OpenText

Fortify (SAST/DAST) test

Static & Dynamic Application Security Testing · Category 9. AppSec · Tier 1
CL Listed — Visible
Methodology v3.5 · OLIR Schema
Avril 2026
Evaluation Tier: Visible (Listed) Verified (CAE) Enterprise (EEE) Layer 1-2 only · Documentary assessment · All capabilities vendor-claimed
Executive Summary 30 seconds

What it is

Enterprise application security testing platform combining Static Application Security Testing (SAST) and Dynamic Application Security Testing (DAST). Fortify identifies vulnerabilities in source code, binaries, and running applications across 30+ programming languages.

Best for

Secure SDLC integration (NIST SSDF PW.6), PCI DSS Req. 6.2 (secure software development), DORA Art. 8(4) (secure ICT development). Ideal for large enterprises with complex multi-language codebases and CI/CD pipelines.

What it does NOT do

No runtime protection (RASP), no WAF capabilities, no network security, no IAM, no data masking, no endpoint detection. Not a SIEM or SOC tool — focuses exclusively on application-layer vulnerabilities.

CL Recommendation

Fortify is the reference platform for enterprise SAST/DAST. Broadest language support (33 languages). Critical for PCI DSS 6.x, DORA Art. 8, and NIST SSDF compliance. Combine with WAF (Cat. 6), SIEM (Cat. 12), and IAM (Cat. 1) for full stack security. Gartner MQ Leader for 10+ consecutive years.

Regulatory Fit Per regulation verdict
PCI DSS v4.0
~22% of requirements
✔ Strong — Req. 6.2, 6.3, 6.5 (secure dev lifecycle)
DORA
~15% of obligations
● Moderate — Art. 8(4) secure ICT dev
NIS2
~12% of Art. 21
● Moderate — Art. 21(2)(e) secure dev
GDPR
~5% of articles
△ Supporting only — Art. 25 (DPbD via secure code)
HIPAA
~8% of provisions
● Moderate — §164.312(a) access controls via secure code
NIST SSDF
~65% of practices
✔ Strong — PW.4, PW.5, PW.6, PW.7, PW.8 (code analysis)
▼ Show detailed regulatory mapping (OLIR format)
PCI DSS v4.0 (PROPRIETARY)
FocalObligationOLIR Rel.Hub RefRationale
Req. 6.2.1Secure development processesDirectSA-3 / PR.PS-06Functional
Req. 6.2.3Code review before releaseDirectSA-11 / PR.PS-06Functional
Req. 6.3.1Identify vulnerabilitiesDirectRA-5 / ID.RA-01Functional
Req. 6.5.5Address common coding vulnerabilitiesContributingSA-11 / PR.PS-06Semantic
DORA (OPEN_GOV)
FocalObligationOLIR Rel.Hub RefRationale
Art. 8(4)Secure ICT dev lifecycleDirectSA-15 / PR.PS-06Functional
Art. 8(5)ICT testing methodologiesContributingSA-11 / PR.PS-06Semantic
Art. 24(1)Threat-led penetration testingContributingCA-8 / RS.AN-02Semantic
NIS2 (OPEN_GOV)
FocalObligationOLIR Rel.Hub RefRationale
Art. 21(2)(e)Security in system acquisition/devDirectSA-15 / PR.PS-06Functional
Art. 21(2)(d)Supply chain securityContributingSR-3 / GV.SC-05Semantic
NIST SSDF (OPEN_GOV)
FocalObligationOLIR Rel.Hub RefRationale
PW.6Verify code meets security requirementsEquivalentSA-11 / PR.PS-06Syntactic
PW.7Review and test code for vulnerabilitiesEquivalentSA-11 / PR.PS-06Syntactic
PW.5Create source code adhering to practicesContributingSA-15 / PR.PS-06Semantic
RV.1Identify and confirm vulnerabilitiesDirectRA-5 / ID.RA-01Functional

Articles without contribution omitted. Full OLIR mapping available in Audit Pack export.

🎯 Buyer Guidance Decision support

✔ Consider When

  • + PCI DSS Req. 6.2/6.3 secure development lifecycle compliance
  • + Large enterprise with 5+ programming languages in codebase
  • + CI/CD pipeline integration needed (Jenkins, Azure DevOps, GitLab)
  • + NIST SSDF compliance for federal/government contracts
  • + Need both SAST (source code) and DAST (running app) in one platform
  • + Regulatory pressure from DORA Art. 8 or NIS2 Art. 21

❌ Avoid When

  • Small team with single-language codebase (overkill)
  • Need runtime application protection (RASP)
  • Budget-constrained startup — enterprise pricing only
  • Need WAF or network-level protection
  • Looking for open-source or free SAST alternative
  • Need SaaS-only deployment — on-prem component required for SAST
Capabilities 23 claimed · 4 groups · DR-2 Quality Tiers + Config Modifiers
Static Analysis (SAST) 5✓ 1● 0✗
Source code analysis (33 languages)
Java, C#, Python, JS, Go, Swift, COBOL, etc.
Specific Obl.Out-of-Box
Binary/bytecode analysis
Compiled code scanning without source
Specific Obl.Out-of-Box
IaC security scanning
Terraform, CloudFormation, Kubernetes
Control FamilyConfig Change
Custom rule creation
Proprietary rule language for custom checks
Control FamilyConfig Change
Incremental scanning
Scan only changed files in CI/CD
Generic ControlOut-of-Box
AI-assisted remediation
Autofix suggestions powered by ML
Data SurfacedConfig Change
Dynamic Analysis (DAST) 3✓ 1● 1✗
Automated web app scanning
OWASP Top 10, CWE/SANS Top 25
Specific Obl.Out-of-Box
API security testing
REST, SOAP, GraphQL endpoints
Specific Obl.Config Change
Authenticated scanning
Login sequence recording and replay
Control FamilyConfig Change
Mobile app testing (DAST)
iOS and Android runtime testing
Control FamilyConfig Change
Interactive testing (IAST)
Combined SAST+DAST correlation
Specific Obl.N/A
CI/CD & DevSecOps Integration 6✓ 0● 0✗
Jenkins plugin
Native Jenkins integration
Control FamilyOut-of-Box
Azure DevOps integration
Pipeline extension available
Control FamilyOut-of-Box
GitLab CI integration
YAML template provided
Control FamilyConfig Change
IDE plugins (VS Code, IntelliJ)
Real-time developer feedback
Generic ControlOut-of-Box
REST API for automation
Full programmatic access
Control FamilyOut-of-Box
Policy-as-code gates
Break builds on severity thresholds
Specific Obl.Config Change
Reporting & Compliance 4✓ 1● 1✗
OWASP Top 10 compliance report
Pre-built compliance template
Specific Obl.Out-of-Box
PCI DSS 6.x compliance report
Req. 6.2, 6.3, 6.5 mapping
Specific Obl.Out-of-Box
CWE/CVE correlation
Map findings to known vulnerability DBs
Specific Obl.Out-of-Box
Executive dashboard
Trend analysis and risk scoring
Generic ControlOut-of-Box
SIEM integration (Splunk, QRadar)
Forward findings to SIEM
Control FamilyConfig Change
SBOM generation
Software Bill of Materials output
Specific Obl.N/A
🛡 MITRE ATT&CK Mapping Layer 4 — Derived via SP 800-53
M1016
Vulnerability Scanning
Full (claimed)
M1051
Update Software
Full (claimed)
M1054
Software Configuration
Partial (claimed)
M1050
Exploit Protection
Full (claimed)
M1013
Application Developer Guidance
Full (claimed)

Score: 3.8 / 5.0 (76%) — All vendor-claimed. Techniques addressed: T1059, T1190, T1203, T1211 (execution & exploitation family).

▼ Show ATT&CK techniques detail
TechniqueNameHow AddressedProvenance
T1190Exploit Public-Facing ApplicationSAST/DAST identifies exploitable vulnerabilities before deploymentDERIVED via M1016
T1059Command and Scripting InterpreterDetects injection flaws (SQL, OS, LDAP) in source codeDERIVED via M1016
T1203Exploitation for Client ExecutionIdentifies client-side vulnerabilities (XSS, CSRF)DERIVED via M1050
T1211Exploitation for Defense EvasionDetects insecure coding patterns enabling bypassDERIVED via M1016
📄 Evidence Pack DR-2 §5.1 — Proof of value
SAST scan reports (PDF/XML)
Detailed findings per scan with CWE mapping. Exportable.
DAST scan reports
OWASP Top 10 compliance evidence. PDF/HTML export.
CI/CD audit trail
Pipeline execution logs with pass/fail decisions.
Compliance mapping reports
PCI DSS, OWASP, CWE/SANS pre-built templates.
Third-party penetration test
Vendor security posture independently verified.
SBOM (Software Bill of Materials)
Not natively generated. Requires third-party SCA tool.

Evidence level: Documentary review only (CL Listed). For verified evidence, upgrade to CAE (Examine + Interview) or EEE (+ Test).

Operational Metrics & Anti-Hype DR-2 §5.1 + §9.2
MetricFortify on Demand (SaaS)Fortify On-PremEnterprise (Full Suite)
Implementation1-2 weeks4-8 weeks8-16 weeks
FTE Required0.25 FTE0.5-1 FTE1-2 FTE
Time to first valueDay 1-5 (first SAST scan on primary codebase)
Time to productionMonth 2-6 (all repos onboarded, CI/CD gates active, policies tuned)
Anti-Hype: Marketing vs. Reality
33 programming languages supported
Accurate. Broadest language coverage in the market, including legacy languages (COBOL, ABAP).
Verified
Gartner Magic Quadrant Leader 10+ years
Verified. Consistent Leader positioning since 2014.
Verified
Zero false positives with AI tuning
False positive rate reduced but not eliminated. Expect 15-25% FP rate on initial scans. Requires tuning.
Misleading
Seamless CI/CD integration
Plugins exist for major CI tools but initial setup requires AppSec expertise. SAST scans can add 10-30 min to builds.
Partial
Complete application security platform
No RASP, no SCA (Software Composition Analysis), no container security. Requires complementary tools.
Partial
Strengths & Cautions

✔ Strengths

  • + 33 languages — broadest SAST coverage in the market
  • + Combined SAST + DAST in a single platform
  • + Gartner MQ Leader for 10+ consecutive years
  • + Deep CI/CD integration (Jenkins, Azure DevOps, GitLab)
  • + Pre-built PCI DSS and OWASP compliance reports
  • + On-prem and SaaS (Fortify on Demand) deployment options
  • + Mature enterprise-grade platform with 20+ years track record

⚠ Cautions

  • ! Enterprise pricing — no free tier or community edition
  • ! SAST scan times can be significant on large codebases (30+ min)
  • ! Initial false positive rate requires tuning effort (15-25%)
  • ! No SCA (Software Composition Analysis) built-in
  • ! No RASP or runtime protection capabilities
  • ! Complex on-prem deployment — requires dedicated AppSec team
  • ! All capabilities VENDOR-CLAIMED (no CL independent testing)
📈 Competitive Positioning Category 9 — AppSec
CapabilityFortify (SAST/DAST) testCheckmarxVeracodeSnyk
SAST
DAST
SCA
IaC scanning
CI/CD integration
On-prem deployment
Pricing entryEnterprise onlyEnterprise onlyEnterprise onlyFree tier

Competitive data based on public information. CL has not evaluated these alternatives — for detailed assessment, see individual CL Listings.

📑 Framework Views Hub: CSF 2.0 + 800-53r5 + ISO 27001
▼ Show NIST SP 800-53, CSF 2.0, ISO 27001 mapping tables
NIST SP 800-53 Rev 5
ControlNameContributionProvenance
SA-11Developer Testing & EvaluationdirectDERIVED via PCI DSS 6.2
SA-15Development Process & StandardsdirectDERIVED via DORA Art. 8(4)
RA-5Vulnerability Monitoring & ScanningdirectDERIVED via PCI DSS 6.3
SA-3System Development Life CyclecontributingCL-ORIGINAL
CM-4Impact AnalysescontributingCL-ORIGINAL
SI-10Information Input ValidationdirectDERIVED via OWASP A03
NIST CSF 2.0
ControlNameContributionProvenance
PROTECTPR.PS-06 Secure software developmentdirectDERIVED via SA-11
IDENTIFYID.RA-01 Vulnerability identificationdirectDERIVED via RA-5
DETECTDE.CM-09 Software monitoringcontributingCL-ORIGINAL
RESPONDRS.AN-02 Impact analysiscontributingCL-ORIGINAL
ISO 27001:2022 Annex A
ControlNameContributionProvenance
A.8.25Secure development life cycleEquivalentOFFICIAL via ISO 27034
A.8.29Security testing in dev & acceptancedirectDERIVED via NIS2-ISO
A.8.28Secure codingdirectDERIVED via OWASP-ISO
A.8.8Management of technical vulnerabilitiescontributingCL-ORIGINAL
▼ Show Vendor Security Practices (SSDF / CRA)
SSDF IDPracticeStatus
PW.1Risk-based secure designClaimed
RV.2Timely vulnerability remediationClaimed
PO.5Secure development environmentClaimed
PS.3SBOM availableNot stated
RV.1Vulnerability disclosure programClaimed
PS.2Code signingUnknown
Compliance Labs · Software Listing v3.5 · OLIR Schema Hub: CSF 2.0 ↔ 800-53r5 ↔ ISO 27001 · Avril 2026
Select the fields to be shown. Others will be hidden. Drag and drop to rearrange the order.
  • Vendor
  • Category
  • CL Tier
  • Short description
  • Website
  • What it is
  • Best for
  • Does NOT do
  • CL verdict
  • Regulatory coverage
  • Frameworks tested
  • Capabilities
  • MITRE ATT&CK
  • Strengths
  • Cautions
  • Anti-hype claims
  • Operational metrics
  • Evidence pack
Compare
Compare ×
View comparison Continue browsing software