Fortify SCA lineage with deep license intelligence
Carries the Fortify SCA engine and the license-intelligence catalog Fortify built over 15+ years. Programs needing rigorous license-compliance posture pick the lineage with depth.
OpenText • Application security
OpenText Core Software Composition Analysis carries the Fortify SCA lineage as a SaaS service, scanning OSS dependencies for vulnerabilities and license risk across heterogeneous codebases, with cross-correlation back to Fortify SAST and Aviator AI augmentation.
Through Merito, OpenText Core SCA gets tuned against the customer's actual dependency-tree shape, license-policy is designed per application rather than blanket, and the triage operating model is wired so SCA findings join the SAST and DAST queue inside Core Application Security as one backlog rather than three.
What it is
OpenText Core Software Composition Analysis is the SaaS SCA product carrying the Fortify Software Composition Analysis lineage. It scans open-source dependencies in package manifests across npm, PyPI, Maven Central, NuGet, Go modules, Cargo, Gem, Composer, RubyGems, and more, surfaces vulnerabilities and license risk across the dependency tree, and feeds findings into Core Application Security alongside SAST and DAST. Programs running standalone Fortify SCA on-premises modernize onto Core SCA in SaaS as part of the Core Application Security move.
License compliance is half of SCA's value. Programs that ship code with copyleft licenses (GPL, AGPL) into proprietary products create legal exposure. Core SCA evaluates every dependency against a configurable license policy and flags forbidden licenses before they reach production. License policy is per-application or per-business-unit so internal-only tooling does not get audited like a customer-facing SaaS product. Fortify's license-intelligence depth is one of the historical strengths of the line.
Cross-correlation with SAST is the platform advantage. SCA findings cross-link to Fortify SAST flow paths so AppSec sees both the dependency CVE and the application-code path that calls into the vulnerable library. Aviator AI augmentation extends across SCA, SAST, and DAST findings together, proposing dependency-upgrade paths and reachability-aware triage. Programs running Core SCA standalone get the SCA capability; programs running it inside Core Application Security get the unified backlog math.
What stalls SCA adoption is alert fatigue. Programs that take vendor-default policies, ignore per-application license tuning, and route every CVE finding to the developer queue burn out the engineering organization and the AppSec team simultaneously. Merito's engagement starts with license-policy tuning, suppression workflow with audit trail, and developer-time integration that surfaces findings during PR review rather than as a separate dashboard. Without that, SCA generates more noise than it removes.
Ideal use cases
What it is best at
Carries the Fortify SCA engine and the license-intelligence catalog Fortify built over 15+ years. Programs needing rigorous license-compliance posture pick the lineage with depth.
npm, PyPI, Maven Central, NuGet, Go modules, Cargo, Gem, Composer, RubyGems, and more in one engine. Programs stop stitching together specialist tools per ecosystem.
Different license rules for internal tooling versus customer-facing SaaS. Programs avoid blanket copyleft bans that block legitimate internal use of GPL libraries.
SCA findings link back to the Fortify SAST flow path that calls the dependency and the DAST runtime confirmation. Triage runs once, not three times.
Generates SBOMs in industry-standard formats for regulated programs that require SBOM-as-evidence under EO 14028 or sector-specific mandates.
Core capabilities
Where SCA does the work against heterogeneous dependency trees.
Direct and transitive dependency scanning
Resolves the full dependency graph and surfaces vulnerabilities across direct and transitive dependencies.
Ecosystem coverage
npm, PyPI, Maven Central, NuGet, Go modules, Cargo, Gem, Composer, RubyGems, and more.
Source correlation with SAST
Cross-references SCA findings against Fortify SAST flow paths to surface the application code calling into vulnerable libraries.
Aviator AI augmentation
AI-augmented triage that proposes dependency-upgrade paths and reachability-aware suppression suggestions.
Avoiding legal exposure on copyleft and forbidden licenses without blanket bans.
Deep license intelligence catalog
Fortify's license-intelligence catalog covers obligations, attribution requirements, source-disclosure rules, and license compatibility across the dependency graph.
Per-application license policy
Different license rules for internal tooling versus customer-facing SaaS. Avoids blanket copyleft bans.
Forbidden-license gates
Block-on-introduce policy stops new copyleft dependencies from entering the build while triage works the legacy backlog.
Audit-ready evidence for regulated and federal programs.
CycloneDX and SPDX SBOM generation
SBOM output in industry-standard formats for compliance with EO 14028, NIST SSDF, and sector-specific mandates.
Cross-product correlation
SCA findings cross-link to SAST, DAST, and Aviator triage inside Core Application Security.
Compliance reporting
Audit-ready evidence for SOC 2, FedRAMP, HIPAA, PCI DSS, and ISO 27001 attestations.
Where it fits in the stack
Deployment and implementation
Licensing and packaging
Standalone Core Software Composition Analysis
Standalone SaaS SCA for programs not running the full Core Application Security bundle.
Best for: Programs adding SaaS SCA to an existing AppSec footprint.
Inside Core Application Security
Core SCA as part of the SaaS-unified SAST + DAST + Core SCA bundle.
Best for: Programs running unified AppSec.
Merito services
Merito sells licenses and the delivery work around them. Pick the service that matches where you are in the lifecycle.
Tenant setup, license-policy tuning, CI/CD integration, SBOM-generation wiring.
Explore service02Fortify SCA on-prem to Core SCA SaaS modernization.
Explore service03AppSec program scoping for Core SCA adoption alongside Checkmarx SCA, Snyk SCA, Black Duck, and Sonatype Lifecycle.
Explore service04PR-time SCA gates and build-gate policy in Jenkins, GitHub Actions, GitLab CI, Azure DevOps, and Bitbucket.
Explore service05Developer enablement and AppSec champion programs around SCA findings and license discipline.
Explore service06Named engineer, priority SLAs, and release-time coverage for Core SCA.
Explore service07Long-term run support including license-policy maintenance, SBOM-generation operations, and triage operating-model evolution.
Explore service08Role-based training for AppSec architects, security engineers, and developers consuming SCA output.
Explore service09Merito-placed AppSec engineers and OpenText specialists embedded on long-running programs.
Explore serviceOpenText Core SCA licensing
Core SCA pricing arrives with license-policy design, suppression workflow, CI/CD integration, and SBOM-generation wiring that put Fortify's 15+ years of license intelligence to work rather than letting it sit unused.
Merito point of view
Merito has audited SCA programs that ran rigorous CVE scanning and ignored license posture, then discovered they had been shipping AGPL libraries inside proprietary SaaS for two years. The license catalog Fortify built over 15+ years is one of the deeper assets in the OpenText AppSec line, and programs that adopt Core SCA without using it are leaving half the value on the table. Per-application license policy is the right shape: customer-facing SaaS gates strict, internal tooling gates loose, and the program does not block legitimate copyleft use.
Merito recommends OpenText Core SCA specifically when programs are consolidating onto Core Application Security or already running OpenText AppSec, when license-compliance posture matters, and when SBOM-as-evidence under EO 14028 or sector mandates is in scope. For programs already running mature Checkmarx SCA pipelines with EPA reachability turned on, replacing them with Core SCA is a 12-month project that often does not deliver enough delta. For programs running Snyk SCA on developer experience, the migration tradeoff goes the other way.
Cross-correlation with SAST is the platform claim that pays back inside Core Application Security. Programs running Core SCA standalone get the SCA capability; programs running it inside Core Application Security with Aviator augmentation get the unified backlog math.
What buyers usually underestimate
Related from Merito
Related solutions
Related services
Related products
Frequently Asked Questions
Consultation request
Share your dependency-tree shape, current SCA tool if any, and license-compliance posture. A Merito OpenText specialist follows up within one business day.
Fortify lineage
15+ years of license-catalog depth. Programs needing rigorous license-compliance posture pick the lineage with depth.
Cross-correlation
SCA findings cross-link to SAST flow paths and DAST runtime confirmations inside Core Application Security.
Next step
A Merito Core SCA engagement starts with license-policy design and SBOM wiring. Programs that adopt SCA without per-application license policy leave half the value on the table.