, Configuration files, Dart, Docker, Docker Compose, Go, HTML, HTML5, jBASE, Java, JavaScript, Kotlin, Kubernetes, PHP, Python, Razor, Shell Scripting, Storybook, Swift, Terraform, TypeScript and YAML.
|
Yes. Fluid Attacks Advanced supports all languages and technologies supported in the Essential plan, as well as the following: ABAP, ActionScript, Apex, Assembler, ATS, Awk, C, C++, Clean, ClojureScript, Colm, cScript, Dale, Elvish, F#, Falcon, Fish, Fortran, Guile, Hana SQL Script, Haskell, Haxe, Idris, Ion, Janet, JCL, Joker, JScript, JSP, Lisp, Lobster, Natural, Nim, Objective C, Pascal, Perl, PL-SQL, PL1, PL/SQL, PowerScript, PowerShell, Prolog, R, RC, RPG4, Rust, Scala, SQL, SQR, Standard ML, T24, TAL, tcsh, Transact-SQL, VB.NET, VBA, VisualBasic 6, XML, among others.
|
No
|
Frameworks (source code SAST) | Yes. Fluid Attacks Essential supports the following frameworks: .NET, .NET Core, Angular, ASP.NET, Bootstrap, Django, Express, FastAPI, Flask, Flutter, Ktor, Laravel, Nest, Next.js, Node.js, React Native, React.js, Spring, Spring Boot and Vue.js. | Yes. Fluid Attacks Advanced supports all frameworks supported in the Essential plan, as well as the following: Apache Struts, Ember.js, Gatsby, Meteor, Phoenix, Ruby Sinatra, Ruby on Rails, Svelte, Symfony, Tornado, among others. | No |
DAST
|
Yes. Fluid Attacks scans unauthenticated HTTP endpoints, including headers, DNS records, HTML content, and SSL connections for encryption suites, protocols, and X509 certificates.
|
No
|
|
IAST
|
No
|
No
|
No
|
SCA
|
Yes. Fluid Attacks Essential supports the following package managers: Cargo, Composer, Conan, Docker Images, GitHub Actions, Go, Gradle, Hex, Maven, NPM, NuGet, pNPM, pip, Poetry, Pub, RubyGems, SBT, SwiftPM and Yarn.
|
No
|
|
Secrets | Yes. Fluid Attacks Essential detects secrets in API keys, AWS credentials, database connection passwords, express-session secrets, hardcoded emails (in security-related contexts), hardcoded environment variables (e.g., api_key, password, secret), hardcoded secrets in cryptographic calls, JWT, private keys, RSA keys, salts, SSH keys, symmetric keys, initialization vectors, SonarQube tokens and passwords (in identifiable fields). | Yes. Fluid Attacks Advanced's capability is equal to that of the Essential plan, with the addition of a manual reviews to verify other attack vectors and the exploitability of secrets. | No |
Containers | Yes. Fluid Attacks Essential scans containers based on the following distributions: Alpine, Arch, Debian, and RedHat. | Yes. Fluid Attacks Advanced's capability is equal to that of the Essential plan. | No |
PTaaS | No | No | |
Reverse engineering
|
No
|
No
|
|
Secure code review
|
No
|
No
|
|
CSPM
|
No
|
||
ASPM
|
|||
SCM integrations | Azure DevOps, Bitbucket, GitHub and GitLab | It offers the same integrations as the Essential plan. | |
Ticketing integrations | It offers the same integrations as the Essential plan. | ||
ChatOps integrations | None | None | None |
IDE integrations | IntelliJ IDEA and VS Code | It offers the same integrations as the Essential plan. | None |
CI/CD integrations | AWS CodePipeline, Bamboo, CircleCI, GitHub Actions, GitLab CI, Jenkins, TeamCity, Travis CI, and any other CI/CD system that supports Docker | It offers the same integrations as the Essential plan. | None |
Cloud Integrations | It offers the same integrations as the Essential plan. | ||
Compliance integration | None | None | None |
SCA integrations | Native scanner (included, no integration needed) | Its capability is equal to that of the Essential plan. | |
SAST integrations | Native scanner (included, no integration needed) | Its capability is equal to that of the Essential plan. | |
DAST integrations | Native scanner (included, no integration needed) | Its capability is equal to that of the Essential plan. | |
IAST integrations | None | None | None |
Secrets integrations | Native scanner (included, no integration needed) | Its capability is equal to that of the Essential plan. | |
Container integrations | Native scanner (included, no integration needed) | Its capability is equal to that of the Essential plan. | |
CSPM integrations | Native scanner (included, no integration needed) | Its capability is equal to that of the Essential plan. | None |
Compliance
|
Fluid Attacks Essential validates some requirements based on these standards and guidelines: Agile Alliance, BSIMM, BIZEC-APP, BSAFSS, CAPEC™, CASA, C2M2, CCPA, CERT-C, CERT-J, CIS, CMMC, CPRA, CWE™, CWE TOP 25, ePrivacy Directive, FACTA, FCRA, FedRAMP, FERPA, FISMA, GDPR, GLBA, HIPAA, HITRUST CSF, ISA/IEC 62443, ISO/IEC 27001, ISO/IEC 27002, ISSAF, LGPD, MITRE ATT&CK®, MISRA-C, MVSP, NERC CIP, NIST 800-53, NIST 800-63B, NIST 800-115, NIST 800-171, NIST CSF, NIST SSDF, NYDFS, NY SHIELD Act, OSSTMM3, OWASP API Security Top 10, OWASP ASVS, OWASP MASVS, OWASP-M TOP 10, OWASP SAMM, OWASP SCP, OWASP Top 10 Privacy Risks, OWASP TOP 10, PA-DSS, PCI DSS, PDPA, PDPO, POPIA, PTES, Resolution SB 2021 2126, SANS 25, SIG Core, SIG Lite, SOC2®, SWIFT CSCF, WASC and WASSEC.
|
Fluid Attacks Advanced validates all the requirements according to the same standards and guidelines as the Essential plan.
|
No information available
|
Certifications or attestations | SOC 2 Type II and SOC 3 | It is covered by the same certifications and attestations as the Essential plan. | ISO/IEC 27001, ISO/IEC 27017 and SOC 2 Type II |
Marketplaces | It is available in the same marketplace as the Essential plan. | AWS | |
Fast and automatic
|
|||
Remediation
|
Fluid Attacks Essential provides detailed documentation on fixes and features both on its platform and in its VS Code extension, which uses generative AI to offer custom step-by-step correction guidance. Additionally, its extension leverages gen AI to offer automated fixes capabilities.
|
In addition to the Essential plan features, Fluid Attacks Advanced offers the option of "Talk to a hacker" in which its experts help clients understand the most challenging vulnerabilities, which helps as a basis to figure out remediation.
|
Enso provides detailed information on vulnerability remediation in its documentation.
|
CI/CD security
|
Fluid Attacks Essential can integrate with CI/CD systems and trigger a build pipeline failure to prevent from deploying a noncompliant software version into production (break the build).
|
No
|
|
Vulnerability detection method
|
Hybrid (automated tools + AI + human intelligence).
|
||
Vulnerability chaining
|
No
|
By combining vulnerabilities A and B, Fluid Attacks Advanced discovers a new, higher impact vulnerability C.
|
No
|
Delivery of evidence
|
Fluid Attacks Essential's evidence is delivered in (a) PDF executive reports, (b) XLSX technical reports, (c) code pieces and (d) graphs and metrics of the system's security status.
|
Fluid Attacks Advanced delivers all the types of evidence mentioned in the Essential plan, and additionally, (a) video recordings of the attack and (b) screenshots with explanatory annotations.
|
Enso's evidence is delivered in (a) PDF executive reports, (b) XLS technical reports, (c) CSV reports and (d) graphs and metrics of the system's security status.
|
Exploitation
|
No
|
Fluid Attacks Advanced can do exploitation as long as the client provides an available environment.
|
No
|
Zero-day vulnerabilities
|
No
|
Fluid Attacks Advanced's security researchers search for zero-day vulnerabilities in open-source software.
|
No
|
AI/ML triage
|
No
|
Using artificial intelligence (AI), Fluid Attacks Advanced prioritizes potentially vulnerable files for assessment. Its AI is specially trained by machine learning (ML) with thousands of snippets of vulnerable code.
|
No |
Deployment | Same as the Essential plan | SaaS | |
Open source | Yes. MPL-2.0 license. Totally equivalent to the paid version. | Yes. MPL-2.0 license. Partially equivalent to the paid version | No |
Year founded | Same as the Essential plan | ||
Number of employees | Same as the Essential plan | ||
Other services | Focus on automated offensive testing for applications in development. | Focus on both automated and manual offensive testing for applications in development. | Focus on ASPM |
Reputation sites (on a scale of 1 to 10) | Between 9.16 and 10.00 based on 31 reviews over 6.3 years from the following three sources: Clutch, Gartner Peer Insights and PeerSpot. | Same as the Essential plan | Between 6.83 and 10 based on 4 reviews over 1 month from the following four sources: Capterra, G2, Gartner Peer Insights and TrustRadius. |
Status page | No | ||
Demo
|
|||
Free trial
|
No
|