Day 5 – Assignment 3 – by Gorsa Lakshmi Niharika

Advantages of Fortify SCA

  • Choosing to run SCA as a standalone process or integrating fortify SCA as part of the build tool
  • It uses a multiple algorithms and an expansive knowledge base of security coding rules
  • It secure by coding rules to analyze an application’s source code for exploitable vulnerabilities
  • It technique analyzes every feasible path that execution
  • The data can follow to identify and remediate vulnerabilities
0 0 votes
Article Rating
Subscribe
Notify of
guest

This site uses Akismet to reduce spam. Learn how your comment data is processed.

0 Comments
Inline Feedbacks
View all comments
0
Would love your thoughts, please comment.x
()
x