Try our new research platform with insights from 80,000+ expert users

Checkmarx One vs Vulcan Cyber comparison

 

Comparison Buyer's Guide

Executive Summary
 

Categories and Ranking

Checkmarx One
Ranking in Vulnerability Management
15th
Ranking in Risk-Based Vulnerability Management
5th
Average Rating
7.6
Number of Reviews
69
Ranking in other categories
Application Security Tools (3rd), Static Application Security Testing (SAST) (3rd), Static Code Analysis (2nd), API Security (4th), DevSecOps (2nd)
Vulcan Cyber
Ranking in Vulnerability Management
34th
Ranking in Risk-Based Vulnerability Management
12th
Average Rating
8.0
Number of Reviews
2
Ranking in other categories
Security Orchestration Automation and Response (SOAR) (21st), Cloud Security Remediation (2nd)
 

Featured Reviews

MH
Feb 7, 2024
Specifies the exact line of code where it finds the problem and gives good reports
There's one thing Checkmarx can maybe fix, actually two things. First, when we first ran it on a big project, there wasn't enough memory on the computer. It originally ran with eight gigabytes, and now it runs with 32. The software stopped at some point, and while I don't think it said it ran out of memory, it just said "stopped" and something else. We had to go to the logs and send them to the integrator, and eventually, they found a memory issue in the logs and recommended increasing the memory. We doubled it once, and it didn't seem enough. We doubled it again, and it helped. So, even if the software reaches capacity on the computer, even though it writes it in the logs, it should also give an indication in the GUI to the person running it, saying "not enough memory" or "not enough disk space." Another problem is that when it's scanning and it has an internal problem, for example, it cannot check something, or an internal bug or internal problem, it's being found in the logs, but there's no indication to the user. Now, this is good for them because the user runs it, gets a report, everything's fine. But in a way, it's not good for them because the user doesn't know there's a problem since they don't check the logs. Because mostly, only the manager looks at the logs and only if there's a problem being reported. You run a process, get a report, but in the logs, there might be an indication that it couldn't check several files or understand something. There's a problem, an internal problem that can be fixed, but nobody knows about it because we don't look at the code. The user doesn't look at the logs; only the business manager does, but they don't know because the user doesn't report it, because the user doesn't know. So, my suggestion for them is this: if they have problems, they should say, 'Here is the report,' but also indicate to the user somewhere, perhaps in the GUI, not necessarily in the report itself, 'We found 100 problems while looking at your code. Please provide us the logs so we can try to fix those.' Then they can ask if the user has any problems. This way, users would know to send them their logs, and they could improve their software, meaning fix the problems. Now, they may not want to do this because they'll get flooded with millions of responses and millions of problems from all over the world. They would have to fix them, and people might get angry, asking why they provided a report when there were hidden problems. People might say, 'How come you gave me a report with seven or eight problems when analyzing it, there were internal problems with your code? So it's not a perfect report.'" So, these internal issues are logged but not communicated to the user through the Checkmarx interface (GUI) or report. The solution also has a few false positives. So, if they had an easier way for users to send an email directly, instead of just opening a ticket. Because when we open a ticket, they want all the logs and everything, and it becomes a hassle. Perhaps they could implement an easier system where users can send a snippet of the code, along with an explanation of why they believe it's a false positive, referencing the specific report. This way, Checkmarx could analyze the information and the development team could potentially fix the product in those areas. It wouldn't require them to necessarily respond to the user, but I'm not sure if that's feasible for most companies.
MP
Aug 12, 2024
The solution aggregates results from our security scanning tools, but it has performance issues
The performance is bad. The query and the UI are always slow, and it's quite frustrating. Vulcan is trying to solve this with a newer design. The dashboard is also crowded. It pulls in all this raw information that you need to filter. Vulcan has filtering capabilities, but they're hard to manage. The labels aren't very clear, so you need to do things by trial and error. It's not as easy as other tools we've been using. Collecting everything into a single data lake can be good and bad because it collects everything. For example, we didn't have a chance to work on the vulnerabilities yet in the beginning, so we had thousands of findings. I can see everything, but it's not manageable. Vulcan has good integrations but not with all the tools because we use Snyk for scanning, and it's not well-integrated yet. They collect all the information needed but do not organize it well enough.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"The solution is always updating to continuously add items that create a level of safety from vulnerabilities. It's one of the key features they provide that's an excellent selling point. They're always ahead of the game when it comes to finding any vulnerabilities within the database."
"It is very useful because it fits our requirements. It is also easy to use. It is not complex, and we are satisfied with the results."
"It shows in-depth code of where actual vulnerabilities are."
"The only thing I like is that Checkmarx does not need to compile."
"The most valuable features are the easy to understand interface, and it 's very user-friendly."
"It can integrate very well with DAST solutions. So both of them are combined into an integrated solution for customers running application security."
"We were using HPE Security Fortify to scan code for security vulnerabilities, but it can scan only after a successful compile. If the code has dependencies or build errors, the scan fails. With Checkmarx, pre-compile scanning is seamless. This allows us to scan more code."
"Compared to the solutions we used previously, Checkmarx has reduced our workload by almost 75%."
"Vulcan enables us to automate tickets from multiple scanners. It has lots of analytics options that show us charts and allow us to view the statuses in different waves. The dashboard is nice because it's highly informative about the big picture."
"It is very good when it comes to ingesting information from different sources and then displaying this information in an easy-to-use platform."
 

Cons

"Licensing models and Swift language support are the aspects in which this product needs to improve. Swift is a new language, in which major customers require support for lower prices."
"The pricing can get a bit expensive, depending on the company's size."
"This product requires you to create your own rulesets. You have to do a lot of customization."
"I would like the product to include more debugging and developed tools. It needs to also add enhancements on the coding side."
"Its pricing model can be improved. Sometimes, it is a little complex to understand its pricing model."
"The solution sometimes reports a false auditable code or false positive."
"Updating and debugging of queries is not very convenient."
"Checkmarx has a slightly difficult compilation with the CI/CD pipeline."
"Mainly, what I would like from them is more maintenance of the different connectors they have in the platform."
"The performance is bad. The query and the UI are always slow, and it's quite frustrating. Vulcan is trying to solve this with a newer design. The dashboard is also crowded. It pulls in all this raw information that you need to filter. Vulcan has filtering capabilities, but they're hard to manage. The labels aren't very clear, so you need to do things by trial and error. It's not as easy as other tools we've been using."
 

Pricing and Cost Advice

"The price of Checkmarx could be reduced to match their competitors, it is expensive."
"Before implementing the product I would evaluate if it is really necessary to scan so many different languages and frameworks. If not, I think there must be a cheaper solution for scanning Java-only applications (which are 90% of our applications)."
"For around 250 users or committers, the cost is approximately $500,000."
"It is not expensive, but sometimes, their pricing model or licensing model is not very clear. There are similar variables, such as projects or developers, and sometimes, it is a little bit confusing."
"We got a special offer for a 30% reduction for three years, after our first year. I think for a real source-code scanning tool, you have to add a lot of money for Open Source Analysis, and AppSec Coach (160 Euro per user per year)."
"​Checkmarx is not a cheap scanning tool, but none of the security tools are cheap. Checkmarx is a powerful scanning tool, and it’s essential to have one of these products."
"Be cautious of the one-year subscription date. Once it expires, your price will go up."
"We have a subscription license that is on a yearly basis, and it's a pretty competitive solution."
"Its pricing is quite fair compared to what is out there in the market, especially compared to the tool from Microsoft. It is a SaaS platform that has an annual cost, so it is something that is already used by many companies. It is quite affordable."
report
Use our free recommendation engine to learn which Vulnerability Management solutions are best for your needs.
805,335 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Financial Services Firm
21%
Computer Software Company
16%
Manufacturing Company
10%
Government
5%
Computer Software Company
23%
Financial Services Firm
11%
Manufacturing Company
9%
Insurance Company
9%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
No data available
 

Questions from the Community

What alternatives are there for Fortify WebInspect and Fortify SCA?
I would like to recommend Checkmarx. With Checkmarx, you are able to have an all in one solution for SAST and SCA as well. Veracode is only a cloud solution. Hope this helps.
What do you like most about Checkmarx?
Compared to the solutions we used previously, Checkmarx has reduced our workload by almost 75%.
What is your experience regarding pricing and costs for Vulcan Cyber?
Its pricing is quite fair compared to what is out there in the market, especially compared to the tool from Microsoft. It is a SaaS platform that has an annual cost, so it is something that is alre...
What needs improvement with Vulcan Cyber?
We have already requested Vulcan several features. Mainly, what I would like from them is more maintenance of the different connectors they have in the platform. You can connect different sources a...
What is your primary use case for Vulcan Cyber?
We were searching for a tool in the market that would allow us to automate our vulnerability management processes. We found Vulcan Cyber to be the best one, at least for our company, for automating...
 

Comparisons

 

Interactive Demo

Demo not available
 

Overview

 

Sample Customers

YIT, Salesforce, Coca-Cola, SAP, U.S. Army, Liveperson, Playtech Case Study: Liveperson Implements Innovative Secure SDLC
Stitch Fix, Mandiant, Wealthsimple, Entrust, Anaplan, Deloitte, Origami Risk, Verana Health
Find out what your peers are saying about Checkmarx One vs. Vulcan Cyber and other solutions. Updated: August 2024.
805,335 professionals have used our research since 2012.