Our company uses the solution to check the vulnerabilities in our products at the build level. We capture, identify potential issues and fixes, and publish reports on a weekly basis.
We work in the banking industry and have a license for 100 users.
Our company uses the solution to check the vulnerabilities in our products at the build level. We capture, identify potential issues and fixes, and publish reports on a weekly basis.
We work in the banking industry and have a license for 100 users.
The report function is the solution's greatest asset. We can configure reports in our build pipeline. We set them to publish scores and consolidate all the pod answers. We go through reports to understand issues and next steps. We get availability of code by clicking on that particular section.
We are able to speed up services because the semi-application is done in the report.
The solution is very easy to navigate.
The solution sometimes reports a false auditable code or false positive. This is not a bug but something within the software's operation that should be addressed.
I have been using the solution for four years.
The stability is rated an eight out of ten.
The solution is scalable and we can use the VCM feature for multiple projects or incidents. Scalability is rated an eight out of ten.
Technical support is very helpful so is rated a seven out of ten.
We did not previously use a different solution.
Our finance team handled the setup so I don't have details.
Our finance team implemented the solution.
I rate the solution a seven out of ten.
When something happens in a test, then you need to know why. In many cases, you would have to run a scan and find all the problems, and then hand that off to development and have development go back and rewrite that code. If you had an issue with a particular aspect where you have a limited amount of personnel or knowledgeable personnel, based on the language that an application was written in, well, then you would need some type of assistance in order to rewrite that code in that particular language, with the limited knowledge that developer might have had. I assisted with that and helped with educating the developer on how to write that code. It was a two-pronged effort.
The number one use case would be a failed PEN test. Number two would be, "Hey, we have a waterfall DEV approach to our SDLC today. We want to become more agile around speed and quality of code." That would be the second. The third would be able to provide an appropriate availability of knowledge for training developers in secure coding.
Being able to have the breadth and depth of different kinds of support for different languages is excellent & many other solutions require you to compile the code prior to the scan, with CxSAST there is no need to compile code for a static analysis. If you didn't support a particular language that an application was written in, whether it was legacy code or a new agile code like Scala, JScript, PLSQL, or whatever, well, then you didn't get the business. If you were an organization that converted its SDLC from waterfall to agile, then you're going to need the ability to support multiple languages, even if they're not part of the company, thanks to that agility, that approach, that methodology. Supporting different languages was a high priority of the client.
The interactive application security testing, or IAST, where code scans are being ran on an application that lives in a runtime environment on a server or virtual machine, needs improvement.
There was limited support from different languages. It didn't support everything under the sun, so you would lose revenue since you didn't have support for Scala or some other language that your developer was fluent in. They needed to improve on language support. That is about it, really.
The dev team did everything that they said they were going to do. If they said they were going to hit a mark, they'd hit a mark. That release would come out. Typically, they would do four major releases a year, quarterly, with two-point releases in between, or based on any additional hotfixes that may be needed. In most cases, however, IAST was the part of the product that needed to be improved the most.
Codebashing is a really cool product from the aspect of teaching developers how to write secure code. However, it would be even cooler if you could not only point out and teach someone how to do it while also making the appropriate recommendation on how to rewrite the code itself, using machine learning or AI. Instead of you, the developer learning how to do it and then writing the code yourself, it'd be cooler if you could push a button, have it analyzed, scans the code, find the code, find the issue within the line of code, and then go ahead and automatically rewrite that code for you. Then, by repetition, it just teaches you through muscle memory how to do that as opposed to, "Hey, you've found this problem. This is where the problem's located, within this particular line of code." Right now, do you know how to rewrite Java? Well, if you're not familiar with how to do that, then go push on this button. Now, take this test and go through this exercise.” It doesn't make a recommendation. It's not like providing a script that fixes the problem. It's just teaching you on how to write the code in that form in that manner.
I’ve used the solution for about two or two and a half years. I worked directly with the company. However, I left about a year or a year and a half ago.
The SAST component was absolutely 100% stable. The SCA product is also very extremely stable. In fact, they leverage each other in a way that it complements the overall use. It gives the user a high-level view, a 10,000-foot view with the ability to see more under a magnifying glass if you think about it from high to low.
The other components, such as IAST and the Codebashing technology, and the developer education technology, it was all integrated with radio buttons and such. I never really had any customer or client, or anyone complains, or ever come to me and say, "Hey, look, the implementation that we completed last week, it's crashed on us," or anything that would show it to be less than stable.
Have there been instances specifically where a new customer came to us and didn't have something turned on? Yes. Is there an instance where a customer might have had something configured wrong based on frequency, scanning frequency, or the depth of how deep they need to scan within the lines of code? Yes. Those were all configuration modifications that were needed. However, it was a misconception thinking that maybe it was unstable, when in fact, just a few things needed to be tweaked.
With the largest installation scanning billions of lines of code each day, there are no known limitations of what the product can do, as long as the appropriate resources are allocated for the specific requirements.
They have a customer success team and a customer success manager, and that's the liaison between the Development Team, Support Team, and the customer. That way, you're not sending an email to a black hole. It's not going to go into a queue where it goes to a black hole of 3,000 or 4,000 emails across the entire world. If that happened, you would have to sit there and wait for some type of response or appropriate time to hear from them. Instead, it goes to someone who's actually assigned to the account as a liaison to bring in the resources needed to help with whatever issue is on hand.
Positive
The deployment depended upon how complex the application was. If it was a very, very complex, customized application, then it would have to be instrumented by a DevOps professional that we provided. If it was a very simplistic or basic vanilla-type framework, as far as the application's concerned, then the customer could do it easily themselves.
There was no need for an integrator, reseller, or consultant. None of that was required or needed, or ever actually even requested. The only reason why any one of a particular stature would actually be part of the process was if they were under contract with that particular corporation or company. Otherwise, the organization provided the appropriate professional services, again, as a benefit to the customer to help ensure their success in using the technology.
Annually, the typical application scanning cost/setup would run anywhere from $75k to 150k, but that was dependent on the specific scanning requirements.
There were no additional operating costs. There was a requirement or a request as a best practice for us to provide the appropriate professional services or implementation services to ensure that the product got off the ground by the time the licenses were purchased.
I’d rate the solution eight out of ten based on ease of use, configuration, customer service, and response time. There are other products out there that are provided as a service where they will go, and you push a button, they collect the data, they review the data, yet there's no specific standard license agreement or SLA that says they're supposed to get back to you within a particular moment of time. Everything that Checkmarx does is instantaneous.
We are currently using the solution for scanning code-level vulnerabilities.
Checkmarx is more developer friendly. Developers are aware of how to use Checkmarx. It's not too complicated, and they can understand what the problem is in their code, and it helps them to write secure code. That's a big thing. It's not an obstacle for developers. They can easily write their code and make it more secure with Checkmarx. That's the main positive point.
A non-developer may struggle with the solution.
Codebashing is the learning platform that comes bundled with Checkmarx. The thing with Codebashing is that they give you tips on how to write secure code. However, I saw other developers complain about this. Instead of telling you what the good practices are, it would be more helpful, when we are writing the code, alongside that code, to have Codebashing tell us where exactly we are going wrong and how to help secure code and if there are specific scenarios we should be considering. Basically, the integration needs to be better.
There's a general lack of space.
Checkmarx has a slightly difficult compilation with the CI/CD pipeline. If it could be easily integrated into the CI/CD pipeline, then it would be much easier for developers rather than being an extra step that developers have to take to make the code secure.
We've used the solution since 2019.
The solution is stable and reliable. There are no bugs or glitches. It doesn't crash or freeze.
In general, it can scale.
There are certain scenarios where scalability becomes an issue. I can't really give any examples, however, while it can scale, there may be hiccups.
We may have up to a few hundred users on the solution.
As far as I'm aware, there is a team at Checkmarx that we can contact and they are there to help us with some basic queries. It's not continuous support. It's more like they're there on the side, and we can contact them as and when required.
Positive
We have used and looked at a mix of options, including Veracode and FOSSA.
Right now, I don't really have a competing vendor in my company, so I can't compare. More importantly, I don't have that much experience with others to compare anything accurately.
I did not handle the initial setup and, therefore, cannot speak to how easy or difficult the process would be.
The licensing is okay. I'd rate it 3.7 out of five. It is moderately priced yet not overly expensive.
Right now, we are partners.
We have the solution deployed in the cloud and on-premises. It's a hybrid setup.
I'd rate the solution seven out of ten.
I'd recommend the product to other users.
Checkmarx is used to check the code from programmers and vulnerabilities in third-party software.
Checkmarx can be deployed on the cloud and on-premise. However, it depends on the version.
Checkmarx detected code sections that did not adhere to best practices. After being informed, the programmers were able to rectify some of the issues. Without Checkmarx, it is unlikely we would have identified these issues.
Utilizing the SCA module, I gained valuable insights into the vulnerabilities present in open-source Python libraries that individuals desire to use. As an information security consultant, I advise against employing Python libraries that contain known vulnerabilities. The SCA solution proved to be helpful in this regard.
The most valuable features of Checkmarx are the SCA module and the code-checking module. Additionally, the solutions are explanatory and helpful.
Checkmarx could improve the solution reports and false positives. The false positives could be reduced. For example, we have alerts that are tagged as vulnerabilities but when you drill down they are not.
In a future release, the SCA module could have better documentation. It was difficult to know how to check the names of all the modules. It took me a lot of time and I needed help to be able to write the requirements file. More clarification would be helpful in the documentation, such as examples.
I have been using Checkmarx for approximately six months.
The stability is great.
I rate the stability of Checkmarx a ten out of ten.
The scalability of the solution is great. Everything I send to the solution is processed quickly.
We have five information security analysts and programmers using this solution.
We plan to increase our usage. We will install it on more networks.
I rate the scalability of Checkmarx a ten out of ten.
I found someone in the evening that logged in and answered my issues. They are responsive.
I rate the support of Checkmarx a ten out of ten.
Positive
We have one person for the maintenance of the solution but it is minimal and is not a full-time job.
I would advise others to ask for a demo of the solution and if it works well for their use case then purchase it.
I rate Checkmarx a nine out of ten.
We use the solution for SAST and DAST testing.
Checkmarx has helped us deliver more secure products. We are able to do static code analysis with the tool before shipping our code to production. When the integration is in the pipeline, this tool gives us early notifications on code fixes.
Checkmarx gives you an overview of all security aspects of the codes and shows what code aspects you need to be looking into.
I would like to see the tool’s pricing improved.
I have been working with the solution for three years. At present, I am using the latest version.
The solution is stable.
The solution is scalable. Around 50 developers in our organization are using it.
The solution was easy to setup since it had proper documentation.
The solution’s deployment was done by in-house members.
We got good ROI with the use of the solution. We have seen returns on PCI and other security aspects.
I would rate the solution’s pricing an eight out of ten. The tool’s pricing is higher than others and it is for the license alone.
I would rate the solution an eight out of ten since it fulfills most of the requirements. I recommend this tool to anyone who is willing to give it a try.
We mainly use this solution for static comprehension testing.
We use it for non-functional insight because it's a security vulnerability scanner. We can use Checkmarx for scanning anytime on our code base. We integrated that as part of our build-a-pipeline, and it helps us detect early. We have piloted in few applications for the shift of testing. From a metric perspective, I am unsure how we benefited from the quantifiable data, but we did benefit.
The administration in Checkmarx is very good. You can create specific teams which give you access to specific projects.
The benefits could be improved. We are a banking company, so we focus on security. We use Checkmarx for multiple applications, and IAST is an interactive application security testing that Checkmarx claims; however, we have not explored it yet.
We want to have a holistic view of the portfolio-level dashboard and not just an individual technical project level. We want an option to group several projects and view them at a business level. Additional features could include a comprehensive dashboard and secret scanning capabilities.
We have been using this solution for four years. It is deployed on-premises.
I rate the stability a six out of ten. We've had some stability issues, which may have been because of how we deployed the solution. When multiple scans are running in multiple applications, it closes down. This also happens where there is a large code base. After it runs for about 35 minutes, it abruptly closes. We have been discussing this issue with the Checkmarx team for it to be fixed.
I rate the scalability a six out of ten, and we have 100 staff engineers using this solution.
Our Checkmarx team interacts with their technical support.
I've used Veracode, and there isn't a big difference between both solutions.
I rate the initial setup a seven out of ten. When we integrated it, we built a pipeline, which was done by a separate DevOps team. Checkmarx is installed at the enterprise level, and we have a Checkmarx Dev team that runs the solution.
I rate this solution an eight out of ten. I would recommend going for a piloting approach. With Checkmarx, you have different presets and can determine the security vulnerability standard. Also, check the stability before proceeding with the adoption.
The best thing about Checkmarx is the amount of vulnerabilities that it can find compared to other free tools.
The statistics module has a function that allows you to show some statistics, but I think it's limited. Maybe it needs more information. There are some cases where you have to go directly to the Checkmarx database to get the information that you want. The default module that provides statistics is basic, and you need more elaborate information to do vulnerability management. The tool has a limited scope.
It is easy to scale, you just have to pay. There are about 100 developers and security people using this solution in my company.
The contract that we have is not directly with Checkmarx. It's with an intermediary company in Argentina, and they give us support. They are not very fast in answering our questions. They have a kind of first level support, but for more technical stuff they go directly to Checkmarx.
As with other tools, if you want more, you have to pay more. You have to pay for additional modules or functionalities. For instance, if you want to do some scanning to external dependencies of the software, you have to buy another tool provided by Checkmarx.
You have to pay for licenses for the number of projects that you want to scan and the number of users. I think you have to pay licenses for three features: the number of users, the projects, and I don't remember the other one.
We have two administrators who coordinate maintenance with the vendor.
My advice is that you need to estimate the right amount of licenses. That's very important because right now, our company needs more licenses, and that was not well estimated at the beginning. The other thing is to be clear about the features of this tool that you want or need.
I would rate this solution as a nine out of ten.
Our main uses of this solution are to ensure our required compliance policies are met, and that we are applying best practice.
This solution helps to remediate the compliance requirements we have.
The product also increases the quality of the code the developers are able to implement.
The main advantage of this solution is its centralized reporting functionality, which lets us track issues, then see and report on the priorities via a web portal.
We would like to be able to run scans from our local system, rather than having to always connect to the product server, which is a longer process.
We have been using this solution for two years.
The stability of this solution depends on the size of application to be scanned, as larger files result in lower performance levels.
This solution is not very easily scalable, and seems to lack the capability to manage a high volume of applications.
The technical support team for this solution are very supportive and skilled. They also define SLA's for their customers.
We found the initial setup of this solution to be okay, but it is very reliant on server capacity.
We would recommend that organizations considering this solution think about the size of the project involved, as this product works best with very small-scale applications.
I would rate this solution a seven out of ten.
