Fortify - Application Security
Recent statistics show that almost half of breaches that cause material damage occur via applications. HP Fortify provides software and services that help organization secure applications to prevent those attacks. This blog serves as a platform for our penetration testers, product managers and marketers, and software engineers to provide analysis and insight regarding both web application security and how organizations can utilize our products and services to better secure their applications. For more information, visit

Looking back on a decade of Fortify

In the decade since Fortify broke into and helped establish the software security market, there are 2 things that continue to amaze me:


  • The role of software in enabling businesses and powering our economy is off the charts—truly hyper-growth
  • The number of sophisticated cyber-attacks against that very software is also off the charts—outpacing the market’s ability to defend against them. 

I’m quite fond of the first bullet point; the second, not so much. When I think about it, the application security testing landscape that we knew back in 2003 seems so quaint and naïve compared to the complexity and rate of evolution in today’s technology landscape. Today’s infrastructure is software-powered—from software-defined networks to cloud-based applications, internet-connected autos and appliances, and, of course, today’s hot mobile application market. It really is an entirely different world—all within a decade.


The very notion of an “app” has changed dramatically; but to me, it’s all software. And every business is a software business now. Software has become the competitive advantage; it’s the engine that powers organizations trying to deliver more capabilities, in more ways, to more people. And this storm of software brings risk into these organizations faster than they can hope to deal with it.


It is against this backdrop that the team at HP Fortify continues to deliver its products into the Application Security HP-Fortify-On-Demand.jpgTesting market. We truly understand the magnitude and rate of change in most every organization. The demands of today’s software security landscape require multiple solutions delivered in a variety of ways to address the varied needs of modern organizations delivering, operating and consuming software. You can’t be a one-trick pony and truly help groups deliver secure software and applications. 


Since this is my first blog (how old school is THAT!), I get my pass at being a bit commercial. It can be easy to lose track of a company like Fortify or SPI Dynamics post-acquisition into HP. I’m here to tell you that we are certainly alive and well—being just as innovative as we were years ago. I’ll talk about some of those innovations in a future blog, but today I want to remind you of the capabilities we offer. 


HP Fortify solutions are proven worldwide, with over a decade of successful implementations. We are trusted across a wide swath of organizations and industries—from ISVs large and small, to the world's largest corporations and governments, including our selection by the U.S. Department of Homeland Security. HP Fortify has a unique combination of:


  • The ability to deliver a flexible application security solution—on-premise or cloud-based
  • Consistency and reliability of our support and services
  • Uninterrupted research and development innovation and investment
  • Leading technologies in each application security testing category
  • An expert software security research team


Stay tuned for more blogs from me…we’ve got an entire decade of Fortify to cover! In the meantime, you can learn more about Fortify here

Labels: HP| security
Leave a Comment

We encourage you to share your comments on this post. Comments are moderated and will be reviewed
and posted as promptly as possible during regular business hours

To ensure your comment is published, be sure to follow the Community Guidelines.

Be sure to enter a unique name. You can't reuse a name that's already in use.
Be sure to enter a unique email address. You can't reuse an email address that's already in use.
Type the characters you see in the picture above.Type the words you hear.
Showing results for 
Search instead for 
Do you mean 
About the Author

Follow Us
The opinions expressed above are the personal opinions of the authors, not of HP. By using this site, you accept the Terms of Use and Rules of Participation.