We performed a comparison between Fortify on Demand and Spirent CyberFlood based on real PeerSpot user reviews.
Find out in this report how the two Application Security Tools solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI."Fortify on Demand's best feature is that there's no need to install and configure it locally since it's on the cloud."
"This product is top-notch solution and the technology is the best on the market."
"Fortify on Demand can be scaled very easily."
"The solution scans our code and provides us with a dashboard of all the vulnerabilities and the criticality of the vulnerabilities. It is very useful that they provide right then and there all the information about the vulnerability, including possible fixes, as well as some additional documentation and links to the authoritative sources of why this is an issue and what's the correct way to deal with it."
"The installation was easy."
"Provides good depth of scanning and we get good results."
"It has saved us a lot of time as we focus primarily on programming rather than tool operational work."
"It is an extremely robust, scalable, and stable solution."
"CyberFlood's best features are its user-friendliness and scheduling function."
"CyberFlood is flexible."
"Our customers use it to check for unauthorized file transfer."
"The feature I find most valuable is the traffic generator."
"Micro Focus Fortify on Demand could improve the user interface by making it more user-friendly."
"They could provide features for artificial intelligence similar to other vendors."
"We typically do our bulk uploads of our scans with some automation at the end of the development cycle but the scanning can take a lot of time. If you were doing all of it at regular intervals it would still consume a lot of time. This could procedure could improve."
"During development, when our developer makes changes to their code, they typically use GitHub or GitLab to track those changes. However, proper integration between Fortify on Demand and GitHub and GitLab is not there yet. Improved integration would be very valuable to us."
"There are many false positives identified by the solution."
"The UI could be better. Fortify should also suggest new packages in the product that can be upgraded. Currently, it shows that, but it's not visible enough. In future versions, I would like more insights about the types of vulnerabilities and the pages associated with the exact CVE."
"If you have a continuous integration in place, for example, and you want it to run along with your build and you want it to be fast, you're not going to get it. It adds to your development time."
"The products must provide better integration with build tools."
"The solution needs more ports, more speed, and more gigabytes."
"I would also like to see updates on a more frequent schedule."
"CyberFlood's accessibility and support for multiple browsers could be better."
"Sometimes, when you configure parameters the hardware can't run, it will get stuck at those points without telling you what happened. It would be helpful if the error reporting provided more details about why the test setting is not running. It would be nice if there were a space in the hardware module for you to add some external hardware for more rigorous testing."
Fortify on Demand is ranked 11th in Application Security Tools with 56 reviews while Spirent CyberFlood is ranked 33rd in Application Security Tools with 4 reviews. Fortify on Demand is rated 8.0, while Spirent CyberFlood is rated 8.4. The top reviewer of Fortify on Demand writes "Provides good depth of scanning but is unfortunately not fully integrated with CIT processes ". On the other hand, the top reviewer of Spirent CyberFlood writes "I like the solution's flexibility". Fortify on Demand is most compared with SonarQube, Checkmarx One, Veracode, Coverity and Fortify WebInspect, whereas Spirent CyberFlood is most compared with Ixia BreakingPoint and Ixia BreakingPoint VE. See our Fortify on Demand vs. Spirent CyberFlood report.
See our list of best Application Security Tools vendors and best Application Security Testing (AST) vendors.
We monitor all Application Security Tools reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.