Try our new research platform with insights from 80,000+ expert users

Checkmarx One vs IBM Guardium Vulnerability Assessment comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Oct 9, 2024
 

Categories and Ranking

Checkmarx One
Ranking in Vulnerability Management
20th
Average Rating
7.6
Reviews Sentiment
6.9
Number of Reviews
71
Ranking in other categories
Application Security Tools (3rd), Static Application Security Testing (SAST) (3rd), Static Code Analysis (2nd), API Security (2nd), DevSecOps (2nd), Risk-Based Vulnerability Management (6th)
IBM Guardium Vulnerability ...
Ranking in Vulnerability Management
51st
Average Rating
6.6
Number of Reviews
3
Ranking in other categories
No ranking in other categories
 

Featured Reviews

Rohit Kesharwani - PeerSpot reviewer
Provides good security analysis and security identification within the source code
We integrate Checkmarx into our software development cycle using GitLab's CI/CD pipeline. Checkmark has been the most helpful for us in the development stage. The solution's incremental scanning feature has impacted our development speed. The solution's vulnerability detection is around 80% to 90% accurate. I would recommend Checkmarx to other users because it is one of the good tools for doing security analysis and security identification within the source code. Overall, I rate Checkmarx a nine out of ten.
reviewer1714710 - PeerSpot reviewer
Worthwhile from the regulatory requirements and analytics perspective, but is expensive and not easy to use
We are a full security base integration and application business. We help with implementation and deployments. I used Guardium to help with a cloud migration to check and do some validation for a client's data landscape and services so that they made sure that they were all secure in overall…

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"The most valuable features of Checkmarx are its integration with multiple SCM solutions and CICD tools, its ability to scale according to user licenses, and the quick scanning process."
"It is very useful because it fits our requirements. It is also easy to use. It is not complex, and we are satisfied with the results."
"Overall, the ability to find vulnerabilities in the code is better than the tool that we were using before."
"The setup is very easy. There is a lot of information in the documents which makes the install not difficult at all."
"It shows in-depth code of where actual vulnerabilities are."
"One of the most valuable features is it is flexible."
"I rate the overall solution ten out of ten."
"It allows for SAST scanning of uncompiled code. Further, it natively integrates with all key repos formats (Git, TFS, SVN, Perforce, etc)."
"The reporting features are good and there are many built-in reports that can be quickly configured."
"It helped with some of the regulatory requirements. It also helped with some of the security analytics and analysis. It was worthwhile from that perspective."
"The most valuable feature is that it provides a simple English recommendation on actions that you need to take once a vulnerability is discovered."
 

Cons

"It provides us with quite a handful of false positive issues. If Checkmarx could reduce this number, it would be a great tool to use."
"The solution sometimes reports a false auditable code or false positive."
"I would like the product to include more debugging and developed tools. It needs to also add enhancements on the coding side."
"C, C++, VB and T-SQL are not supported by this product. Although, C and C++ were advertised as being supported."
"When we first ran it on a big project, there wasn't enough memory on the computer. It originally ran with eight gigabytes, and now it runs with 32. The software stopped at some point, and while I don't think it said it ran out of memory, it just said "stopped" and something else. We had to go to the logs and send them to the integrator, and eventually, they found a memory issue in the logs and recommended increasing the memory. We doubled it once, and it didn't seem enough. We doubled it again, and it helped."
"There is nothing particular that I don't like in this solution. It can have more integrations, but the integrations that we would like are in the roadmap anyway, and they just need to deliver the roadmap. What I like about the roadmap is that it is going where it needs to go. If I were to look at the roadmap, there is nothing that is jumping out there that says to me, "Yeah. I'd like something else on the roadmap." What they're looking to deliver is what I would expect and forecast them to deliver."
"Meta data is always needed."
"The Dynamic Application Security Testing (DAST) feature should be better."
"It was not as easy to use. The user-friendliness of it was somewhat lower than what I was expecting. It was also lacking in terms of the ease of the setup. There should be an automatic agent for deployment."
"Building policies is not that easy. There are some things that are turned off by default, for example, displaying values."
"The interface could be improved by having sub-groups of tests, ultimately making the process of collecting tests faster."
 

Pricing and Cost Advice

"For around 250 users or committers, the cost is approximately $500,000."
"This solution is expensive. The customized package allows you to buy additional users at any time."
"The pricing is competitive and provides a lower TCO (total cost of ownership) for achieving application security."
"The average deal size was usually anywhere between $120K to $175K on an annual basis, which could be divided across 12 months."
"Before implementing the product I would evaluate if it is really necessary to scan so many different languages and frameworks. If not, I think there must be a cheaper solution for scanning Java-only applications (which are 90% of our applications)."
"We have purchased an annual license to use this solution. The price is reasonable."
"I believe pricing is better compared to other commercial tools."
"It is not expensive, but sometimes, their pricing model or licensing model is not very clear. There are similar variables, such as projects or developers, and sometimes, it is a little bit confusing."
"One thing not advantageous for it was that it was a little bit more expensive. I would rate it one out of five in terms of pricing."
report
Use our free recommendation engine to learn which Vulnerability Management solutions are best for your needs.
824,129 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Financial Services Firm
22%
Computer Software Company
15%
Manufacturing Company
10%
Government
6%
Financial Services Firm
36%
Computer Software Company
12%
Insurance Company
7%
Manufacturing Company
7%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
No data available
 

Questions from the Community

What alternatives are there for Fortify WebInspect and Fortify SCA?
I would like to recommend Checkmarx. With Checkmarx, you are able to have an all in one solution for SAST and SCA as well. Veracode is only a cloud solution. Hope this helps.
What do you like most about Checkmarx?
Compared to the solutions we used previously, Checkmarx has reduced our workload by almost 75%.
What is your experience regarding pricing and costs for Checkmarx?
The pricing is relatively expensive due to the product's quality and performance, but it is worth it.
Ask a question
Earn 20 points
 

Learn More

 

Overview

 

Sample Customers

YIT, Salesforce, Coca-Cola, SAP, U.S. Army, Liveperson, Playtech Case Study: Liveperson Implements Innovative Secure SDLC
Information Not Available
Find out what your peers are saying about Checkmarx One vs. IBM Guardium Vulnerability Assessment and other solutions. Updated: December 2024.
824,129 professionals have used our research since 2012.