Try our new research platform with insights from 80,000+ expert users

HackerOne vs OpenText Core Application Security comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Dec 28, 2025

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

HackerOne
Ranking in Application Security Tools
19th
Average Rating
8.6
Reviews Sentiment
6.9
Number of Reviews
6
Ranking in other categories
Vulnerability Management (27th), Bug Bounty Platforms (2nd), Penetration Testing Services (2nd), Attack Surface Management (ASM) (11th), AI Observability (10th)
OpenText Core Application S...
Ranking in Application Security Tools
14th
Average Rating
8.0
Reviews Sentiment
6.7
Number of Reviews
62
Ranking in other categories
Static Application Security Testing (SAST) (12th)
 

Mindshare comparison

As of January 2026, in the Application Security Tools category, the mindshare of HackerOne is 0.5%, up from 0.1% compared to the previous year. The mindshare of OpenText Core Application Security is 3.2%, down from 4.7% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Application Security Tools Market Share Distribution
ProductMarket Share (%)
OpenText Core Application Security3.2%
HackerOne0.5%
Other96.3%
Application Security Tools
 

Featured Reviews

Ruphus Muita - PeerSpot reviewer
Senior ICT Security Consultant at Applied Principles Limited
Has improved my motivation to submit bugs consistently through fast response and clear filtering
I think HackerOne can be improved by allowing new users to gain access to certain programs that are only open to known, renowned users. Sometimes new users don't receive invites just because they are new, despite potentially being very skilled hackers, so I feel new users should get more chances and opportunities. I am currently satisfied with the rewards, response time, and other aspects of the platform, so I don't have anything else to add about the necessary improvements. I give HackerOne a nine out of ten because if new hackers are given more opportunities, it could be a perfect 10 for me. However, the reason I gave a nine is that I don't have much to complain about; I specifically love the program and don't have many concerns.
Himanshu_Tyagi - PeerSpot reviewer
Lead Cybersecurity at TBO
Supports secure development pipelines and improves issue detection but limits internal visibility and needs broader dashboard integration
If you have an internal team and you want your internal team to validate false positives, basically to determine whether it's a valid issue or an invalid issue, then I wouldn't recommend it much. That was the only reason we migrated from Fortify on Demand to another solution. Fortify has another tool which is Fortify WebInspect. On Demand is the outsourcing solution, and WebInspect you can use with your in-house team, which is basically the product developed by the Fortify team. For automated scanning, Fortify helps a lot. Regarding the visibility for the internal team, everyone is moving toward the DevSecOps side, and Fortify team has made good progress that you can integrate into your CICD pipeline. One thing I would highlight is if Fortify can focus more on the centralized dashboard of the tools because nowadays, tools such as SentinelOne also exist for identifying security issues, but they have a centralized dashboard that merges their cloud solution and application security side solution together. If you have one tool that works for different solutions, it helps a lot. They are doing good, but they should invest more on the AI side as well because AI security is evolving these days. On the cloud side, they have already made good progress, but I believe they should explore the new area related to AI security as well.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"HackerOne is larger than WebCloud and has a better reputation than BugCloud, which results in a smoother process."
"Apart from getting all the bug bounty opportunities, we also get the chance to practice in a safe environment, like a demo setup. These features are great for beginners who want to explore bug bounties in the future."
"The fast verification process impacts my motivation significantly because a quick response keeps me motivated, and if I'm going to try and hunt bugs today, I would appreciate a response within the day or at least within a few days."
"The most valuable feature of HackerOne is its variety of programs. These programs provide depth into various areas, such as mobile, API, and websites."
"It helps me to get new sales, profits, and other benefits."
"HackerOne is larger than WebCloud and has a better reputation than BugCloud, which results in a smoother process."
"Fortify is effective in identifying such oversights, making it a really helpful tool despite its problems."
"Micro Focus WebInspect and Fortify code analysis tools are fully integrated with SSC portals and can instantly register to error tracking systems, like TFS and JIRA."
"One of the top features is the source code review for vulnerabilities. When we look at source code, it's hard to see where areas may be weak in terms of security, and Fortify on Demand's source code review helps with that."
"The most valuable feature of Micro Focus Fortify on Demand is the information it can provide. There is quite a lot of information. It can pinpoint right down to where the problem is, allowing you to know where to fix it. Overall the features are easy to use, you don't have to be a coder. You can be a manager, or in IT operations, et cetera, anyone can use it. It is quite a well-rounded functional solution."
"Fortify on Demand is a very good service which can be used by any organization when they are building a team because it identifies security vulnerabilities early in the software development life cycle and provides good visibility into issues in cloud-hosted applications."
"One of the valuable features is the ability to submit your code and have it run in the background. Then, if something comes up that is more specific, you have the security analyst who can jump in and help, if needed."
"Audit workbench: for on-the-fly defect auditing."
"It's a stable and scalable solution."
 

Cons

"Response time can be improved. The HackerOne Trust team can be slow to respond sometimes. They're not using AI, which could help reduce the number of duplicate reports."
"Sometimes new users don't receive invites just because they are new, despite potentially being very skilled hackers, so I feel new users should get more chances and opportunities."
"Everything has become slower on HackerOne. I have noticed that older researchers receive all the private invites while newer ones receive fewer."
"The ability to view the conversation between the triagers and the programs will be really good."
"Everything has become slower on HackerOne."
"One issue I've experienced is traffic. Many people try to participate when an opportunity with a bounty of around 1,000-15,000 dollars comes up. In this case, the first person to report the vulnerability gets the bounty. If a second person reports the same vulnerability, they are marked as duplicated instead of receiving some recognition. The second person also invested time finding the issue, so I think this can be improved."
"Reporting could be improved."
"The vulnerability analysis does not always provide guidelines for what the developer should do in order to correct the problem, which means that the code has to be manually inspected and understood."
"Micro Focus Fortify on Demand can improve by having more graphs. For example, to show the improvement of the level of security."
"This solution would be improved if the code-quality perspective were added to it, on top of the security aspect."
"The biggest deficiency is the integration with bug tracker systems. It might be better if the configuration screen presented for accessing the bug tracking systems could provide some flexibility."
"We want a user-based control and role-based access for developers. We want to give limited access to developers so that it only pertains to the code that they write and scanning of the codes for any vulnerabilities as they're progressing with writing the code. As of now, the interface to give restricted access to the developers is not the best. It gives them more access than what is basically required, but we don't want over-provisioning and over-access."
"If you have an internal team and you want your internal team to validate false positives, basically to determine whether it's a valid issue or an invalid issue, then I wouldn't recommend it much."
".NET code scanning is still dependent on building the code base before running any scan. Also, it's dependent on an IDE such as Visual Studio."
 

Pricing and Cost Advice

"The tool is open-source and free for bug bounty hunters."
"The solution is free."
"It is not more expensive than other solutions, but the pricing is competitive."
"Fortify on Demand is affordable, and its licensing comes with a year of support."
"Buying a license would be feasible for regular use. For intermittent use, the cloud-based option can be used (Fortify on Demand)."
"We make an annual purchase of the licenses we need."
"The solution is a little expensive."
"Fortify on Demand is moderately priced, but its pricing could be more flexible."
"We used the one-time application, Security Scan Dynamic. I believe the original fee was $8,000."
"The pricing model it's based on how many applications you wish to scan."
report
Use our free recommendation engine to learn which Application Security Tools solutions are best for your needs.
879,853 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Computer Software Company
15%
Manufacturing Company
11%
Comms Service Provider
10%
Financial Services Firm
10%
Financial Services Firm
18%
Manufacturing Company
14%
Computer Software Company
9%
Government
7%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business4
Large Enterprise3
By reviewers
Company SizeCount
Small Business17
Midsize Enterprise8
Large Enterprise44
 

Questions from the Community

What is your experience regarding pricing and costs for HackerOne?
I have not experienced any costs since I use HackerOne independently, just logging into the site, hunting bugs, and submitting them without any expenses.
What needs improvement with HackerOne?
I think HackerOne can be improved by allowing new users to gain access to certain programs that are only open to known, renowned users. Sometimes new users don't receive invites just because they a...
What is your primary use case for HackerOne?
My main use case for HackerOne is mostly for submitting bugs. I get into the programs listed there, find one that is suitable for me, do my penetration testing on the systems, try to bypass some co...
What do you like most about Micro Focus Fortify on Demand?
It helps deploy and track changes easily as per time-to-time market upgrades.
What is your experience regarding pricing and costs for Micro Focus Fortify on Demand?
In comparison with other tools, they're competitive. It is not more expensive than other solutions, but their pricing is competitive. The licenses for Fortify On Demand are generally bought in unit...
What needs improvement with Micro Focus Fortify on Demand?
If you have an internal team and you want your internal team to validate false positives, basically to determine whether it's a valid issue or an invalid issue, then I wouldn't recommend it much. T...
 

Also Known As

HackerOne Assets, HackerOne Pentesting Services, HackerOne Security Assessments, HackerOne Vulnerability Management
Micro Focus Fortify on Demand
 

Overview

 

Sample Customers

Anthropic, Crypto.com, General Motors, GitHub, Goldman Sachs, Uber, and the U.S. Department of Defense
SAP, Aaron's, British Gas, FICO, Cox Automative, Callcredit Information Group, Vital and more.
Find out what your peers are saying about HackerOne vs. OpenText Core Application Security and other solutions. Updated: December 2025.
879,853 professionals have used our research since 2012.