

OpenText Core Application Security and CrowdStrike Falcon Cloud Security are key competitors in the field of cyber security, focusing on application and cloud security, respectively. OpenText seems to have the upper hand, particularly in vulnerability scanning, while CrowdStrike excels in threat detection and response.
Features: OpenText Core Application Security provides thorough scanning across multiple formats, detailed vulnerability tracking, and supports integration with various tools. It accommodates HIPAA compliance and offers real-time project updates. CrowdStrike Falcon Cloud Security excels in real-time threat detection, AI-driven analysis, and minimal system impact. It offers centralized management and proactive endpoint protection.
Room for Improvement: OpenText Core Application Security could improve with more language support, better reporting features, and faster scan times. Improved integration with CI/CD pipelines is also needed. CrowdStrike Falcon Cloud Security could enhance forensic capabilities, pricing, and support responsiveness.
Ease of Deployment and Customer Service: OpenText Core Application Security offers various deployment options but faces challenges in support services with reports of long wait times. CrowdStrike Falcon Cloud Security is easy to set up on cloud platforms and praised for its setup but noted for being expensive. Its support is generally good, with some calls for faster resolution times.
Pricing and ROI: OpenText Core Application Security's flexible pricing model can still be perceived as expensive despite enhancing security posture and reducing operational costs. CrowdStrike Falcon Cloud Security is considered costly, especially for larger installations, yet the investment is seen as worthwhile due to robust threat detection and protection features.
More than 12 million vulnerabilities have been identified and resolved while working with CrowdStrike Falcon Cloud Security over the past 10 years.
We have seen a return on investment through time saved and managed employee workload.
It is an expense we are willing to pay to conform to Cyber Essentials Plus and demonstrate responsibility in protecting our data and that of our partners.
Based on my experience with CrowdStrike Falcon Cloud Security's technical support, I would rate them a solid 10 out of 10.
Technical support is quite good.
I have contacted customer service, and they are fast.
Support tickets often stay open for one month to three months, which leads to customer frustration.
I had direct interaction with them, which facilitated how we onboarded Fortify.
It is deployed across multiple departments and multiple locations.
CrowdStrike Falcon Cloud Security is indeed highly scalable, ideally for enterprises with a minimum of 2,000 servers to ensure cost efficiency and easier setup.
The scalability of CrowdStrike Falcon Cloud Security is good, and it can easily scale up to over 20,000 or 30,000 endpoints.
If a customer wants to know the tools and the technology used for their application to scan their application, they provide less information on that.
Occasionally, when the workload increases, it slows down considerably and sometimes becomes unresponsive.
When evaluating the stability of CrowdStrike Falcon Cloud Security, their partnerships with all major cloud service providers ensure their servers are optimally positioned.
If CrowdStrike Falcon Cloud Security could implement pushing out remediation from the sensor installed on machines, that would be beneficial.
The user interface needs improvement as it's sometimes difficult to locate specific dashboards or reports.
Another issue is the lack of proper documentation.
It would be beneficial if Fortify could check for CVEs (Common Vulnerabilities and Exposures) in third-party libraries, which I currently use a separate dependency checker tool for.
One thing I would highlight is if Fortify can focus more on the centralized dashboard of the tools because nowadays, tools such as SentinelOne also exist for identifying security issues, but they have a centralized dashboard that merges their cloud solution and application security side solution together.
It would be better for Fortify on Demand if they could analyze not only the security pillar but also maintainability, portability, and reliability, covering all pillars of ISO 25000.
The pricing for CrowdStrike Falcon Cloud Security is reasonable, especially for small companies with limited budgets.
No additional cost for maintenance or support; it's all included in the quotation.
However, the main point is that even though it is expensive, it provides a huge capability to the organization.
It automatically blocks duplication and activities that could result in data loss, effectively preventing unintended copying of data to personal devices.
The threat detection capability of CrowdStrike Falcon Cloud Security has always been the major seller, and it works effectively.
CrowdStrike Falcon plays a crucial role in our environment and gives us a clear point where we can focus our efforts rather than hunting down what is happening.
Fortify helps me find serious issues, such as developers inadvertently leaving access tokens, including API access tokens, in the source code.
On demand you have two levels of reports: the first from the tool, which is the same as we can get from Fortify on-premises, and a next level reporting made by experts from OpenText, leading to a more condensed and precise report as level three.
Additionally, you can integrate Fortify in CICD pipeline, so you get real-time updates about the security issues in your pipeline.
| Product | Market Share (%) |
|---|---|
| CrowdStrike Falcon Cloud Security | 1.0% |
| OpenText Core Application Security | 3.2% |
| Other | 95.8% |


| Company Size | Count |
|---|---|
| Small Business | 13 |
| Midsize Enterprise | 6 |
| Large Enterprise | 14 |
| Company Size | Count |
|---|---|
| Small Business | 17 |
| Midsize Enterprise | 8 |
| Large Enterprise | 44 |
CrowdStrike Falcon Cloud Security is a platform of cloud security solutions aimed at protecting organizations from breaches while simplifying cloud security management. The unified platform combines several cloud security functionalities for comprehensive protection. Built on the CrowdStrike Falcon Platform, it leverages the powerful agent and technology used in CrowdStrike's renowned endpoint protection solutions, extending its capabilities seamlessly to cloud environments.
CrowdStrike Falcon Cloud Security is designed to be a shield for the cloud infrastructure. One of its key strengths is its ability to monitor cloud workloads for potential breaches and attacks. It doesn't matter if you're running virtual machines, containers, or a combination of both across different cloud providers – Falcon Cloud Security offers visibility and protection. Additionally, it works tirelessly to pinpoint misconfigurations or vulnerabilities in your cloud setup, proactively stopping issues before they become full-blown security incidents. Compliance becomes easier too, as it can check if your deployments meet the requirements of various industry standards and regulations.
If you heavily utilize containers and Kubernetes, Falcon Cloud Security has you covered. It delves deep into container images and running containers to spot weaknesses and potential threats, helping you secure your containerized applications from the moment they're developed to when they're up and running. Finally, it tackles the often messy world of permissions in the cloud. Falcon Cloud Security analyzes identities and their attached permissions, ensuring that the principle of least privilege is followed and sensitive data isn't exposed due to overly broad access rights.
In essence, CrowdStrike Falcon Cloud Security aims to simplify the complexities of cloud security by consolidating tools, providing a centralized view of your risks and threats, and delivering advanced protection that blends seamlessly with your development processes.
Based on the interviews we conducted with CrowdStrike Falcon Cloud Security users, overall, the sentiment is positive. Users praise the solution's efficacy in detecting and preventing threats, its ease of use, scalability, stability, and integration with existing systems. There were also mentions of areas for improvement, such as the pricing, the user interface, and customer support.
OpenText Core Application Security offers robust features like static and dynamic scanning, real-time vulnerability tracking, and seamless integration with development platforms, designed to enhance code security and reduce operational costs.
OpenText Core Application Security is a cloud-based, on-demand service providing accurate and deep scanning capabilities with detailed reporting. Its integrations with development platforms ensure an enhanced security layer in the development lifecycle, benefiting users by lowering operational costs and facilitating efficient remediation. The platform addresses needs for intuitive interfaces, API support, and comprehensive vulnerability assessments, helping improve code security and accelerate time-to-market. Despite its strengths, challenges exist around false positives, report clarity, and language support, alongside confusing pricing and package options. Enhancements are sought in areas like CI/CD pipeline configuration, report visualization, scan times, and integration with third-party tools such as GitLab, container scanning, and software composition analysis.
What features define OpenText Core Application Security?Industries like mobile applications, e-commerce, and banking leverage OpenText Core Application Security for its ability to identify vulnerabilities such as SQL injections. Integrating seamlessly with DevSecOps and security auditing processes, this tool supports developers in writing safer code, ensuring secure application deployment and enhancing software assurance.
We monitor all Application Security Tools reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.