SaaS unification of SAST, DAST, and Core SCA
One platform across all three scan types with shared findings management, unified policy, and one suppression history. Programs running Fortify standalone scanners get the unification benefit.
OpenText • Application security
Core Application Security is the SaaS edition of the OpenText AppSec line, formerly Fortify on Demand. It unifies SAST, DAST, and Core SCA scan execution and findings management into one platform with Application Security Aviator AI augmentation across all three.
Programs modernizing off legacy Fortify on-prem onto the SaaS bundle do it through Merito, with policy refresh, suppression-discipline redesign, CI/CD integration, and Aviator pilot rollout treated as the work rather than a license swap.
What it is
OpenText Core Application Security is the SaaS-unified AppSec product carrying the Fortify on Demand lineage. It bundles SAST (Static Application Security Testing), DAST (Dynamic Application Security Testing), and Core SCA (Core Software Composition Analysis) into one platform with shared findings management, unified policy, and Application Security Aviator as the AI augmentation surface across all three. Customers running standalone Fortify scanners on-premises modernize onto Core Application Security; net-new programs adopt Core Application Security directly as the unifying surface.
The Fortify lineage matters. Fortify Static Code Analyzer became SAST. Fortify WebInspect became DAST. Fortify SCA became Core SCA. Fortify on Demand became Core Application Security. The engines are mature (Fortify SAST has been in regulated production for two decades), the language coverage is broad, and the regulated-industry footprint (financial services, government, defense, healthcare) is real. The 2024-2025 rebrand cycle is cosmetic at the engine level; the modernization opportunity is at the operational level (SaaS unification, CI/CD integration, AI augmentation).
Modernization off legacy Fortify on-prem is the most common engagement. Programs running Fortify Static Code Analyzer on-premises with Fortify on Demand SaaS for some teams typically end up with two policy stores, two suppression histories, and two sets of CI/CD integrations. Core Application Security unifies the operational surface in SaaS. Merito treats the move as a chance to refresh policies, redo suppression discipline, modernize CI/CD wiring, and layer Aviator AI augmentation rather than a license-swap exercise.
What breaks Core Application Security adoption is treating the SaaS migration as identical to the on-prem deployment. The on-prem Fortify model assumes manual scan triggering and post-hoc triage and the SaaS Core Application Security model assumes CI/CD-triggered scans, PR-time integration, and continuous triage. Programs that lift-and-shift the on-prem operating model into SaaS get Fortify on Demand-shaped operations rather than Core Application Security-shaped operations. Merito's engagement redesigns the operating model rather than copying it.
Ideal use cases
What it is best at
One platform across all three scan types with shared findings management, unified policy, and one suppression history. Programs running Fortify standalone scanners get the unification benefit.
Fortify Static Code Analyzer, WebInspect, and Fortify SCA engines under the Core Application Security umbrella. Mature regulated-industry footprint (20+ years in financial services, government, defense, healthcare).
Aviator runs across SAST, DAST, and Core SCA findings inside Core Application Security. Programs running the bundle get unified AI augmentation rather than per-scanner AI.
FedRAMP authorization on selected SaaS editions, SOC 2 Type II, ISO 27001 + 27017 + 27018, HIPAA-aligned design. Programs subject to federal or sector-specific mandates get the compliance trail in SaaS.
Strategic modernization target for legacy Fortify Static Code Analyzer, WebInspect, and Fortify on Demand customers consolidating onto SaaS.
Core capabilities
SAST + DAST + Core SCA running on one platform with shared findings management.
SAST inside Core Application Security
Fortify Static Code Analyzer engine, broad language coverage including legacy stacks, source and binary code analysis.
DAST inside Core Application Security
Fortify WebInspect engine, authenticated web scanning, API and mobile DAST coverage.
Core SCA inside Core Application Security
Fortify Software Composition Analysis engine, OSS dependency scanning, license compliance.
Unified findings management
One backlog across SAST, DAST, and SCA. Shared severity, suppression, and audit trail.
Aviator on top of unified findings.
Application Security Aviator integration
Cross-product AI grounded in the customer's findings, triage history, and codebase across SAST, DAST, and SCA.
AI-assisted triage
Aviator clusters related findings, proposes remediation paths, and reduces false-positive review time.
AI-augmented developer workflow
IDE and PR-review integration so AI suggestions reach developers in the workflow they already use.
SaaS-unified AppSec inside the customer's release pipelines.
CI/CD integration
PR-time scanning, build-gate policy, and release-time evidence across Jenkins, GitHub Actions, GitLab CI, Azure DevOps, and Bitbucket.
Application Quality Management traceability
AppSec evidence flowing into AQM for regulated test management and audit traceability.
Compliance reporting
Audit-ready evidence for SOC 2, FedRAMP, HIPAA, PCI DSS, and ISO 27001 attestations.
Findings-routing operating model
Suppression workflow, triage assignment, and PR-time integration designed for SaaS continuous AppSec rather than on-prem batch AppSec.
Where it fits in the stack
Deployment and implementation
Licensing and packaging
Core Application Security commercial
SaaS-unified SAST + DAST + Core SCA bundle with Aviator AI augmentation.
Best for: Programs modernizing off legacy Fortify or starting net-new AppSec in SaaS.
Core Application Security Government Cloud (FedRAMP)
FedRAMP-authorized edition for federal customers and federal contractors.
Best for: Federal programs and contractors requiring FedRAMP-authorized AppSec SaaS.
Merito services
Merito sells licenses and the delivery work around them. Pick the service that matches where you are in the lifecycle.
Tenant setup, modernization from legacy Fortify, policy refresh, suppression-discipline redesign, CI/CD integration, Aviator pilot.
Explore service02Fortify on-prem to Core Application Security migrations including policy and suppression-history transfer.
Explore service03AppSec program scoping for Core Application Security adoption alongside Checkmarx One and Snyk.
Explore service04PR-time SAST, DAST, and SCA gates and build-gate policy in the customer's CI fabric.
Explore service05Developer enablement and AppSec champion programs around SaaS continuous AppSec.
Explore service06Named engineer, priority SLAs, and release-time coverage for Core Application Security.
Explore service07Long-term run support including policy tuning, suppression-discipline maintenance, and Aviator rollout evolution.
Explore service08Role-based training for AppSec architects, security engineers, and developers using Core Application Security output.
Explore service09Merito-placed AppSec engineers and OpenText specialists embedded on long-running programs.
Explore serviceOpenText Core Application Security licensing
Core Application Security pricing arrives with Fortify-to-Core modernization, policy refresh, CI/CD integration, and Aviator pilot rollout that turn the SaaS migration into a real AppSec modernization rather than a lift-and-shift license swap.
Merito point of view
Merito has migrated programs off legacy Fortify on-prem onto Core Application Security and watched some teams lift-and-shift the operating model verbatim. The result is Fortify on Demand-shaped operations running in Core Application Security, which is not what the SaaS unification is for. The modernization opportunity is at the operational level: continuous CI/CD-triggered scans, PR-time gates, AI augmentation through Aviator, unified findings management across SAST + DAST + SCA. Programs that treat the move as a license swap leave most of the value on the table.
Merito recommends Core Application Security specifically when the program is consolidating off legacy Fortify on-prem, when SaaS unification across SAST + DAST + SCA pays back the migration cost, and when regulated compliance posture (SOC 2, FedRAMP, HIPAA) matters. For programs running mature Checkmarx One pipelines, replacing them with Core Application Security is a 12-month project that often does not deliver enough delta to justify the disruption. Merito runs that decision honestly.
Application Security Aviator is the AI augmentation that pays back when grounding is real. Programs licensing Aviator without piloting and without grounding configuration get generic AppSec AI that looks correct and frequently is not. Merito treats Aviator pilot validation as part of the Core Application Security implementation rather than an upsell.
What buyers usually underestimate
Related from Merito
Related solutions
Related services
Related products
Frequently Asked Questions
Consultation request
Share your current Fortify footprint, modernization timeline, and AppSec program shape. A Merito OpenText specialist follows up within one business day.
SaaS unification
Shared findings, unified policy, Aviator AI across the line. Programs running standalone Fortify scanners get the unification benefit.
Modernization opportunity
Continuous AppSec, PR-time gates, AI augmentation. Lift-and-shift migrations leave most of the value on the table.
Next step
A Merito Core Application Security engagement starts with policy refresh, suppression-discipline redesign, and Aviator pilot planning. Lift-and-shift migrations leave most of the SaaS unification value on the table.