OpenText Static Application Security Testing carries the Fortify Static Code Analyzer engine that has been in regulated production for two decades. The engine covers Java, JavaScript, TypeScript, C#, .NET, Python, Go, C, C++, Objective-C, Swift, Kotlin, Salesforce Apex, COBOL, ABAP, PL/SQL, and more, with both source-code and binary-code analysis. The binary-code analysis matters for regulated programs that need to scan vendor-supplied components without source.
Where Fortify SAST has historically differentiated is on regulated and legacy stacks. Programs running mainframe-adjacent COBOL alongside modern Java microservices, or Salesforce Apex alongside .NET enterprise applications, get one engine across the line. Single-language SAST tools force enterprises to bolt together specialist scanners; Fortify covers the modern and the legacy in one product. The 2024-2025 rebrand from Fortify SAST to OpenText Static Application Security Testing is cosmetic at the engine level.
Hybrid deployment is the operational shape. Programs run SAST inside Core Application Security as SaaS, on-prem for regulated workloads where SaaS is not permitted, or as bring-your-own-cloud (BYOC) for hybrid programs. The engine and findings model are consistent across deployment shapes, so AppSec programs that run hybrid (some applications in SaaS, others on-prem) get one operational pattern. Customers running on-prem-only Fortify Static Code Analyzer and considering modernization should look at the SaaS unification through Core Application Security as the operational target.
What disrupts SAST adoption is policy drift. Programs that take vendor-default policies and never tune them generate huge false-positive volumes, lose developer trust by month two, and eventually become a checkbox scan that nobody reads. Merito's engagement starts with policy tuning to the customer's actual risk tolerance, suppression discipline that is auditable rather than a graveyard of ignored findings, and PR-time integration so developers see results in the workflow they already use. Without that, even the best engine generates noise.
Ideal use cases
- Enterprise SAST across heterogeneous codebases including COBOL, Apex, and mainframe-adjacent code
- Source plus binary code analysis for vendor-supplied components
- Hybrid SAST deployment across SaaS, on-prem, and BYOC
- PR-time SAST gates in Jenkins, GitHub Actions, GitLab CI, Azure DevOps, Bitbucket
- Regulated SAST evidence under SOC 2, HIPAA, FedRAMP, and PCI DSS