Peach Fuzzer

3.0
(2 reviews)

Peach Fuzzer is an automated security testing platform that prevents zero-day attacks by findng vulnerabilities in hardware and software systems.

Work for Peach Fuzzer?

Learning about Peach Fuzzer?

We can help you find the solution that fits you best.

Find the Right Product

Peach Fuzzer Reviews

Chat with a G2 Advisor
Write a Review
Filter Reviews
Filter Reviews
  • Ratings
  • Company Size
  • User Role
  • For Category
  • Industry
Ratings
Company Size
User Role
For Category
Industry
Showing 2 Peach Fuzzer reviews
LinkedIn Connections
Peach Fuzzer review by Cassi G.
Cassi G.
Validated Reviewer
Review Source

"Few kinks to work thru"

What do you like best?

I love the effectiveness and speed of ability to use.

What do you dislike?

I dislike the user interface

I believe it needs some improvement .

What business problems are you solving with the product? What benefits have you realized?

Peach buzzer gets to the four of the.problems you can go through running daily interface.

Sign in to G2 Crowd to see what your connections have to say about Peach Fuzzer
Peach Fuzzer review by User in Computer Software
User in Computer Software
Validated Reviewer
Review Source

"Does what it needs to do"

What do you like best?

It has cooperate support versus other products that are open source. Additionally peach fuzz has been around for much more time so it has less bugs than its competitors.

What do you dislike?

It's not open source, so you can't make any changes to meet your needs. Also it uses xml which is outdated..

What business problems are you solving with the product? What benefits have you realized?

We use peach fuzzer to monitor code that is written for security risks. And it does its job

What Dynamic Application Security Testing (DAST) solution do you use?

Thanks for letting us know!

There are not enough reviews of Peach Fuzzer for G2 Crowd to provide buying insight. Below are some alternatives with more reviews:

1
Micro Focus Fortify Logo
Micro Focus Fortify
3.8
(18 reviews)
Software security solutions from Micro Focus Fortify cover your entire software development lifecycle (SDLC) for mobile, third party and website security.
2
IBM Security AppScan Standard Logo
IBM Security AppScan Standard
3.5
(16 reviews)
IBM Security AppScan Standard can help minimize web application attacks and expensive data breaches by automating testing of application security vulnerabilities. It allows you to test applications before deploying them and assess risk in production environments on an ongoing basis.
3
InsightAppSec Logo
InsightAppSec
3.5
(1)
Application security testing for the modern web
4
Micro Focus WebInspect Logo
Micro Focus WebInspect
4.5
(1)
WebInspect offers automated dynamic application security testing (DAST) and interactive application security testing (IAST) technologies that mimics real-world hacking techniques and attacks, provides comprehensive dynamic analysis of complex web applications and services, and crawls more of the attack surface to exposes exploits.
5
Black Duck Software Composition Analysis Logo
Black Duck Software Composition Analysis
0 reviews
Black Duck by Synopsys provides a comprehensive software composition analysis (SCA) solution for managing security, quality, and license compliance risk that comes from the use of open source and third-party code in applications and containers.
6
Indusface Logo
Indusface
0 reviews
Indusface is an application security with amazon web services (AWS) and software-as-a-service (SaaS) options.
7
Entersoft Logo
Entersoft
0 reviews
Entersoft is an award-winning Application security service provider with rifle focus on proactive security through security by design. Through our managed service offerings, we currently work with 300+ customers in FinTech, IoT, Blockchain, BFSI and Healthcare. We help our customers achieve a high Application security quotient and instill proactive app security culture in the developers, DNA.
8
SWAT Logo
SWAT
0 reviews
SWAT is a pioneering solution capable of learning information regarding the application's functionality by continuously monitoring and detecting any changes; it also incorporates new threats and adjust its behaviour accordingly. The SWAT does not interfere with daily operations or availability; it ensures the customer's websites remain secure even when new content is produced or new attack methods are uncovered.
9
Code Dx Logo
Code Dx
0 reviews
Code Dx’s automated application vulnerability correlation shaves weeks off that process so you can get right to fixing your code. Its vulnerability management lets you quickly prioritize vulnerabilities (to fix the most important ones first), track progress of their remediation, and observe how your code's security changes over time.
10
reshift Logo
reshift
0 reviews
reshift is a continuous application security testing platform that helps software development teams integrate security earlier in the software development life cycle. We make security easier to integrate than other solutions because of two things: 1. Integrations: We don't want to add more work for the developers and that's why we created an end to end solution that seamlessly works with the modern day development workflow. Simply log into Github, Bitbucket, or Gitlab to upload projects. reshift has a scanner included but works on top of your existing scanners. Finally, we also integrate with JIRA to make fixing bugs actionable. 2. False Positives: reshift is capable of automatically triaging false positives with our machine learning algorithm. With other tools false positives just create noise and make fixing bugs more time consuming and less desirable, with reshift everything is filtered based on the rules you set. The more you confirm, the more accurate the predictions get.
Show more
Kate from G2 Crowd

Learning about Peach Fuzzer?

I can help.
* We monitor all Peach Fuzzer reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. Validated reviews require the user to submit a screenshot of the product containing their user ID, in order to verify a user is an actual user of the product.