

Checkmarx One and CodeSonar are widely used in the security software market. CodeSonar takes the lead due to its robust features and effectiveness, making it a preferred choice for users seeking comprehensive analysis.
Features: Checkmarx One integrates seamlessly with other tools, offers competitive pricing, and provides strong customer support. CodeSonar boasts comprehensive analysis, high detection accuracy, and the ability to identify deep-seated vulnerabilities.
Room for Improvement: Checkmarx One needs to enhance speed and performance for larger projects, refine its feature set for detailed analysis, and improve customer service response. CodeSonar could benefit from a more intuitive reporting dashboard, optimize its deployment complexity, and enhance certain user interface aspects.
Ease of Deployment and Customer Service: Checkmarx One is easy to deploy with mixed customer service responsiveness. CodeSonar's deployment is more complex, but reliable support helps facilitate the process and mitigates any difficulties.
Pricing and ROI: Checkmarx One offers cost-effectiveness for tight budgets, providing quick ROI. CodeSonar, though more expensive, justifies its cost with long-term security benefits and substantial risk reduction, delivering value over a longer period.
| Product | Mindshare (%) |
|---|---|
| Checkmarx One | 8.8% |
| CodeSonar | 1.1% |
| Other | 90.1% |


| Company Size | Count |
|---|---|
| Small Business | 32 |
| Midsize Enterprise | 9 |
| Large Enterprise | 46 |
| Company Size | Count |
|---|---|
| Small Business | 5 |
| Midsize Enterprise | 1 |
| Large Enterprise | 2 |
Checkmarx One delivers robust security through seamless integration with SCM and CI/CD tools, ensuring reliable SAST and SCA. Primarily used by organizations for vulnerability detection, it supports cloud and on-premises deployment to enhance secure coding practices.
Checkmarx One provides organizations with comprehensive tools for secure software development, integrating effectively with CI/CD pipelines to scan thousands of applications. Its capabilities extend to identifying vulnerabilities in both code bases and third-party software. Enhancing workflow by supporting SCM solutions, it assists in maintaining secure coding standards and compliance. While excelling in various areas, it requires improvements in scan speed, reduction of false positives, and broader platform integration, particularly for COBOL and Swift. Its pricing model is noted as high, and demand exists for better tutorials and documentation.
What are the key features of Checkmarx One?Industries implement Checkmarx One for secure coding compliance and vulnerability management across varying environments, choosing between cloud and on-premises deployment based on requirements. Its extensive language support and integration with DevSecOps practices make it a popular choice for organizations aiming to enhance software security.
CodeSonar offers a potent tool for static code analysis, adept in detecting runtime errors and security vulnerabilities, with a fast deployment process and scalable capabilities. Its quick analysis and efficient web interface provide a strong basis for code quality validation.
CodeSonar specializes in identifying runtime errors, dead code, and security threats while providing features like code surfing and browsing. It offers a highly efficient web interface, though users find initial setup complex and highlight the need for better static analysis, broader language support beyond C and C++, and an improved licensing model. Despite these challenges, its integration with Jenkins and technical guidance support makes it a reliable choice for teams in defense and software quality assessment. Deployment is quick and easy, yet initial costs are a common concern among users.
What are the key features of CodeSonar?CodeSonar is primarily implemented in industries like defense and companies prioritizing code quality. Teams utilize its static code analysis and threat detection capabilities, integrating with Jenkins for continuous integration workflows. Security checks post-builds and technical support are common, aiding in effective defect management.
We monitor all Application Security Tools reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.