Invicti vs Synopsys Defensics comparison

Cancel
You must select at least 2 products to compare!
Invicti Logo
3,246 views|1,665 comparisons
96% willing to recommend
Synopsys Logo
206 views|122 comparisons
100% willing to recommend
Comparison Buyer's Guide
Executive Summary

We performed a comparison between Invicti and Synopsys Defensics based on real PeerSpot user reviews.

Find out what your peers are saying about Sonar, Veracode, Checkmarx and others in Application Security Tools.
To learn more, read our detailed Application Security Tools Report (Updated: May 2024).
772,679 professionals have used our research since 2012.
Featured Review
Quotes From Members
We asked business professionals to review the solutions they use.
Here are some excerpts of what they said:
Pros
"Scan, proxify the application, and then detailed report along with evidence and remediations to problems.""This tool is really fast and the information that they provide on vulnerabilities is pretty good.""The most attractive feature was the reporting review tool. The reporting review was very impressive and produced very fruitful reports.""It has a comprehensive resulting mechanism. It is a one-stop solution for all your security testing mechanisms.""I like that it's stable and technical support is great.""Crawling feature: Netsparker has very detail crawling steps and mechanisms. This feature expands the attack surface.""One of the features I like about this program is the low number of false positives and the support it offers.""When we try to manually exploit the vulnerabilities, it often takes time to realize what's going on and what needs to be done."

More Invicti Pros →

"We have found multiple issues in our embedded system network protocols, related to buffer overflow. We have reduced some of these issues.""The product is related to US usage with TLS contact fees, i.e. how more data center connections will help lower networking costs.""Whatever the test suit they give, it is intelligent. It will understand the protocol and it will generate the test cases based on the protocol: protocol, message sequence, protocol, message structure... Because of that, we can eliminate a lot of unwanted test cases, so we can execute the tests and complete them very quickly."

More Synopsys Defensics Pros →

Cons
"The custom attack preparation screen might be improved.""Reporting should be improved. The reporting options should be made better for end-users. Currently, it is possible, but it's not the best. Being able to choose what I want to see in my reports rather than being given prefixed information would make my life easier. I had to depend on the API for getting the content that I wanted. If they could fix the reporting feature to make it more comprehensive and user-friendly, it would help a lot of end-users. Everything else was good about this product.""The support's response time could be faster since we are in different time zones.""They don't really provide the proof of concept up to the level that we need in our organization. We are a consultancy firm, and we provide consultancy for the implementation and deployment solutions to our customers. When you run the scans and the scan is completed, it only shows the proof of exploit, which really doesn't work because the tool is running the scan and exploiting on the read-only form. You don't really know whether it is actually giving the proof of exploit. We cannot prove it manually to a customer that the exploit is genuine. It is really hard to perform it manually and prove it to the concerned development, remediation, and security teams. It is currently missing the static application security part of the application security, especially web application security. It would be really cool if they can integrate a SAS tool with their dynamic one.""Invicti takes too long with big applications, and there are issues with the login portal.""Asset scanning could be better. Once, it couldn't scan assets, and the issue was strange. The price doesn't fit the budget of small and medium-sized businesses.""It would be better for listing and attacking Java-based web applications to exploit vulnerabilities.""The solution needs to make a more specific report."

More Invicti Cons →

"Codenomicon Defensics should be more advanced for the testing sector. It should be somewhat easy and flexible to install.""Sometimes, when we are testing embedded devices, when we trigger the test cases, the target will crash immediately. It is very difficult for us to identify the root cause of the crash because they do not provide sophisticated tools on the target side. They cover only the client-side application... They do not have diagnostic tools for the target side. Rather, they have them but they are very minimal and not very helpful.""It does not support the complete protocol stack. There are some IoT protocols that are not supported and new protocols that are not supported."

More Synopsys Defensics Cons →

Pricing and Cost Advice
  • "It is competitive in the security market."
  • "OWASP Zap is free and it has live updates, so that's a big plus."
  • "We never had any issues with the licensing; the price was within our assigned limits."
  • "I think that price it too high, like other Security applications such as Acunetix, WebInspect, and so on."
  • "The price should be 20% lower"
  • "Netsparker is one of the costliest products in the market. It would help if they could allow us to scan multiple URLs on the same license."
  • "We are using an NFR license and I do not know the exact price of the NFR license. I think 20 FQDN for three years would cost around 35,000 US Dollars."
  • "Invicti is best suited for large enterprises. I don't think small and medium-sized businesses can afford it. Maintenance costs aren't that great."
  • More Invicti Pricing and Cost Advice →

    report
    Use our free recommendation engine to learn which Application Security Tools solutions are best for your needs.
    772,679 professionals have used our research since 2012.
    Questions from the Community
    Top Answer:The solution is very expensive. It comes with a yearly subscription. We were paying 6000 dollars yearly for unlimited scans. We have three licenses; basic, business, and ultimate. We need ultimate… more »
    Top Answer:The most valuable feature of Invicti is getting baseline scanning and incremental scan.
    Top Answer:The solution's false positive analysis and vulnerability analysis libraries could be improved.
    Ask a question

    Earn 20 points

    Ranking
    Views
    3,246
    Comparisons
    1,665
    Reviews
    5
    Average Words per Review
    340
    Rating
    8.6
    5th
    out of 5 in Fuzz Testing Tools
    Views
    206
    Comparisons
    122
    Reviews
    0
    Average Words per Review
    0
    Rating
    N/A
    Comparisons
    Also Known As
    Mavituna Netsparker
    Defensics, Codenomicon Defensics
    Learn More
    Overview

    Invicti helps DevSecOps teams automate security tasks and save hundreds of hours each month by identifying web vulnerabilities that matter. Combining dynamic with interactive testing (DAST + IAST) and software composition analysis (SCA), Invicti scans every corner of an app to find what other tools miss with 99.98% accuracy, delivering on the promise of Zero Noise AppSec. Invicti helps discover all web assets — even ones that are lost, forgotten, or created by rogue departments. With an array of out-of-the-box integrations, DevSecOps teams can get ahead of their workloads to hit critical deadlines, improve processes, and communicate more effectively while reducing risk and hitting the ROI goals.

    Defensics® fuzz testing is a comprehensive, powerful, and automated black box solution that enables organizations to effectively and efficiently discover and remediate security weaknesses in software. By taking a systematic and intelligent approach to negative testing, Defensics allows organizations to ensure software security without compromising on product innovation, increasing time to market, or inflating operational costs.

    Sample Customers
    Samsung, The Walt Disney Company, T-Systems, ING Bank
    Coriant, CERT-FI, Next Generation Networks
    Top Industries
    REVIEWERS
    Computer Software Company36%
    Financial Services Firm18%
    Aerospace/Defense Firm9%
    Real Estate/Law Firm9%
    VISITORS READING REVIEWS
    Educational Organization51%
    Financial Services Firm8%
    Computer Software Company6%
    Manufacturing Company5%
    VISITORS READING REVIEWS
    Computer Software Company23%
    Manufacturing Company16%
    Financial Services Firm7%
    Healthcare Company5%
    Company Size
    REVIEWERS
    Small Business50%
    Midsize Enterprise12%
    Large Enterprise38%
    VISITORS READING REVIEWS
    Small Business8%
    Midsize Enterprise58%
    Large Enterprise34%
    VISITORS READING REVIEWS
    Small Business16%
    Midsize Enterprise15%
    Large Enterprise69%
    Buyer's Guide
    Application Security Tools
    May 2024
    Find out what your peers are saying about Sonar, Veracode, Checkmarx and others in Application Security Tools. Updated: May 2024.
    772,679 professionals have used our research since 2012.

    Invicti is ranked 20th in Application Security Tools with 25 reviews while Synopsys Defensics is ranked 5th in Fuzz Testing Tools. Invicti is rated 8.2, while Synopsys Defensics is rated 8.6. The top reviewer of Invicti writes "A customizable security testing solution with good tech support, but the price could be better". On the other hand, the top reviewer of Synopsys Defensics writes "Technical support provided protocol-specific documentation to prove that some positives were not false". Invicti is most compared with OWASP Zap, Acunetix, PortSwigger Burp Suite Professional, Qualys Web Application Scanning and Snyk, whereas Synopsys Defensics is most compared with Snyk, SonarQube, Fortify on Demand, HCL AppScan and PortSwigger Burp Suite Professional.

    We monitor all Application Security Tools reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.