Compare HCL AppScan vs. Sonatype Nexus Lifecycle

HCL AppScan is ranked 6th in Application Security with 13 reviews while Sonatype Nexus Lifecycle is ranked 7th in Application Security with 11 reviews. HCL AppScan is rated 8.0, while Sonatype Nexus Lifecycle is rated 8.6. The top reviewer of HCL AppScan writes "The ease of use is key, the developers can actually use it and get results from dynamic testing". On the other hand, the top reviewer of Sonatype Nexus Lifecycle writes "Low false-positive count and the vulnerability-upgrade overview are key features for us". HCL AppScan is most compared with Veracode, SonarQube and Micro Focus Fortify on Demand, whereas Sonatype Nexus Lifecycle is most compared with SonarQube, WhiteSource and Black Duck Hub. See our HCL AppScan vs. Sonatype Nexus Lifecycle report.
Cancel
You must select at least 2 products to compare!
Veracode Logo
47,953 views|25,711 comparisons
HCL AppScan Logo
14,138 views|9,708 comparisons
Sonatype Nexus Lifecycle Logo
3,777 views|2,219 comparisons
Most Helpful Review
Find out what your peers are saying about HCL AppScan vs. Sonatype Nexus Lifecycle and other solutions. Updated: September 2019.
371,639 professionals have used our research since 2012.
Quotes From Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:

Pros
We used it for performing security checks. We have many Java applications and Android applications. Essentially it was used for checking the security validations for compliance purposes.I have used this solution in multiple projects for vulnerability testing and finding security leaks within the code.The most valuable feature comes from the fact that it is cloud-based, and I can scale up without having to worry about any other infrastructure needs.We are using the Veracode tools to expose the engineers to the security vulnerabilities that were introduced with the new features, i.e. a lot faster or sooner in the development life cycle.One of the valuable features is that it gives us the option of static scanning. Most tools of this type are centered around dynamic scanning. Having a static scan is very important.It has an easy-to-use interface.Veracode provides faster scans compared to other static analysis security testing tools.It has almost completely eliminated the presence of SQLi vulnerabilities.

Read more »

This solution saves us time due to the low number of false positives detected.The static scans are good, and the SaaS as well.It provides a better integration for our ecosystem.You can easily find particular features and functions through the UI.We leverage it as a quality check against code.We are now deploying less defects to production.Usually when we deploy the application, there is a process for ethical hacking. The main benefit is that, the ethical hacking is almost clean, every time. So it's less cost, less effort, less time to production.It has certainly helped us find vulnerabilities in our software, so this is priceless in the end.

Read more »

The key benefit we get from it is speed to delivery. It has improved our overall time to get new applications out with new code. That's true whether from a platform perspective, where we are quickly deploying up-to-date docker containers, or whether we are looking to deploy new code out to deliver a new application.The grandfathering mode allows us to add legacy applications which we know we're not going to change or refactor for some time. New developments can be scanned separately and we can obviously resolve those vulnerabilities where there are new applications developed. The grandfathering is a good way to separate what can be factored now, versus long-term technical debt.The dashboard is usable and gives us clear visibility into what is happening. It also has a very cool feature, which allows us to see the clean version available to be downloaded. Therefore, it is very easy to go and trace which version of the component does not have any issues. The dashboard can be practical, as well. It can wave a particular version of a Java file or component. It can even grandfather certain components, because in a real world scenarios we cannot always take the time to go and update something because it's not backward compatible. Having these features make it a lot easier to use and more practical. It allows us to apply the security, without having an all or nothing approach.The way we can define policies and apply those policies selectively across the different applications is valuable. We can define a separate policy for public-facing applications and a separate policy for the internal applications. That is cool.The data quality is really good. They've got some of the best in the industry as far as that is concerned. As a result, it helps us to resolve problems faster. The visibility of the data, as well as their features that allow us to query and search - and even use it in the development IDE - allow us to remediate and find things faster.The application onboarding and policy grandfathering features are good and the solution integrates well with our existing DevOps tools.It scans and gives you a low false-positive count... The reason we picked Lifecycle over the other products is, while the other products were flagging stuff too, they were flagging things that were incorrect. Nexus has low false-positive results, which give us a high confidence factor.What's really nice about that is it shows a graph of all the versions for that particular component, and it marks out the ones that have a vulnerability and the ones that don't have a vulnerability.

Read more »

Cons
One of the things that we have from a reporting point of view, is that we would love to see a graphical report. If you look through a report for something that has come back from Veracode, it takes a whole lot of time to just go through all the pages of the code to figure out exactly what it says. We know certain areas don’t have the greatest security features but those are usually minor and we don’t want to see those types of notifications.Ideally, I would like better reporting that gives me a more concise and accurate description of what my pain points are, and how to get to them.I would like to see expanded coverage for supporting more platforms, frameworks, and languages.Veracode should make it easier to navigate between the solutions that they offer, i.e. between dynamic, static, and the source code analysis.We would like a way to mark entire modules as "safe." The lack of this feature hasn't stopped us previously, it just makes our task more tedious at times. That kind of feature would save us time.Veracode scans provide a higher number of false positives.The overall reporting structure is complicated, and it's difficult to understand the report.It needs more timely support for newer languages and framework versions.

Read more »

IBM Security AppScan needs to add performance optimization for quickly scanning the target web applications.There is not a central management for static and dynamic.Visibility is an issue for us. Our partners do not know we have integrations with some of IBM products.I would like to see the roadmap for this product. We are still waiting to see it as we have only so many resources.I would love to see more containers. Many of the tools are great, they require an amount of configuration, setup and infrastructure. If most the applications were in a container, I think everything would be a little bit faster, because all our clients are now using containers.​IBM Security AppScan Source is rather hard to use​.There are so many lines of code with so many different categories that I am likely to get lost. ​It's a little bit basic when you talk about the Web Services. If AppScan improved its maturity on Web Services testing, that would be good.

Read more »

We've had some challenges around the database they use. We've had some big outages and it's due to the fact that we haven't found the database they use is all that stable... We've had some really positive conversations with Sonatype around that and they've provided us with the support and special services to help us migrate off of that, on to another type of database platform which we have more control over.If they had a more comprehensive online tutorial base, both for admin and developers, that would help. It would be good if they actually ran through some scenarios, regarding what happens if I do pick up a vulnerability. How do I fork out into the various decisions? If the vulnerability is not of a severe nature, can I just go ahead with it until it becomes severe? This is important because, obviously, business demands certain deliverables to be ready at a certain time.We use Griddle a lot for integrating into our local builds with the IDE, which is another built system. There is not a lot of support for it nor published modules that can be readily used. So, we had to create our own. No Griddle plugins have been released.Since Nexus Repository just keeps on adding the .jar artifacts whenever there is a build, whenever an application is going up, there is always a space issue on the server. That is one of the things that we are looking for Nexus to notify us about: if it is running out of space.As far as the relationship of, and ease of finding the relationships between, libraries and applications across the whole enterprise goes, it still does that. They could make that a little smoother, although right now it's still pretty good.The biggest thing is getting it put uniformly across all the different teams. It's more of a process issue. The process needs to be thought out about how it's going to be used, what kind of training there will be, how it's going to be socialized, and how it's going to be rolled out and controlled, enterprise-wide. That's probably more of a challenge than the technology itself.We created the Wiki page for each team showing an overview of their outstanding security issues because the Lifecycle reporting interface isn't as intuitive. It is good for people on my team who use it quite often. But for a tech engineer who doesn't interact with it regularly, it's quite confusing.Another feature they could use is more languages. Sonatype has been mainly a Java shop because they look after Maven Central... But we've slowly been branching out to different languages. They don't cover all of them, and those that they do cover are not as in-depth as we would like them to be.

Read more »

Pricing and Cost Advice
They have just streamlined the licensing and they have a number of flexible options available, so overall it is quite good, albeit pricey.They just changed their pricing model two weeks ago. They went from a per-app license to a per-megabyte license. I know that the dynamic scan was $500 per app. Static analysis was about $4500 yearly. The license is only for the number of users, it doesn't matter what data you put in there. That was the old model. I do not know how the new model works.Veracode has been fair. We use their SaaS solution and it's just an annual subscription.No issues, the pricing seems reasonable.It is pricey. There is a lot of value in the product, but it is a costly tool.I recommend going for a one-year licensing with CA, because currently they are the leaders in this field with more features and a much better turn around time with a cheaper position, but there are a lot of new companies coming up in the market and they are building up their platforms.Costs are reasonable. No special infrastructure is required and the license model is good.I think the pricing is in line with the rest of the tools. I think you get what you pay for. It is certainly not inexpensive, but the value proposition is there. There are certainly cheaper tools, but I don't think we'd be getting the support that we get with those, and that is what separates this product from the others.

Read more »

AppScan is a little bit expensive. IBM needs to work a little bit on the pricing model, decreasing the license cost.

Read more »

One of the challenges we had around licensing was how to deal with anonymous requests. According to the letter of the contract, an anonymous request consumes a license. We had to do some work to get over the fact that any anonymous interactions with the Lifecyle product had to be put back to an end-user account.Pricing is comparable with some of the other products. We are happy with the pricing.Pricing is decent. It's not horrible. It's middle-of-the-road, as far as our ranking goes. They're a little bit more but that's also because they provide more.We're pretty happy with the price, for what it is delivering for us and the value we're getting from it.Its pricing is competitive within the market. It's not very cheap, it's not very expensive.

Read more »

report
Use our free recommendation engine to learn which Application Security solutions are best for your needs.
371,639 professionals have used our research since 2012.
Top Comparisons
Compared 48% of the time.
Compared 12% of the time.
Compared 16% of the time.
Compared 14% of the time.
Also Known As
IBM Security AppScan, Rational AppScan, AppScanNexus Lifecycle
Learn
Veracode
HCL
Sonatype
Overview

Veracode is an application security company that offers an automated cloud-based service for securing web, mobile and third-party enterprise applications. Veracode provides multiple security analysis technologies on a single platform, including static analysis, dynamic analysis, mobile application behavioral analysis and software composition analysis.

IBM Security AppScan enhances web application security and mobile application security, improves application security program management and strengthens regulatory compliance. By scanning your web and mobile applications prior to deployment, AppScan enables you to identify security vulnerabilities and generate reports and fix recommendations.

Nexus Lifecycle gives you full control over your software supply chain and allows you to define rules, actions, and policies that work best for your organization and teams.

Offer
Learn More About Veracode

Stay Up-To-Date on Application Security 

Learn more about HCL AppScan
Learn more about Sonatype Nexus Lifecycle
Sample Customers
State of Missouri, ReknerEssex Technology Group Inc., Cisco, West Virginia University, APIS ITGenome.One, Blackboard, Crediterform, Crosskey, Intuit, Progress Software, Qualys, Liberty Mutual Insurance
Top Industries
REVIEWERS
Financial Services Firm35%
Insurance Company17%
Consumer Goods9%
Hospitality Company4%
VISITORS READING REVIEWS
Software R&D Company36%
Comms Service Provider12%
Financial Services Firm9%
Retailer5%
REVIEWERS
Insurance Company25%
Government25%
Aerospace/Defense Firm13%
Transportation Company13%
VISITORS READING REVIEWS
Software R&D Company36%
Government14%
Comms Service Provider9%
Financial Services Firm7%
REVIEWERS
Financial Services Firm60%
Health, Wellness And Fitness Company10%
Transportation Company10%
Hospitality Company10%
VISITORS READING REVIEWS
Software R&D Company33%
Financial Services Firm12%
Government9%
Comms Service Provider8%
Company Size
REVIEWERS
Small Business22%
Midsize Enterprise27%
Large Enterprise51%
VISITORS READING REVIEWS
Small Business12%
Midsize Enterprise12%
Large Enterprise76%
REVIEWERS
Small Business10%
Midsize Enterprise15%
Large Enterprise75%
VISITORS READING REVIEWS
Small Business13%
Midsize Enterprise2%
Large Enterprise85%
REVIEWERS
Midsize Enterprise27%
Large Enterprise73%
Find out what your peers are saying about HCL AppScan vs. Sonatype Nexus Lifecycle and other solutions. Updated: September 2019.
371,639 professionals have used our research since 2012.
We monitor all Application Security reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.
Sign Up with Email