Best Software for 2025 is now live!
Show rating breakdown
Save to My Lists
Claimed
Claimed

Top Rated Seeker Alternatives

Seeker Reviews & Product Details

Seeker Overview

What is Seeker?

Accurate, automated security testing for your web applications. The industrys first IAST solution with active verification and sensitive-data tracking for web-based applications.

Seeker Details
Discussions
Seeker Community
Show LessShow More
Product Description

Accurate, automated security testing for your web applications. The industrys first IAST solution with active verification and sensitive-data tracking for web-based applications.


Seller Details
Seller
Synopsys
Year Founded
1986
HQ Location
Mountain View, CA
Twitter
@synopsys
22,849 Twitter followers
LinkedIn® Page
www.linkedin.com
19,499 employees on LinkedIn®
Ownership
NASDAQ:SNPS
Total Revenue (USD mm)
$3,685
Description

Synopsys helps customers innovate from Silicon to Software, so they can deliver Smart, Secure Everything


JE
Overview Provided by:

Recent Seeker Reviews

Verified User
C
Verified UserSmall-Business (50 or fewer emp.)
4.5 out of 5
"Seeker for IAST"
It's a very powerful and accurate IAST tool, which give less FP.
Shriram B.
SB
Shriram B.Mid-Market (51-1000 emp.)
5.0 out of 5
"Best Product In Market"
Best Available product in the category. Make our work easy and solve our problem.
Security Badge
This seller hasn't added their security information yet. Let them know that you'd like them to add it.
0 people requested security information

Seeker Media

Answer a few questions to help the Seeker community
Have you used Seeker before?
Yes

2 Seeker Reviews

4.8 out of 5
The next elements are filters and will change the displayed results once they are selected.
Search reviews
Hide FiltersMore Filters
The next elements are filters and will change the displayed results once they are selected.
The next elements are filters and will change the displayed results once they are selected.
2 Seeker Reviews
4.8 out of 5
2 Seeker Reviews
4.8 out of 5
G2 reviews are authentic and verified.
Verified User in Consulting
CC
Small-Business(50 or fewer emp.)
More Options
Validated Reviewer
Verified Current User
Review source: G2 invite
Incentivized Review
What do you like best about Seeker?

It's a very powerful and accurate IAST tool, which give less FP. Review collected by and hosted on G2.com.

What do you dislike about Seeker?

Agent installation for multiple technology Review collected by and hosted on G2.com.

What problems is Seeker solving and how is that benefiting you?

Seeker, helps in identifying vulnerabilities in web application. Review collected by and hosted on G2.com.

Shriram B.
SB
Sr. Software Engineer
Mid-Market(51-1000 emp.)
More Options
Validated Reviewer
Review source: G2 invite
Incentivized Review
(Original )Information
What do you like best about Seeker?

Best Available product in the category. Make our work easy and solve our problem. Review collected by and hosted on G2.com.

What do you dislike about Seeker?

There is nothing so far that we don't like about the product. Review collected by and hosted on G2.com.

What problems is Seeker solving and how is that benefiting you?

For Our internal application security testing. Review collected by and hosted on G2.com.

There are not enough reviews of Seeker for G2 to provide buying insight. Below are some alternatives with more reviews:

1
HCL AppScan Logo
HCL AppScan
4.1
(76)
HCL AppScan help minimize web application attacks and expensive data breaches by automating testing of application security vulnerabilities. It allows you to test applications before deploying them and assess risk in production environments on an ongoing basis.
2
Invicti (formerly Netsparker) Logo
Invicti (formerly Netsparker)
4.6
(59)
Invicti (formerly Netsparker) is an automatic and easy-to-use web application security scanner to automatically find security flaws in websites, web applications and web services.
3
Contrast Security Logo
Contrast Security
4.5
(49)
Is a production app and API protection blocking attacks and reducing false positives, that helps developer and security teams prioritize vulnerability backlogs
4
Checkmarx Logo
Checkmarx
4.2
(35)
Identify software security vulnerabilities & fix them
5
Akto Logo
Akto
4.5
(41)
Akto is the Modern API Security platform for Application Security and Product Security Teams to build an enterprise-grade API security program throughout their DevSecOps pipeline.
6
OpenText Fortify On Demand Logo
OpenText Fortify On Demand
4.1
(35)
Software security solutions from Micro Focus Fortify cover your entire software development lifecycle (SDLC) for mobile, third party and website security.
7
GuardRails Logo
GuardRails
4.3
(29)
GuardRails empowers developers to find, fix, and prevent security vulnerabilities in their web and mobile applications.
8
Semgrep Logo
Semgrep
4.6
(31)
Find bugs, run security scans in CI, and enforce security standards across your organization. Scale your security team. Actionable, low-noise, and developer-friendly results let you scale your security and ship with high velocity. Enable developers to be more productive. Reduce friction between security engineers and developers by finding and sharing vulnerabilities in your code and in open source dependencies. Easily write custom rules. Easily write rules to find bugs specific to your organization — rules look like source code, so there’s no need to learn a new proprietary language.
9
NowSecure Logo
NowSecure
4.6
(27)
NowSecure Inc., based in Oak Park, Illinois, was formed in 2009 with a mission to advance mobile security worldwide. We help secure mobile devices, enterprises and mobile apps.
10
Veracode Application Security Platform Logo
Veracode Application Security Platform
3.7
(24)
Veracode is the world's best automated, on-demand application security testing and code review solution.
Show More