
OpenText Fortify integration
Add exploitability analysis to Fortify findings and prioritize based on environment-specific conditions.
Integration details
Primary category
Static Application Security Testing
Sync direction
OpenText Fortify ↔ Konvu
Findings are ingested from OpenText Fortify into Konvu. Based on your workflow, Konvu can then push context, status changes, and severity updates back to OpenText Fortify.
Status
Available
What is OpenText Fortify?
OpenText Fortify provides enterprise SAST capabilities through Fortify Static Code Analyzer, identifying security vulnerabilities in source code across multiple languages.
Why connect OpenText Fortify to Konvu
- Prioritize which Fortify-detected CWEs represent exploitable vulnerabilities versus theoretical weaknesses.
- Reduce remediation backlog from Fortify scans by focusing developers on findings with supporting evidence.
- Build audit trails connecting Fortify's detailed vulnerability reports to triage outcomes.
How it works
Scan
OpenText Fortify produces findings from scans or assessments.
Ingest & enrich
Konvu ingests those findings and enriches them with code, configuration, and deployment context.
Assess exploitability
Konvu determines exploitability and recommended action with evidence attached.
Sync decisions
Based on your workflow, Konvu can push context, status updates, and severity adjustments back into OpenText Fortify.
Quick setup
Configure OpenText Fortify from the integrations list in Konvu.
- 1Go to /configuration/integrations in Konvu and choose OpenText Fortify.
- 2Authorize access and confirm the data sources you want to sync.
- 3Save the configuration to start syncing.
Sync direction
OpenText Fortify ↔ Konvu
Findings are ingested from OpenText Fortify into Konvu. Based on your workflow, Konvu can then push context, status changes, and severity updates back to OpenText Fortify.
More integrations
View allCheckmarx
Focus Checkmarx SAST and SCA alerts on code paths with demonstrated exploit potential.
CodeQL
Prioritize CodeQL alerts by adding exploit context to static analysis findings.
GitHub
Prioritize GitHub CodeQL and Dependabot alerts by adding exploit context to each finding.
GitLab
Add exploitability analysis to GitLab's built-in SAST and SCA pipeline findings.
Semgrep
Triage Semgrep's rule-based code findings and supply chain alerts with exploit evidence.
Snyk
Triage Snyk vulnerabilities across code, dependencies, and containers with exploit context.