Join the 1500 companies using G2 Track to manage SaaS spend, usage, contracts & compliance.

Peach Fuzzer

3.0
(2)

Peach Fuzzer is an automated security testing platform that prevents zero-day attacks by findng vulnerabilities in hardware and software systems.

Work for Peach Fuzzer?

Learning about Peach Fuzzer?

We can help you find the solution that fits you best.

Peach Fuzzer Reviews

Chat with a G2 Advisor
Write a Review
Filter Reviews
Filter Reviews
  • Ratings
  • Company Size
  • User Role
  • For Category
  • Industry
Ratings
Company Size
User Role
For Category
Industry
Showing 2 Peach Fuzzer reviews
LinkedIn Connections
Peach Fuzzer review by Cassi G.
Cassi G.
Validated Reviewer
Review Source
content

"Few kinks to work thru"

What do you like best?

I love the effectiveness and speed of ability to use.

What do you dislike?

I dislike the user interface

I believe it needs some improvement .

What business problems are you solving with the product? What benefits have you realized?

Peach buzzer gets to the four of the.problems you can go through running daily interface.

Sign in to G2 to see what your connections have to say about Peach Fuzzer
Peach Fuzzer review by User in Computer Software
User in Computer Software
Validated Reviewer
Review Source
content

"Does what it needs to do"

What do you like best?

It has cooperate support versus other products that are open source. Additionally peach fuzz has been around for much more time so it has less bugs than its competitors.

What do you dislike?

It's not open source, so you can't make any changes to meet your needs. Also it uses xml which is outdated..

What business problems are you solving with the product? What benefits have you realized?

We use peach fuzzer to monitor code that is written for security risks. And it does its job

What Dynamic Application Security Testing (DAST) solution do you use?

Thanks for letting us know!

There are not enough reviews of Peach Fuzzer for G2 to provide buying insight. Below are some alternatives with more reviews:

1
Micro Focus Fortify Logo
Micro Focus Fortify
3.8
(18)
Software security solutions from Micro Focus Fortify cover your entire software development lifecycle (SDLC) for mobile, third party and website security.
2
WhiteSource Software Logo
WhiteSource Software
4.0
(17)
Open Source license and security management software
3
IBM Security AppScan Standard Logo
IBM Security AppScan Standard
3.6
(15)
IBM Security AppScan Standard can help minimize web application attacks and expensive data breaches by automating testing of application security vulnerabilities. It allows you to test applications before deploying them and assess risk in production environments on an ongoing basis.
4
Snyk Logo
Snyk
4.6
(4)
Snyk is a security solution designed to find and fix vulnerabilities in Node.js and Ruby apps.
5
InsightAppSec Logo
InsightAppSec
3.5
(1)
Application security testing for the modern web
6
Micro Focus Fortify WebInspect Logo
Micro Focus Fortify WebInspect
4.5
(1)
WebInspect offers automated dynamic application security testing (DAST) and interactive application security testing (IAST) technologies that mimics real-world hacking techniques and attacks, provides comprehensive dynamic analysis of complex web applications and services, and crawls more of the attack surface to exposes exploits.
7
Virtual Forge Security Suite Logo
Virtual Forge Security Suite
(0)
Using the Virtual Forge Security Suite, customers will improve their security and compliance by automating tasks involved in securing their SAP systems.
8
CA Veracode Vendor Application Security Testing Logo
CA Veracode Vendor Application Security Testing
(0)
CA Veracode Vendor Application Security Testing (VAST) provides a scalable program for managing third-party software risk. Build your program based on a decade’s worth of best practices to ensure success and see a simple pass or fail for each vendor application. Because CA Veracode scans binaries rather than source code, vendors will be more comfortable with the assessments because they don't have to disclose their intellectual property. With CA Veracode, you can scale your program without adding specialized headcount and manage the entire program on a single platform
9
SD Elements Logo
SD Elements
(0)
SD Elements automates software security requirements based on each project's technology, business and compliance drivers.
10
Code Dx Logo
Code Dx
(0)
Code Dx’s automated application vulnerability correlation shaves weeks off that process so you can get right to fixing your code. Its vulnerability management lets you quickly prioritize vulnerabilities (to fix the most important ones first), track progress of their remediation, and observe how your code's security changes over time.
Show more
Kate from G2

Learning about Peach Fuzzer?

I can help.
* We monitor all Peach Fuzzer reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. Validated reviews require the user to submit a screenshot of the product containing their user ID, in order to verify a user is an actual user of the product.