Help the communities most affected by the California wildfires in only a few minutes. We'll donate $10 for every review you submit.

Micro Focus Fortify

3.8
(18)

Software security solutions from Micro Focus Fortify cover your entire software development lifecycle (SDLC) for mobile, third party and website security.

Work for Micro Focus Fortify?

Learning about Micro Focus Fortify?

We can help you find the solution that fits you best.

Micro Focus Fortify Features

Administration

API / Integrations

Application Programming Interface Specification for how the application communicates with other software. APIs typically enable integration of data, logic, objects, etc. with other software applications.

Not enough data available

Extensibility

Provides the ability to extend the platform to include additional features and functionalities

Not enough data available

Performance and Reliability

Software is consistently available (uptime) and allows users to complete tasks quickly because they are not waiting for the software to respond to an action they took.

Not enough data available

Compliance

Access Management

Allows administrators to set user access privileges to permit approved parties to access sensitive data.

76%
(Based on 5 reviews)

At-Risk Analysis

Identifies location of data that may be less protected and more vulnerable to threats.

76%
(Based on 5 reviews)

DLP Configuration

Sets protocols to alert administrators and back-up or encrypt data at rest or as incidents arise.

n/a

Sensitive Data Compliance

Supports compliance with PII, GDPR, HIPPA, PCI, and other regulatory standards.

Not enough data available

Analysis

Reporting and Analytics

Tools to visualize and analyze data.

Not enough data available

Issue Tracking

Track issues and manage resolutions.

Not enough data available

Static Code Analysis

Examines application source code for security flaws without executing it.

Not enough data available

Vulnerability Scan

Scans applications and networks for known vulnerabilities, holes and exploits.

Not enough data available

Administration

Database Management

Administrators can access and organize data related to incidents to produce reports or make data more navigable.

70%
(Based on 5 reviews)

Deduplication

Deduplication, creating synthetic backup files, to reduce file size and eliminate redundant files.

Not enough data available

Backup

Stores data remotely, on-premise, or in cloud databases in case of recovery during disaster.

Not enough data available

API / integrations

Application Programming Interface - Specification for how the application communicates with other software. API's typically enable integration of data, logic, objects, etc. with other software applications.

Not enough data available

Testing

Comman-Line Tools

Allows users to access a terminal host system and input command sequences.

Not enough data available

Manual Testing

Allows users to perfrom hands-on live simulations and penetration tests.

Not enough data available

Test Automation

Runs pre-scripted security tests without requiring manual work.

Not enough data available

Compliance Testing

Allows users to test applications for specific compliance requirements.

Not enough data available

Security

Multi-Factor Authentication

Requires a second level of authentication, such as sms messaging or customized tokens, to access data.

76%
(Based on 5 reviews)

Data Transport

Protects data with some form of encryption as it leaves your secure or local network.

n/a

Data Types

Allows the secure storage of differend information types such as text, spreadsheets, or graphics.

Not enough data available

Security Tools

Provides tools that allow adminstrators to quarantine, block, or encrypt data.

Not enough data available