Fortify - Application Security
Recent statistics show that almost half of breaches that cause material damage occur via applications. HP Fortify provides software and services that help organization secure applications to prevent those attacks. This blog serves as a platform for our penetration testers, product managers and marketers, and software engineers to provide analysis and insight regarding both web application security and how organizations can utilize our products and services to better secure their applications. For more information, visit

HP WebInspect Integration with HP TippingPoint

A few weeks ago I blogged about the WebInspect integration with F5 Networks.  Many may have noticed that in one of the pictures I uploaded there is also the option to send results to HP TippingPoint.


WAF Export button.png


In version 10.0, released in April of 2013, WebInspect began supporting the ability to export certain vulnerabilities into a format that TippingPoint can understand.  The transfer of data is not instant, like the F5 implementation there are a few steps to go through on the human side of things to translate what WebInspect has found and can export into something that TippingPoint can begin to use as a filter. The XML output from WebInspect must be imported into DVToolKit before it can be imported into a TippingPoint device.


I mentioned in my last post that it can take weeks for developers to generate and deploy a fix for a vulnerability found in production. During that time, applications are still at risk.  Conversely, customers with HP WebInspect or using HP Fortify on Demand to perform dynamic scanning of their applications (who also have a HP TippingPoint device deployed in their environment) can protect their applications from certain vulnerabilities found with a WebInspect scan while awaiting a fix from their development team.


Yet another way Fortify is delivering on our Assess, Assure, Protect vision.


To learn more about Fortify, visit 

Leave a Comment

We encourage you to share your comments on this post. Comments are moderated and will be reviewed
and posted as promptly as possible during regular business hours

To ensure your comment is published, be sure to follow the Community Guidelines.

Be sure to enter a unique name. You can't reuse a name that's already in use.
Be sure to enter a unique email address. You can't reuse an email address that's already in use.
Type the characters you see in the picture above.Type the words you hear.
Showing results for 
Search instead for 
Do you mean 
About the Author

Follow Us
The opinions expressed above are the personal opinions of the authors, not of HP. By using this site, you accept the Terms of Use and Rules of Participation.