Test running apps and services for common security weaknesses and vulnerabilities using malformed inputs to detect flaws. Leverage fully automated tests across 250+ test suites, protocol-specific attack patterns and automatic test mutation
It's relatively easy to get started. The tool allow extending it using Java or Python so you can test virtually any system. Reporting is great: you can easily know which anomalous input caused an error to reproduce and fix it.
What do you dislike?
The tool works best in case you're testing a protocol for which there's a built-in fuzzer. In case you choose to use a generic fuzzer like the Universal Fuzzer and add you're own logic then the usefulness of the tool is greatly reduced. Testing REST APIs which have good input validation (like JSON schema validation) won't typically yield much result.
Recommendations to others considering the product
For basic testing you can rely on open source tools instead. I believe for world-class products a tool like Defensics is needed.
What business problems are you solving with the product? What benefits have you realized?
Enhancing the robustness of our software. Defending against unknown attack vectors. Prevent SQL injections among other attacks.
* We monitor all Defensics reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. Validated reviews require the user to submit a screenshot of the product containing their user ID, in order to verify a user is an actual user of the product.