Veracode

Last updated: Mar 25, 2026


How does Fluid Attacks' solution compare to Veracode's?

The following comparison table enables you to discern the performance of both providers across various attributes essential for meeting your company's cybersecurity needs. To better understand each attribute, read their descriptions in the dedicated page.

Organization

AttributeEssentialAdvancedVeracode
FocusNative ASPM with in-house scannersAI-powered PTaaS on top of native ASPM with in-house scannersNative ASPM with in-house scanners
ExtrasNoneNoneMPT and PTaaS
Headcount157Same519
Headcount distributionEngineering 40%, IT 14%, sales 15%, marketing 2%, operations 4% and others 25%SameEngineering 28%, IT 17%, sales 14%, marketing 3%, operations 3% and others 35%
Headcount growth+14%, +15%, -1%Same+4%, -8%, -24%
HeadquartersCO and USSameUK and US
CountriesAR, BO, CA, CL, CO, DO, MX, PA, PE and USSameUK and US
Reputation9.76 from 228 reviews over 8 years on Gartner and ClutchSame8.47 from 772 reviews over 10 years on Capterra, G2, Gartner, PeerSpot and TrustRadius
Followers22K based on the following: Facebook, Instagram, LinkedIn, X and YouTubeSame115K based on the following social media: Facebook, Instagram, LinkedIn, X and YouTube
Research firmsNoneNoneForrester, Frost & Sullivan, GigaOM and IDC
Founded2001Same2006
FundingBootstrappedSame$114.3M USD in 7 rounds from 14 investors
AcquisitionsNoneNoneAcquired 0 times and made 4 acquisitions
Revenue10M to 15MSame100M to 500M
CVEs as CNA Researcher289 CVEs reported to MITRE, ranked in the top 10 CVE labs worldwideSameNot applicable, as it is not a CNA Researcher
ComplianceSOC 2 Type II and SOC 3SameFedRAMP Authorized and SOC 2 Type II
Bug bountyYesYesNo
Visits27K per month. Top 3: 34% PE, 33% CO, 6% CL. Others 27%Same616K per month. Top 3: 18% US, 10% IN, 5% UK. Others 67%
Authority31 out of 100Same45 out of 100
Public vulnerability DBDiscovered and third-partySameDiscovered and third-party
ContentBlog, documentation, e-books, glossary, reports, success stories, videos, webinars and white papersSameBlog, documentation, e-books, infographics, podcast, videos, webinars and whitepapers
Comprehensive documentation13 documentation sections, 7 in common and 6 additionalSame7 documentation sections, 6 in common and 1 additional
CommunityForumSameForum
Sync training1 workshopSameNo
Async training3 product use courses, all freeSameSecurity education platform with 55 courses (subscription-based) and 58 security education courses (subscription-based)
DistributionDirect or with any of its 14 partnersSameDirect or with any of its 545 partners
MarketplacesAWSSameAWS and Azure
FreemiumNoNoNo
Free trial21-day free trialPoV14-day free trial and PoV
DemoYesYesYes
Open demoNoNoNo
PricingContact sales and marketplaceContact salesContact sales and marketplace
Pricing tiers1 plan1 plan3 plans (SAST, DAST, SCA). None transparent
Minimum termMonthlyMonthlyAnnually
Minimum payment periodMonthlyMonthlyAnnually
Minimum capabilitiesASPM, binary SAST, DAST, IaC, SAST, SCA and secretsSame plus: AI SAST, API security testing, PTaaS, RE and SCRASPM, containers, DAST, PTaaS, SAST and SC
Minimum scope1 authorSameNo information available
Pricing driversAuthorsSameAuthors and techniques
Free implementationYesYesNo
Free supportYesYesNo

Service

AttributeEssentialAdvancedVeracode
PTaaSNoYesMPT and PTaaS
Reverse engineeringNoYesYes
Secure code reviewNoYesYes
PivotingNoYesYes
ExploitationNoYesYes
Manual reattacksNot applicableUnlimited reattacks1 reattack
Zero-day vulnerabilitiesNoneContinuous zero-day vulnerability researchContinuous zero-day vulnerability research
SLAAvailabilityAccuracy, availability and responseAvailability
Minimum availability99.95% per minute yearSame99% per month
After-sale guaranteesNoYesNo
AccreditationsCNA and Penetration Testing by CRESTSameDevOps ISV Competency, Security ISV Competency and Penetration Testing by CREST
Pentester certificationsNot applicable202 from 59 different types54 from 25 different types
Type of contractEmployeeSameEmployee
Endpoint controlNoTotalNo information available
Channel controlNoTotalNo information available
StandardsSome requirements from 67 standards, 18 in common and 49 additionalAll requirements from the same standards32 standards, 27 in common and 5 additional
Detection methodAutomated toolsAI, Automated tools and human intelligenceAutomated tools, AI and human intelligence
False positives36.03 times better56.67 times better1.64% F0.5 score per quantity
False negatives64.59 times better185.73 times better0.41% F2.0 score per severity
Remediation5, 3 in common and 2 additionalSame, plus 13, all in common
Output5, 4 in common and 1 additionalSame, plus 25, 4 in common and 1 additional

Product

AttributeEssentialAdvancedVeracode
ASPMYesYesYes
APIGraphQL with JSONSameREST with JSON and XML
IDE5 functionalities, 3 in common and 2 additionalSame, plus 1 functionality4 functionalities, 3 in common and 1 additional
CLIYesYesYes
CI/CDBreaks the buildSameBreaks the build
Vulnerability sources4 sources, 1 in common and 3 additionalSame10 sources, 1 in common and 9 additional
Threat model alignmentYesYesNo
Priority criteriaCVSS v4.0, CVSSF, EPSS and KEVSameCVSS v3.0, EPSS and KEV
Custom prioritizationPriority scoreSameNone
Scanner originIn-houseIn-houseIn-house and external (Grype for Containers and Trivy for IaC and Secrets)
SCA19 package managers, 13 in common and 6 additionalSame19 package managers, 13 in common and 6 additional
AI securityNoYesNo
Reachability12 languagesSameYes. No information available
Reachability typeDeterministicSameNo information available
SBOM22 package managers, 11 in common and 11 additionalSame19 package managers, 11 in common and 8 additional
Malware detectionYesYesYes
Autofix on componentsNoNoNo
Source SAST (languages)12, 11 in common and 1 additionalSame23, 11 in common and 12 additional
Source SAST (frameworks)22, 18 in common and 4 additionalSame69, 18 in common and 41 additional
Custom rulesNoNoSCA
IaC6, 4 in common and 2 additional4, 2 in common and 2 additional6, all in common
Binary SAST1 type of binarySame, plus 2 types of binaries6 types of binaries, 1 in common and 5 additional
DAST7 attack surface types, 2 in common and 5 additionalSame6 attack surface types (only web based), 5 in common and 1 additional
API security testingNo4 types of APIs, 3 in common and 1 additional1 type of API in common
IASTNoNoNo
ASMNoNoNo
Secrets15 secrets types, 5 in common and 10 additionalSame, plus verify other attack vectors and secrets exploitability5 secrets types, all in common
AI4 functions, 1 in common and 3 additionalSame1 function in common
MCPYesYesNo
Open-sourceMPL-2 license, totally equivalent to the paid versionNot applicableNo
Provisioning as codeYesYesNo
DeploymentSaaS (multi-tenant)SameSaaS (no tenancy information)
RegionsUSSameEU and US
StatusYesYesYes
Incidents3 per yearSame 5.25 per year

Integrations

AttributeEssentialAdvancedVeracode
SCM6, 4 in common and 2 additionalSame 4, all in common
Binary repositoriesNoneNoneNone
Ticketing3, all in commonSame 7, 3 in common and 4 additional
ChatOpsNoneNone6
IDE3, 2 in common and 1 additionalSame6, 2 in common and 4 additional
CI/CD21, 10 in common and 11 additionalSame10, all in common
SCANativeSame Native
SASTNativeSame Native
DASTNativeSame Native
IASTNoneNoneNone
SecretsNativeSameNative
RemediationNoneNone1
Bug bountyNoneNoneNone
Vulnerability managementNoneNone6
ComplianceNoneNoneNone

More like Veracode

Tags

apiaspmbinarycomparedastexploitationiacmalwaremptpivotingptaasrereachabilitysastsbomsca

On this page