• HOME
  • CATEGORIES

    • CATEGORIES

    • Browse All Categories
  • FOR VENDORS

    • FOR VENDORS

    • Log In to Vendor Portal
    • Get Started
  • REVIEWS

    • REVIEWS

    • Write a Review
    • Product Reviews
    • Vendor Directory
    • Product Comparisons
  • GARTNER PEER COMMUNITY™
  • GARTNER.COM
  • Community GuidelinesListing GuidelinesBrowse VendorsRules of EngagementFAQPrivacyTerms of Service
    ©2026 Gartner, Inc. and/or its affiliates.
    All rights reserved.
  • Categories

    • Loading categories...

      Browse All Categories

      Loading markets...

  • For Vendors

    • Log In to Vendor Portal 

    • Get Started 

  • Write a Review

Join / Sign In
  1. Home
  2. /
  3. Fluid Attacks Continuous Hacking
Logo of Fluid Attacks Continuous Hacking

Fluid Attacks Continuous Hacking

byFluid Attacks
in
4.7

Overview

Product Information on Fluid Attacks Continuous Hacking

Updated 19th January 2026

What is Fluid Attacks Continuous Hacking?

Implement Fluid Attacks' comprehensive, AI-powered solution into your SDLC and develop secure software without delays. As an all-in-one solution, Fluid Attacks accurately finds and helps you remediate vulnerabilities throughout the SDLC and ensures secure software development. The solution integrates its AI, automated tool, and team of pentesters to perform SAST, SCA, DAST, SCR, PtaaS and RE to help you improve your security posture. This way, Fluid Attacks delivers accurate knowledge of the security status of your application. This means security goes alongside innovation without hindering your speed. Fluid Attacks provides you with expert knowledge about vulnerabilities and support options that enable you to remediate the security issues in your application.

Fluid Attacks Continuous Hacking Pricing

Essential Plan: This option is designed for teams seeking fast insights into risk exposure through Fluid Attacks' scanning tool. It includes vulnerability scanning, with pricing based on the number of apps tested. Advanced Plan: This plan is intended for teams focused on speed and accuracy in identifying risk. It features vulnerability scanning, AI, and expert intelligence. Pricing is determined by the number of apps and the number of authors contributing code to the repository.

Fluid Attacks Continuous Hacking Product Images

Vulnerability view
Vulnerability view
Analytics view
Analytics view
Remediation
Remediation

Overall experience with Fluid Attacks Continuous Hacking

Chief Information Officer
<50M USD, Software
FAVORABLE

“Strong security partner with excellent support; UI have room to improve”

5.0
Feb 9, 2026
Our experience with Fluid Attacks has been largely positive. The platform has effectively helped us identify real programmatic security issues and open vulnerabilities that have improved our overall security posture. The support team has been a strong partner during infrastructure changes and product evolution The API can be slower at times (typically 5-7 seconds per response) and the MCP server output can sometimes be too extensive, requiring iteration and more precise questions to extract value, but once it is done, it becomes a fundamentally useful tool in our workflow. Overall, the benefits of the platform have clearly outweighed these limitations
IT Security & Risk Management Associate
500M - 1B USD, Banking
CRITICAL

“Platform Offers Clear Information Layout but Lacks Real-Time Control Monitoring”

3.0
Nov 25, 2025
This is my first time using this tool. Actually I'm ending my first month using it.

About Company

Company Description

Updated 12th May 2025

Fluid Attacks helps companies to develop secure software without delays. We are an all-in-one solution that helps you accurately find and remediate vulnerabilities throughout the SDLC. Our solution combines automation, AI and pentesters to perform SAST, DAST, SCA, CSPM, SCR, PTaaS and RE. This way, we provide you with accurate knowledge of the security status of your application. We enable your DevSecOps implementation. This means security goes alongside innovation without hindering your speed. Fluid Attacks provides you with expert knowledge about vulnerabilities and support options that enable you to remediate the security issues in your application.

Company Details

Updated 12th May 2025
Year Founded
2001
Head office location
San Francisco, United States
Number of employees
51 - 200
Website
https://fluidattacks.com

Do You Manage Peer Insights at Fluid Attacks?

Access Vendor Portal to update and manage your profile.

Key Insights

A Snapshot of What Matters - Based on Validated User Reviews

User Sentiment About Fluid Attacks Continuous Hacking
Reviewer Insights for: Fluid Attacks Continuous Hacking
Deciding Factors: Fluid Attacks Continuous Hacking Vs. Market Average
Performance of Fluid Attacks Continuous Hacking Across Market Features

Fluid Attacks Continuous Hacking Likes & Dislikes

Like

1 High-quality vulnerability detection: Accurate findings with low noise and clear remediation value 2. Exceptional technical support: Responsive and proactive assistance 3. Strong multi-repository coverage, Works well across our distributed codebase,

Like

the distribution of the information on the platform.

Like

What i like most about the Fluid Attacks Continuous Hacking service is its proactive and continuous approach to security. Instead of performing occasional penetration tests, it provides constant ethical hacking by real experts, helping organizations identify and fix vulnerabilities as they arise.

Dislike

Outdated user interface: it feels somewhat legacy; it is usable and functional once understood, but it could benefit from a more modern UX

Dislike

I can't see which controls are performing in a specific moment.

Dislike

What i dislike most is the initial complexity and the potential overload of vulnerabilities for less mature teams

Top Fluid Attacks Continuous Hacking Alternatives

Logo of Veracode
1. Veracode
4.6
(401 Ratings)
Logo of Checkmarx SAST
2. Checkmarx SAST
4.6
(398 Ratings)
Logo of Appknox
3. Appknox
4.8
(246 Ratings)
View All Alternatives

Peer Discussions

Fluid Attacks Continuous Hacking Reviews and Ratings

Showing data for 208 ratings and reviews for Application Security Testing market. View all 208 ratings and reviews across markets for a complete picture.

4.7

(208 Ratings)

Rating Distribution

5 Star
75%
4 Star
22%
3 Star
2%
2 Star
0%
1 Star
0%
Why ratings and reviews count differ?

Customer Experience

Evaluation & Contracting

4.6

Integration & Deployment

4.7

Service & Support

4.8

Product Capabilities

4.6

Filter Reviews
Sort By:
Most helpful
Last 12 Months
Star Rating
Reviewer Type
Reviewer's Company Size
Reviewer's Industry
Reviewer's Region
Reviewer's Job Function
  • Chief Information Officer
    <50M USD
    Software
    Review Source

    Strong security partner with excellent support; UI have room to improve

    5.0
    Feb 9, 2026
    Our experience with Fluid Attacks has been largely positive. The platform has effectively helped us identify real programmatic security issues and open vulnerabilities that have improved our overall security posture. The support team has been a strong partner during infrastructure changes and product evolution The API can be slower at times (typically 5-7 seconds per response) and the MCP server output can sometimes be too extensive, requiring iteration and more precise questions to extract value, but once it is done, it becomes a fundamentally useful tool in our workflow. Overall, the benefits of the platform have clearly outweighed these limitations
  • Finance Manager
    50M-1B USD
    Banking
    Review Source

    Continuous proactive hacking that transform security from reactive to strategic, ideal for teams ready to embrace DevSecOps

    5.0
    Oct 9, 2025
    My overall experience with the Fluid Attacks Continuous Hacking approach has been highly positive. Their team provides consistent and thorough vulnerability assessments, allowing us to address security issues in real time. Unlike traditional penetration tests, this continuous model offers more value by adapting to changes in our environment and codebase. Detailed reporting, clear communication, and integration with our development workflow have significantly improved our security posture
  • MANAGER OF IT SERVICES
    50M-1B USD
    Banking
    Review Source

    Improved Security Through Powerful Integration With High Cost And Setup Hurdles

    5.0
    Sep 11, 2025
    Our organization has had a productive experience using Fluid Attacks Continuous Hacking. The plattorm provides a strong combination of automated tools and manual pentesting that continuously identify cyber security risks across the software development lifecycle. In this form have helped us meaningfully improve our security.
  • Cybersecurity Coordinator
    1B-10B USD
    Transportation
    Review Source

    Remediation Strategies Made Easier Through Fluids Developer-Hacker Communication Tool

    5.0
    Sep 8, 2025
    Fluid is truly a game changer, as we are no longer the showstoppers in production releases.
  • Software Developer
    <50M USD
    Software
    Review Source

    Simplicity of Use and DevSecOps Integration Highlighted in Product Experience

    4.0
    Oct 28, 2025
    I have not found any substancial issues with the product. I believe that once when one gets the gist of it, vulnerability detection can be performed without effort.
...
Showing Result 1-5 of 210

Recommended Gartner Research

  • Critical Capabilities for Application Security Testing
  • Magic Quadrant for Application Security Testing

Gartner Peer Insights content consists of the opinions of individual end users based on their own experiences, and should not be construed as statements of fact, nor do they represent the views of Gartner or its affiliates. Gartner does not endorse any vendor, product or service depicted in this content nor makes any warranties, expressed or implied, with respect to this content, about its accuracy or completeness, including any warranties of merchantability or fitness for a particular purpose.

This site is protected by hCaptcha and its Privacy Policy and Terms of Use apply.


Software reviews and ratings for EMMS, BI, CRM, MDM, analytics, security and other platforms - Peer Insights by Gartner
Community GuidelinesListing GuidelinesBrowse VendorsRules of EngagementFAQsPrivacyTerms of Use

©2026 Gartner, Inc. and/or its affiliates.

All rights reserved.