FOD See how it works

How Fortify on Demand works

Manage your entire application security program in five steps: initiate , assess , report , remediate , and retest .

Step 1.

Initiate

  • Create and customized applications.
  • Choose your desired assessment type.
  • Upload source code, byte code or binaries, or provide URL of target application.
Step 2.

Assess

  • HPE security professionals perform an assessment and verify results.
  • Verifiable false-positives are removed from the system before results are published with star rating and assessment against pass/fail criteria.
  • Lightning-fast turnaround time (typically a few hours) depending upon assessment level and type.
Step 3.

Report

•  Communicate relevant metrics, filtering by severity, vulnerability category, business unit, region or other company data.
•  Quickly show identified critical vulnerabilities, applications at highest risk and trending history.
 
Step 4.

Remediate

  • Click on the application name to get up-to-date audit information: scan owner, analysis type and any notes.
  • Drill down even further for stack trace, line of code details, request/response and remediation recommendations.
  • Manage and assign remediation tasks through the portal.

FOD Step Columns

Step 5.
Retest

1

Request

Request a remediation scan in the Fortify on Demand portal

2

Verify

The HPE Security Team will personally verify that the items have been correctly remediated

3

Update

The updated assessment data will be provided to the portal

Ready to get started?