Features and Capabilities
An overview of the Seeker features and capabilities that address the needs of various users who are involved in application security testing.
Speed and Ease of Use
Seeker monitors web application interactions in the background during normal testing without any need to run manual security scans. It can quickly process hundreds of thousands of HTTP(S) requests and deliver immediate results with near-zero false positives.
Seeker provides a rich and intuitive user interface.
Integration with CI/CD and DevOps Processes
As a dynamic security testing tool, Seeker seamlessly integrates into the Software Development Life Cycle (SDLC) processes and blends its functions into various stages of Continuous Integration/Continuous Delivery (CI/CD) workflows.
Seeker can be used with any open-source and 3rd-party testing frameworks and tools including the widely popular Selenium, Apache JMeter™, Micro Focus Quality Center, LoadRunner, ALM, CA, and more.
Vulnerability Detection and Remediation Guidance
A comprehensive collection of information and tools that enable you to explore, analyze, manage, and remediate vulnerabilities detected in your organization's applications.
For more information, see About Vulnerabilities.
Accuracy of Detection
The accuracy of vulnerability detection is empowered by the Seeker's Active Verification mechanism. For background information, see About Active Verification.
Tracking Sensitive Data
Seeker helps protecting sensitive data by applying built-in and/or user-defined rules to determine whether a request contains sensitive parameters and should be checked for related vulnerabilities.
Online Training Platform
Integrated eLearning provides a wealth of online training courses that educate and guide developers how to handle and remediate vulnerabilities detected in their code.
Integrated Software Composition Analysis
Black Duck® Binary Analysis is a Black Duck Software Composition Analysis (SCA) tool that is integrated with Seeker to detect known security vulnerabilities in third-party components included in applications.
It is possible to use BDBA as a cloud appliance, on-premise appliance dedicated to Seeker, or on-premise shared appliance.
Compliance with Security Standards
For each analyzed application, Seeker provides a wide up-to-date overview and in-depth analysis of the application's compliance with the major security standards, such as OWASP Top 10 2021, 2017, 2013; OWASP Top 10 API Security Risks 2023, 2019; PCI-DSS v3.2, CWE/SANS 2011, GDPR, CAPEC.
Exporting Vulnerability Information
In addition to displaying detected vulnerabilities in various contexts, Seeker enables you to export this information in different formats, such as plain machine-readable CSV, JSON, and XML, as well as detailed PDF reports.
Supported Languages and Frameworks
Seeker currently supports applications written in the major programming languages such as Java®, .NET, and Node.js running on-premise and on cloud Azure, AWS, and GCP platforms.
For the full list of supported languages, platforms, frameworks, and technologies see Agent Technical Specification.