
Attribute | Essential | Advanced | Fortify |
Focus | |||
Extras | None | None | None |
Headcount | Indeterminable (no information for this product alone) | ||
Headcount distribution | Indeterminable (no information for this product alone) | ||
Headcount growth | Indeterminable (no information for this
product alone) | ||
Headquarters | Indeterminable (no information for this
product alone) | ||
Countries | Indeterminable (no information for this product
alone) | ||
Reputation | Same | ||
Followers | Same | Indeterminable (no information for this product alone) | |
Research firms | None | None | |
Founded | 2001 | Indeterminable (no information for this product alone) | |
Funding | Bootstrapped | Same | $19M USD in 3 rounds from 2
investors |
Acquisitions | None | None | Acquired 3 times and made 1 acquisition |
Revenue | Indeterminable (no information for this product alone) | ||
CVE | 0 CVEs reported to MITRE | ||
Compliance | |||
Bug bounty | No | ||
Visits | Indeterminable (no information for this
product alone) | ||
Authority | Indeterminable (no information for this product alone) | ||
Vulnerability database | None | ||
Content | |||
Knowledge base | 13 KB
sections, 4 in common and 9 additional | 4 KB sections, all in common | |
Community | Forum by OpenText | ||
Sync training | 1 workshop | No | |
Async training | 3 product use courses, all free | 3 product use courses by OpenText
(subscription-based) | |
Distribution | Same | ||
| Marketplaces | AWS | ||
Freemium | No | No | No |
Free trial | |||
Demo | |||
Open Demo | No | No | |
Pricing | |||
Pricing tiers | 1 plan | 1 plan | No information availability |
Minimum term | |||
Minimum payment period | |||
Minimum capabilities | No information available | ||
Minimum scope | 1 author | ||
Pricing drivers | |||
Minimum monthly payment |
Attribute | Essential | Advanced | Fortify |
PTaaS | No | No | |
Reverse engineering | No | No | |
Secure code review | No | No | |
Pivoting | No | No | |
Exploitation | No | No | |
Manual reattacks | Not applicable | Not applicable | |
Zero-day
vulnerabilities | None | Continuous zero-day vulnerability research | None |
SLA | Scan time | ||
Min availability | >=99.95% per minute LTM | None | |
After-sale guarantees | No | Yes | No |
Accreditations | Amazon Linux Ready Product, AWS Outposts Ready Product, Data & Analytics ISV
Competency, Security ISV Competency and CNA (as
OpenText) | ||
Hacker certifications | Not applicable | Not applicable | |
Type of contract | Employee | Same | |
Endpoint control | Not applicable | Total | Not applicable |
Channel control | Not applicable | Total | Not applicable |
Standards | Some requirements from
67 standards, 18 in common and 49
additional | All requirements from the same standards | |
Detection method | Automated tools and AI | ||
Remediation | 5, 4
in common and 1 additional | Same, plus 1 | 4, all in common |
Outputs | 5, 3 in common and 2 additional | Same, plus 2 | 6, 3 in common and 3 additional |
Attribute | Essential | Advanced | Fortify |
ASPM | |||
API | |||
IDE | Same, plus 1 functionality | ||
CLI | |||
CI/CD | |||
| Vulnerability sources | 4 sources | No information available | |
Threat model alignment | No | ||
Priority criteria | No information available | ||
Custom prioritization | No | ||
Scanner origin | |||
SCA | |||
AI security | No | No | |
Reachability | 12 languages, 2 in common and 10 additional | 2 languages, all in
common | |
Reachability type | |||
SBOM | |||
Malware detection | Yes | Yes | No |
Autofix on components | No | No | |
Containers | No | ||
Source SAST (languages) | 12, all in common | 24, 12 in
common and 12 additional | |
Source
SAST (frameworks) | 22, 1 in
common and 21 additional | 7, 1 in common and 6 additional | |
Custom rules | No | No | |
IaC | 6, 5 in common and 1 additional | 4,
2 in common and 2 additional | 8, 7 in common and 1 additional |
Binary SAST | 1
type of binary | Same, plus 2 types of binaries | 3 types of binaries, none in common |
DAST | 6 attack surface types, 5 in common and 1 additional | ||
API security testing | No | 4 types of APIs, all in common | 7 types of APIs, 4 in common and 3
additional |
IAST | No | No | No |
CSPM | Yes | No | |
ASM | No | No | No |
Secrets | Same, plus
verify other attack vectors and secrets exploitability | ||
AI | |||
MCP | |||
Open-source | Not applicable | No | |
Provisioning as Code | No | ||
Deployment | SaaS and on-premises | ||
| Regions | |||
Status | |||
Incidents |
Attribute | Essential | Advanced | Fortify |
SCM | 6, 4 in common and 2 additional | 4, all in common | |
Binary repositories | None | None | None |
Ticketing | 3, 1 in
common and 2 additional | 5, 1 in common and 4 additional | |
ChatOps | None | None | |
IDE | 3, 2 in common and 1 additional | 4, 2 in common and 2 additional | |
CI/CD | 21, 6 in
common and 15 additional | 7, 6
in common and 1 additional | |
SCA | Native and 5 integrations | ||
Container | |||
SAST | |||
DAST | Native and 1 integration | ||
IAST | None | None | None |
Cloud | 3, all in
common | 4, 3 in
common and 1 additional | |
CSPM | None | ||
Secrets | |||
Remediation | None | None | |
Bug bounty | None | None | None |
Vulnerability management | None | None | None |
Compliance | None | None | None |

