FOD See how it works

How Fortify on Demand works

Manage your entire application security program in five steps: initiate , assess , report , remediate , and retest .

Step 1.


  • Create and customized applications.
  • Choose your desired assessment type.
  • Upload source code, byte code or binaries, or provide URL of target application.
Step 2.


  • HPE security professionals perform an assessment and verify results.
  • Verifiable false-positives are removed from the system    before results are published with star rating and assessment against pass/fail criteria.
  • Lightning-fast turnaround time (one to several days) depending upon assessment level and type.
Step 3.


•  Communicate relevant metrics, filtering by severity, vulnerability category, business unit, region or other company data.
•  Quickly show identified critical vulnerabilities, applications at highest risk and trending history.
•  Review results anywhere, anytime via the Fortify on Demand mobile app for iPhone.
Step 4.


  • Click on the application name to get up-to-date audit information: scan owner, analysis type and any notes.
  • Drill down even further for stack trace, line of code details, request/response and remediation recommendations.
  • Manage and assign remediation tasks through the portal.

FOD Step Columns

Step 5.



Request a remediation scan in the Fortify on Demand portal



The HPE Security Team will personally verify that the items have been correctly remediated



The updated assessment data will be provided to the portal

Ready to get started?