Try our new research platform with insights from 80,000+ expert users

Checkmarx One vs Synopsys Defensics comparison

 

Comparison Buyer's Guide

Executive Summary
 

Categories and Ranking

Checkmarx One
Average Rating
7.6
Reviews Sentiment
6.9
Number of Reviews
70
Ranking in other categories
Application Security Tools (3rd), Static Application Security Testing (SAST) (3rd), Vulnerability Management (20th), Static Code Analysis (2nd), API Security (2nd), DevSecOps (2nd), Risk-Based Vulnerability Management (6th)
Synopsys Defensics
Average Rating
8.6
Number of Reviews
4
Ranking in other categories
Fuzz Testing Tools (5th)
 

Mindshare comparison

While both are Quality Assurance solutions, they serve different purposes. Checkmarx One is designed for Application Security Tools and holds a mindshare of 12.5%, down 15.2% compared to last year.
Synopsys Defensics, on the other hand, focuses on Fuzz Testing Tools, holds 20.5% mindshare, up 12.0% since last year.
Application Security Tools
Fuzz Testing Tools
 

Featured Reviews

Rohit Kesharwani - PeerSpot reviewer
Provides good security analysis and security identification within the source code
We integrate Checkmarx into our software development cycle using GitLab's CI/CD pipeline. Checkmark has been the most helpful for us in the development stage. The solution's incremental scanning feature has impacted our development speed. The solution's vulnerability detection is around 80% to 90% accurate. I would recommend Checkmarx to other users because it is one of the good tools for doing security analysis and security identification within the source code. Overall, I rate Checkmarx a nine out of ten.
it_user586716 - PeerSpot reviewer
Technical support provided protocol-specific documentation to prove that some positives were not false.
A security assurance engineer was able to perform due diligence across all network-facing protocols. My prior organization designed, developed and deployed a Network Attached Storage (NAS) appliance. A key part of the company wide security assurance program for all products, is to perform penetration testing against all network facing IP ports. For the web, SSL and RESTful APIs, there are very good COTS and open source tools to perform Dynamic Application Security Testing (DAST) testing. Unfortunately for NAS protocols like SMB, NFS, CIFS, and iSCSI, I researched and found that Codenomicon Defensics was the only viable source to satisfy our DAST requirements. Through the use of Selenium for automated web testing, it was easily found out that Codenomicon Defensics could be integrated into our Continuous Integration / Continuous Deployment (CI / CD) Agile processes, specific to automated testing. Also, like many of the other application security testing products, Defensics incorporates automatic update support and works on Windows, MacOS and Linux desktops.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"The identification of verification-related security vulnerabilities is really important and one of the key things. It also identifies vulnerabilities for any kind of third-party tool coming into the system or any third-party tools that you are using, which is very useful for avoiding random hacking."
"The best thing about Checkmarx is the amount of vulnerabilities that it can find compared to other free tools."
"The most valuable features of Checkmarx are difficult to pinpoint because of the way the functionalities and the features are intertwined, it's difficult to say which part of them I prefer most. You initiate the scan, you have a scan, you have the review set, and reporting, they all work together as one whole process. It's not like accounting software, where you have the different features, et cetera."
"Helps us check vulnerabilities in our SAP Fiori application."
"The solution allows us to create custom rules for code checks."
"The user interface is excellent. It's very user friendly."
"The product's most valuable feature is static code and supply chain effect analysis. It provides a lot of visibility."
"The user interface is modern and nice to use."
"The product is related to US usage with TLS contact fees, i.e. how more data center connections will help lower networking costs."
"We have found multiple issues in our embedded system network protocols, related to buffer overflow. We have reduced some of these issues."
"Whatever the test suit they give, it is intelligent. It will understand the protocol and it will generate the test cases based on the protocol: protocol, message sequence, protocol, message structure... Because of that, we can eliminate a lot of unwanted test cases, so we can execute the tests and complete them very quickly."
 

Cons

"Implementing a blackout time for any user or teams: Needs improvement."
"The statistics module has a function that allows you to show some statistics, but I think it's limited. Maybe it needs more information."
"I think the CxAudit tool has room for improvement. At the beginning you can choose a scan of a project, but in any event the project must be scanned again (wasting time)."
"The cost per user is high and should be reduced."
"They could work to improve the user interface. Right now, it really is lacking."
"If it is a very large code base then we have a problem where we cannot scan it."
"The Dynamic Application Security Testing (DAST) feature should be better."
"We would like to be able to run scans from our local system, rather than having to always connect to the product server, which is a longer process."
"Codenomicon Defensics should be more advanced for the testing sector. It should be somewhat easy and flexible to install."
"Sometimes, when we are testing embedded devices, when we trigger the test cases, the target will crash immediately. It is very difficult for us to identify the root cause of the crash because they do not provide sophisticated tools on the target side. They cover only the client-side application... They do not have diagnostic tools for the target side. Rather, they have them but they are very minimal and not very helpful."
"It does not support the complete protocol stack. There are some IoT protocols that are not supported and new protocols that are not supported."
 

Pricing and Cost Advice

"I believe pricing is better compared to other commercial tools."
"The interface used to create custom rules comes at an additional cost."
"The price of Checkmarx could be reduced to match their competitors, it is expensive."
"The solution is costly."
"It is an expensive solution."
"We have a subscription license that is on a yearly basis, and it's a pretty competitive solution."
"​Checkmarx is not a cheap scanning tool, but none of the security tools are cheap. Checkmarx is a powerful scanning tool, and it’s essential to have one of these products."
"We got a special offer for a 30% reduction for three years, after our first year. I think for a real source-code scanning tool, you have to add a lot of money for Open Source Analysis, and AppSec Coach (160 Euro per user per year)."
"Licensing is a bit expensive."
report
Use our free recommendation engine to learn which Application Security Tools solutions are best for your needs.
824,067 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Financial Services Firm
22%
Computer Software Company
15%
Manufacturing Company
10%
Government
6%
Computer Software Company
21%
Manufacturing Company
17%
Financial Services Firm
9%
Healthcare Company
6%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
No data available
 

Questions from the Community

What alternatives are there for Fortify WebInspect and Fortify SCA?
I would like to recommend Checkmarx. With Checkmarx, you are able to have an all in one solution for SAST and SCA as well. Veracode is only a cloud solution. Hope this helps.
What do you like most about Checkmarx?
Compared to the solutions we used previously, Checkmarx has reduced our workload by almost 75%.
What is your experience regarding pricing and costs for Checkmarx?
The pricing is relatively expensive due to the product's quality and performance, but it is worth it.
Ask a question
Earn 20 points
 

Also Known As

No data available
Defensics, Codenomicon Defensics
 

Overview

 

Sample Customers

YIT, Salesforce, Coca-Cola, SAP, U.S. Army, Liveperson, Playtech Case Study: Liveperson Implements Innovative Secure SDLC
Coriant, CERT-FI, Next Generation Networks
Find out what your peers are saying about Sonar, Veracode, Checkmarx and others in Application Security Tools. Updated: December 2024.
824,067 professionals have used our research since 2012.