Try our new research platform with insights from 80,000+ expert users

Checkmarx One vs The NodeZero Platform by Horizon3.ai comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Feb 8, 2026

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Checkmarx One
Ranking in Vulnerability Management
17th
Ranking in Risk-Based Vulnerability Management
7th
Average Rating
7.8
Reviews Sentiment
6.6
Number of Reviews
81
Ranking in other categories
Application Security Tools (2nd), Static Application Security Testing (SAST) (3rd), Container Security (15th), Static Code Analysis (2nd), API Security (3rd), Dynamic Application Security Testing (DAST) (2nd), DevSecOps (2nd), Application Security Posture Management (ASPM) (3rd), AI Security (2nd)
The NodeZero Platform by Ho...
Ranking in Vulnerability Management
11th
Ranking in Risk-Based Vulnerability Management
5th
Average Rating
9.0
Reviews Sentiment
5.7
Number of Reviews
11
Ranking in other categories
Advanced Threat Protection (ATP) (12th), Penetration Testing Services (1st), Breach and Attack Simulation (BAS) (1st)
 

Mindshare comparison

As of February 2026, in the Vulnerability Management category, the mindshare of Checkmarx One is 1.3%, up from 1.0% compared to the previous year. The mindshare of The NodeZero Platform by Horizon3.ai is 1.5%, up from 0.9% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Vulnerability Management Market Share Distribution
ProductMarket Share (%)
The NodeZero Platform by Horizon3.ai1.5%
Checkmarx One1.3%
Other97.2%
Vulnerability Management
 

Featured Reviews

Shahzad Shahzad - PeerSpot reviewer
Senior Solution Architect | L3+ Systems & Cloud Engineer | SRE Specialist at Canada Cloud Solution
Enable secure development workflows while identifying opportunities for faster scans and improved AI guidance
Checkmarx One is a very strong platform, but there are several areas where it can improve to support modern DevSecOps workflows even better. For example, better real-time developer guidance is needed. The IDE plugin should offer richer AI-powered auto-fixes similar to SNYK Code or GitHub Copilot Security, as current guidance is good but not deeply contextual for large-scale enterprise codebases. This matters because it reduces developer friction and accelerates shift-left adoption. More transparency control over the correlation engines is another need. The correlation engine is powerful but not fully transparent. Users want to understand why vulnerabilities were correlated or de-prioritized, which helps AppSec teams trust the prioritization logic. Faster SAST scan and more language coverage is needed since SAST scan can still be slow for very large mono-repos and there is limited deep support for new language frameworks like Rust and Go, along with advanced coverage for serverless-specific frameworks. This matters because large organizations want sub-minute scans in CI/CD as cloud-native ecosystems evolve fast. A strong API security module is another area for enhancement. API security scanning could be improved with active testing, API discovery, full Swagger, OpenAPI, drift detection, and schema-based fuzzing. This is important as API attacks are one of the biggest AppSec risks in 2025. Checkmarx One is strong, but I see a few areas for improvement including faster SAST scanning for large mono-repos, deeper language framework support, more transparent correlation logic, and stronger API security that includes discovery and runtime context. The IDE plugin could offer more AI-assisted fixes, and the SBOM lifecycle tracking can evolve further. Enhancing integration with SIEM and SOAR would also make enterprise adoption smoother, and these improvements would help developers and AppSec teams move faster with more accuracy.
SH
Chief Information Officer at a construction company with 1,001-5,000 employees
Has unified our IT teams by providing clear visibility into network vulnerabilities and accelerated remediation with real-world attack testing
One of the things that we've shared with Horizon is just the reporting. They've made a lot of changes over time, but when examining computers, most average normal people don't look at a computer and identify it as 114.82.117.180. They identify it as 'the printer for accounting.' When many of the reports give the very detailed technical IP address or serial number, that's really not helpful for anyone other than the person, the hands-on person that's trying to remediate it. All the managers, all the leaders, having information in that format isn't helpful. Being able to have information about what those devices are would be very helpful. There's a technical reason they can't just have an easy button because some people have really complicated networks. When examining things for the average company, the average executive, that 114 number, there's only one of those. But if examining an AT&T or a Walmart, it isn't unique. They haven't solved that problem. But for the 90% of companies, being able to have just a human readable name for all devices on your network in all of the reports all of the time would be the most beneficial.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"The most valuable feature for me is the Jenkins Plugin."
"The product's most valuable feature is static code and supply chain effect analysis. It provides a lot of visibility."
"The process of remediating software security vulnerabilities can now be performed (ongoing) as portions of the application are being built in advance of being compiled."
"The most valuable features of Checkmarx are difficult to pinpoint because of the way the functionalities and the features are intertwined, it's difficult to say which part of them I prefer most. You initiate the scan, you have a scan, you have the review set, and reporting, they all work together as one whole process. It's not like accounting software, where you have the different features, et cetera."
"Compared to the solutions we used previously, Checkmarx has reduced our workload by almost 75%."
"Apart from software scanning, software composition scanning is valuable."
"The UI is user-friendly."
"I have seen a return on investment from Checkmarx One."
"The NodeZero Platform's real attack capabilities help identify vulnerabilities on my on-premise systems by adding an element of validation and offensive security testing on top of known vulnerabilities. The feature that allows security teams to fix and retest vulnerabilities instantly is very useful, even though it may not happen literally 'instantly.' It's a necessary tool for any organization to understand whether vulnerabilities are genuinely exploitable by attackers. With its near-real-time testing capabilities, it's an essential part of any security portfolio."
"Honestly, it's one of the most transformational technologies we've implemented in our company."
"We experienced a threat that could have severely crippled us, but we were able to shut it down before it escalated, thanks to internal vulnerability testing and addressing critical vulnerabilities using their tool."
"The NodeZero Platform's real attack capabilities help in identifying vulnerabilities on our on-prem systems because it provides actual vulnerabilities by attacking our systems."
"My favorite feature about The NodeZero Platform is that it's autonomous, and it truly delivers on that promise—it can be set and forgotten while it performs its tasks, and it does exactly what it claims to do."
"After the third party conducts the pen test, The NodeZero Platform is run, and it finds the same things they found and sometimes a few other things that they did not even identify."
"Overall, I'd rate NodeZero at nine to 9.5 out of ten."
"Penetration testing and scans are useful features."
 

Cons

"It provides us with quite a handful of false positive issues. If Checkmarx could reduce this number, it would be a great tool to use."
"There is nothing particular that I don't like in this solution. It can have more integrations, but the integrations that we would like are in the roadmap anyway, and they just need to deliver the roadmap. What I like about the roadmap is that it is going where it needs to go. If I were to look at the roadmap, there is nothing that is jumping out there that says to me, "Yeah. I'd like something else on the roadmap." What they're looking to deliver is what I would expect and forecast them to deliver."
"The statistics module has a function that allows you to show some statistics, but I think it's limited. Maybe it needs more information."
"We want to have a holistic view of the portfolio-level dashboard and not just an individual technical project level."
"Some were valid and some were not applicable for us based on the scenario."
"Checkmarx needs to be more scalable for large enterprise companies."
"Checkmarx could improve the solution reports and false positives. The false positives could be reduced. For example, we have alerts that are tagged as vulnerabilities but when you drill down they are not."
"I would like the product to include more debugging and developed tools. It needs to also add enhancements on the coding side."
"You need to be cautious about what it scans, as it could potentially cause issues."
"The speed of the scans takes some time, but in my opinion, it is not surprising for what it is doing."
"The areas for improvement for The NodeZero Platform involve integration and automation. It would be beneficial if it could integrate directly with vulnerability management tools that would allow the platform to automatically import data, identify vulnerable systems, and test targets immediately, potentially even enabling automated feedback loops for rescanning since the process is currently manual."
"They've added a chatbot which isn't particularly useful, but when it can't answer questions, it forwards messages to human support."
"The only issue we’ve encountered is that sometimes the scans take a long time to complete."
"I encountered challenges with patch management, as we struggled to test and implement patches due to time constraints. This led to our patch management process being ineffective."
"One of the areas where improvement is needed is in the visibility and reporting for large enterprises."
"I think The NodeZero Platform could improve by leveraging GPUs for password cracking, which would be pretty good."
 

Pricing and Cost Advice

"I would rate the solution’s pricing an eight out of ten. The tool’s pricing is higher than others and it is for the license alone."
"We're using a commercial version of Checkmarx, and we paid for the solution for one year. The price is high and could be reduced."
"It's relatively expensive."
"It is the right price for quality delivery."
"Its price is fair. It is in or around the right spot. Ultimately, if the price is wrong, customers won't commit, but they do tend to commit. It is neither too cheap nor too expensive."
"For around 250 users or committers, the cost is approximately $500,000."
"The average deal size was usually anywhere between $120K to $175K on an annual basis, which could be divided across 12 months."
"The solution is costly."
Information not available
report
Use our free recommendation engine to learn which Vulnerability Management solutions are best for your needs.
881,733 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Financial Services Firm
18%
Computer Software Company
10%
Manufacturing Company
10%
Government
5%
Computer Software Company
9%
Manufacturing Company
8%
Comms Service Provider
8%
Government
8%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business32
Midsize Enterprise9
Large Enterprise46
By reviewers
Company SizeCount
Small Business6
Midsize Enterprise1
Large Enterprise4
 

Questions from the Community

What alternatives are there for Fortify WebInspect and Fortify SCA?
I would like to recommend Checkmarx. With Checkmarx, you are able to have an all in one solution for SAST and SCA as well. Veracode is only a cloud solution. Hope this helps.
What do you like most about Checkmarx?
Compared to the solutions we used previously, Checkmarx has reduced our workload by almost 75%.
What is your experience regarding pricing and costs for Checkmarx?
Checkmarx One is a premium solution, so budget accordingly. Make sure you understand how licensing scales with additional applications and users. I advise negotiating multi-year contracts or bundle...
What do you like most about Horizon3.ai?
Penetration testing and scans are useful features.
What needs improvement with Horizon3.ai?
I think The NodeZero Platform could improve by leveraging GPUs for password cracking, which would be pretty good.
What is your primary use case for Horizon3.ai?
We use The NodeZero Platform for control validation and we are also looking for the likelihood of vulnerabilities.
 

Also Known As

No data available
Horizon3.ai
 

Overview

 

Sample Customers

YIT, Salesforce, Coca-Cola, SAP, U.S. Army, Liveperson, Playtech Case Study: Liveperson Implements Innovative Secure SDLC
Government agencies, Defense Industrial Base organizations, and enterprises in regulated industries such as finance, healthcare, manufacturing, and criticalinfrastructure rely on NodeZero to meet rigorous security and compliance requirements with continuous, scheduled, and on-demand testing.
Find out what your peers are saying about Checkmarx One vs. The NodeZero Platform by Horizon3.ai and other solutions. Updated: January 2026.
881,733 professionals have used our research since 2012.