Senior Social Media and Content Manager at PeerSpot
6
Published:Jul 17, 2017
What do users say about their application security tools?
What do Users Look for when Choosing their Application Security Tools?
Which application security tools do IT professionals such as QA engineers and software developers choose to protect their applications from external threats?
According to Margaret Rouse from TechTarget, as applications become more accessible across networks, application security has become a critical element in software design.
According to IT Central Station users, features that help them decide which application security tool is right for them include comprehensive application security testing, support for major coding languages and centralized analysis capabilities.
In the new application security reviews quoted below, real users share up-to-date feedback and compare the top application security solutions in the industry.
“The static code analyzer provides views from a security perspective and it is easy to use compared to others. We use it to evaluate security from the code and provide results from a security perspective as opposed to a developer’s perspective.”
“Not all products are created equal”
This user suggests another piece of advice for IT pros considering HPE Fortify on Demand:
“It is a good product to choose for SCA and cloud deployment. If you choose SSC, don’t always look at the price, as the other products might not conduct the same analysis as HPE Fortify does. Not all products are created equal.”
“The Visual Studio plugin seems to hang when a scan is run on big projects. I would expect some improvements there. Also, the comments added on each issue were getting lost on multiple iterations of scans, which could be fixed.”
“Implementing a blackout time for any user or team(s) needs improvement. I need to place limits for some users or teams within a specific time frame. For example, between 02:00 am to 06:00 am. They can't start any scanning during that time, even if they have scanner privileges.”
“[There is] more automated quality control in the lifecycle of development / testing / deployment / production. This includes the prevention of potential bugs due to ineffective code, as well as keeping a more unified style of solutions. This is thanks to standard solutions offered by the issue tips. It raises code maintainability as well as flexibility, to some extent.”
“There is need for support for the additional languages and ease of use in adding new rules for detecting issues. Some issues that were detected after committing to the CSM by SonarQube were not displayed in SonarLint scans (hopefully this was fixed in later versions).”
“We used the application for the web. Static, dynamic, and manual scan features were all very useful for us. All of them helped us fix many security flaws. It made us change our approach to coding. We tried to make sure our application stayed secure and safe.”
Advice for First-Time Users
Efe Oral also lends advice to those who are using Veracode for the first time:
“If it's the first time you are using a security application, be ready for some new tools which you will require you to revitalize the flaws reported.
Reports are very well documented. Once you understand what it means and you get used to it, you will see that it is detailed and clearly explained.”
“Burp Suite is a versatile tool for manual web application penetration testing; mainly used by skilled ethical hackers to test security of web-based applications. It helps capturing and modifying HTTP packets and variables, and observing the application’s response. It allows fuzzing the variable in an intuitive way, repeating the same method, crawling a web application, and similar functionalities.”
“Some extra features are not available in the core product (WSDL parsing, SOAP calls, Error checks, Authorization bypass), but additional modules created by the community can be easily installed from the BApp store through Extender, or you can write your own in Java, Python or Ruby.”
“Before Netsparker, we were opening internal web pages to the outside for manual tests. Health tests were limited by a system admin’s capabilities.
After Netsparker, a lot of the security tests became automated. We added a step in our policy document to scan pages with Netsparker before opening a site to the outside.”
“Sometimes, it is slow; when we are running this application and browsing other applications concurrently, it makes other applications work slow. Besides that, it seems fine.
When I use Netsparker along with other applications such as testing web apps on browsers like Chrome or Firefox for a little longer than normal, there are issues that might be due to the CPU high usage. I'm unable to work on other applications (mainly browsers such as Chrome/Firefox) and ultimately, it hangs and takes time to browse on browsers.”
Application Security Tools play a crucial role in protecting company assets by identifying and addressing potential vulnerabilities. Key aspects to consider include:
Vulnerability Detection
Integration with Development Cycle
Scalability
Compliance Assurance
Real-time Monitoring
The importance of adopting robust Application Security Tools cannot be overstated due to the rapidly evolving threat l...
Application Security Tools play a crucial role in protecting company assets by identifying and addressing potential vulnerabilities. Key aspects to consider include:
Vulnerability Detection
Integration with Development Cycle
Scalability
Compliance Assurance
Real-time Monitoring
The importance of adopting robust Application Security Tools cannot be overstated due to the rapidly evolving threat landscape. As attackers find new ways to exploit software vulnerabilities, these tools offer proactive methods to safeguard applications before vulnerabilities can be exploited. Companies that embed security measures within their application development lifecycle are better positioned to ensure secure deployment and maintenance of their software solutions. By integrating security from the onset, businesses prevent costly breaches and maintain trust with their users.Security Tools provide more than protection; they assure compliance with industry standards and regulations, which is essential for organizations across various sectors. Using scalable security solutions, businesses can adapt to growth without compromising the security posture of their applications. Real-time monitoring and alert systems provided by these tools enhance the ability of security teams to respond swiftly to threats, thus minimizing potential damage. The evolution in the Application Security landscape stresses the importance of choosing tools that can not only detect vulnerabilities but also facilitate remediation efforts efficiently.
I prefer using tools like OWASP ZAP for its comprehensive open-source web application security testing capabilities, and Veracode for its robust static and dynamic analysis, as well as its integration with development workflows. Each tool offers distinct strengths tailored to different stages of the development lifecycle.
I prefer using tools like OWASP ZAP for its comprehensive open-source web application security testing capabilities, and Veracode for its robust static and dynamic analysis, as well as its integration with development workflows. Each tool offers distinct strengths tailored to different stages of the development lifecycle.
Download our free Application Security Tools Report and find out what your peers are saying about SonarSource Sàrl, Checkmarx, Veracode, and more! Updated: February 2026.