We use it for static checking.
Chief Information Security Officer with 501-1,000 employees
Helped us address our critical vulnerabilities through static scanning
Pros and Cons
- "One of the valuable features is that it gives us the option of static scanning. Most tools of this type are centered around dynamic scanning. Having a static scan is very important."
What is our primary use case?
How has it helped my organization?
We are a state agency, we're not a private-sector company. What we're able to do is take our main web-based application, which is not only for internal use but which the citizens of Ohio also use, and we can run this application, and others as well, through Veracode to ensure that we've done our job, our due diligence.
We print out a report, we see the rating of the vulnerabilities that have been found: "critical" and "high", "moderate" and "low." We've been able to go from having critical vulnerabilities to where we're now into the more moderate range. We've shown improvement through the years. We can provide that information to our superiors, and to people who come in and audit us, to show that we've made progress on scanning.
When we find a vulnerability, we do pass it on to our developers and they've been able to go in and adjust the code so that the vulnerability is no longer there. The goal, of course, is that these findings will help them as they develop new code so that these vulnerabilities are not a part of the next application. We run a follow-up scan to make sure the vulnerability has been cleared.
The benefit, at this point, has been more internal than for our customers. Obviously we don't want them to have a problem so that they could then, theoretically, actually see the benefit. We try to be proactive.
What is most valuable?
- Having the option of static scanning. Most tools of this type are centered around dynamic scanning. Having a static scan is very important.
- Utilizing the software as a service. We do the scanning of the compiled code ourselves but it's on their servers, which is a plus.
- Technical support is available if needed and that is advantageous.
- Having online education and training is also advantageous.
What needs improvement?
I attended a meeting of one of the security organizations I am associated with. At the meeting were security professionals from several major retail companies. The topic of discussion happened to be application development security. When the question was asked concerning what tools are being used, many of these major retail companies said they are using Veracode. However, they were quick to comment that the product is too expensive and that there are too many false positives which take too much time to remediate.
Buyer's Guide
Veracode
November 2024
Learn what your peers think about Veracode. Get advice and tips from experienced pros sharing their opinions. Updated: November 2024.
816,636 professionals have used our research since 2012.
For how long have I used the solution?
More than five years.
What do I think about the stability of the solution?
The stability is very good. They haven't had too many updates or upgrades. They did a major upgrade several years ago but it came out just fine. It has been a really good product.
What do I think about the scalability of the solution?
I'd call us a "mid-range" agency, so it's not like we have a ton of applications that we're changing and updating. It's good for us, but I can't really answer how scalable it is because we're not really big.
How are customer service and support?
I don't believe that the team has had any problem going on to the website, downloading the static code, or running scans. They do it quite often without any issue and are able to read the report and rectify whatever vulnerability has been discovered. There has not been a problem walking through those steps. It's been pretty straightforward. And if our team has any problems, we've got access to someone that we can schedule a call with to work out the issues.
We haven't had to call tech support too often, but when we have had to call them, support has been good in terms of resolution time.
How was the initial setup?
I was involved, on a cursory level, with the setup. Our implementation strategy was to focus on our main web-based application. The way that they developed the application here was under one static set of code, so we could scan this code and, in essence, be able to check the vulnerability of most of the applications from the different business in our agency.
What about the implementation team?
We did not use an integrator or a third-party. We did it with the help of Veracode.
What was our ROI?
We are a state agency, so we're not for profit. I tell everybody we don't make money, we spend money. To frame it in the context of the public sector, I think we are giving our citizens peace of mind. When they come in to write a permit, and we send them to a service that collects payment, that jumping-off point is secure and safe. It would be more in those terms, rather than the bottom line.
In the public sector, return on investment is not a term that is easily understood because we do not invest. But total cost of ownership is something that we can put our arms around. When we think about potential data breaches, Veracode has certainly helped us. When you think about the cost of the product and that I have one person, not ten people, running this tool, the total cost of ownership is low. I have no devices or servers, I didn't have to do any of that here onsite. It's all in the cloud. The total cost of ownership, given the services they provide, is very low, in my opinion.
What's my experience with pricing, setup cost, and licensing?
We're always looking to save the taxpayers' money. I used to tell my vendors, sharpen those pencils and make the tip laser-sharp. When it can be, I want it to be less expensive, but you get what you pay for too. Vendors need to be fair and I think Veracode has been fair.
We use their SaaS solution and it's just an annual subscription.
Which other solutions did I evaluate?
The state of Ohio decided to bring AppScan in and that's an IBM tool. IBM became a major vendor in the state of Ohio. But what happened is that AppScan does not offer static code vulnerability checking; dynamic is something they do offer, but it's not as complete and comprehensive as a static scan is. Even the state has gone away from AppScan, but we were looking at it, we were starting to get set up for it. But evidently, other agencies haven't found it to be as useful. So we're not going that direction, we're staying with Veracode.
There would have been cost savings associated with going with AppScan but we decided, because the state was not going that way, that we were not going that way either.
What other advice do I have?
I would absolutely recommend Veracode. I've suggested to one of the larger agencies that they implement the solution and that they come to see what we've experienced and how we use the tool.
I really like Veracode. That is one of the reasons that we brought them onboard ten years ago. Of course, they were new back then. The different aspects of the offerings that Veracode provides to their customers are somewhat unique and, right now, I couldn't ask another thing from them.
We have approximately 30 Java developers and four or five testers. There are also project managers using it. We have one person who manages running of the scans and that person might have one or two other people to help.
We haven't really been utilizing it to its full potential. We probably utilize it once or twice per quarter. We are planning to increase the capacity that we've purchased. However, we're getting ready to elect a new governor in Ohio. With that election, things will change, according to his or her desires. Right now, we're in a holding pattern waiting for November to come and go.
In terms of integrating the solution into our existing software development lifecycle, because we started so long ago - before the software development lifecycle was fully implemented - we were doing Veracode testing just because it was a good idea. Then we actually developed a lifecycle. We got into scrums and it just naturally worked its way in, so when we actually hired a testing group, Veracode was already a part of the process.
Disclosure: PeerSpot contacted the reviewer to collect the review and to validate authenticity. The reviewer was referred by the vendor, but the review is not subject to editing or approval by the vendor.
Director Software Engineering at a tech services company with 51-200 employees
We do release with both static and dynamic scans, and mitigating the flaws identified
Pros and Cons
- "All the features provided by Veracode are valuable, including static scan, dynamic scan, and MPT (Manual Penetration Testing)."
- "We use Ruby on Rails and we still don't have any support for that from Veracode."
- "The static scans on Java lack microservices architecture scanning. We have developed an in-house pattern for this and the scans can't take care of it as a single entity."
What is our primary use case?
To have a third-party analyze our code and make recommendations from a security perspective.
How has it helped my organization?
We do not pass our release without performing a static and a dynamic scan, and mitigating the flaws identified.
In terms of how our customers have benefited from the added application security of our applications, they are aware of our development process and it makes them comfortable that we have implemented industry best practices.
What is most valuable?
All the features provided by Veracode are valuable.
What needs improvement?
We use Ruby on Rails and we still don't have any support for that from Veracode.
The static scans on Java lack microservices architecture scanning. We have developed an in-house pattern for this and the scans can't take care of it as a single entity.
For how long have I used the solution?
More than five years.
What do I think about the stability of the solution?
No issues with stability.
What do I think about the scalability of the solution?
No issues with scalability.
How is customer service and technical support?
The support is good but has room for improvement. Issues don't get acknowledged quickly, repeated updating is required.
What was our ROI?
The cost savings are the efforts that it would take to do this at a stretch if this was not implemented early on in our development cycle.
What's my experience with pricing, setup cost, and licensing?
I think licensing needs to be changed or updated so that it works with adjustments. Pricing is expensive compared to the amount of scanning we perform.
Which other solutions did I evaluate?
WhiteHat.
What other advice do I have?
We have made process changes and improvements, although Veracode is not tightly integrated into our CI/CD platform yet.
I am very likely to recommend to colleauges that they work with CA Veracode.
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Buyer's Guide
Veracode
November 2024
Learn what your peers think about Veracode. Get advice and tips from experienced pros sharing their opinions. Updated: November 2024.
816,636 professionals have used our research since 2012.
Senior Manager Cyber Security at a tech services company with 201-500 employees
Identifies false positives, prevents vulnerable code from being introduced into production, and provides static scanning
Pros and Cons
- "Static Scanning is the most valuable feature of Veracode."
- "Veracode can be improved in terms of software composition analysis and related vulnerabilities."
What is our primary use case?
We scan various types of software codes, such as codes or applications built in languages like C, Java, Python, PHP, and Ruby, among others. We assess the code quality using Veracode.
How has it helped my organization?
Veracode prevents 90 percent of vulnerable code from being introduced into production.
Previously, in our organization, we did not have a dedicated workflow or a tool for capturing code vulnerabilities. After the code passed the testing phase, it was directly implemented in production. However, since implementing Veracode and launching it, we have been able to identify vulnerabilities beforehand. As a result, our code now goes into production without any vulnerabilities. Only after ensuring this, do we allow it to go live.
Veracode provides visibility into application status at every phase of development.
Based on our experience, Veracode quickly and effectively identifies false positives.
Our project teams understand the importance of conducting code scanning in addition to code development and Veracode testing. This ensures that any flow issues are addressed before proceeding to the next phase. It has become ingrained in their approach.
Veracode has helped our developers save time by assisting in fixing the vulnerabilities that could have had disastrous effects if they had gone into production.
Veracode has had a tremendous impact on our security posture, particularly in one region in Asia where Veracode is being used for security testing and vulnerability assessment. Now, other regions, including the US, have also recognized its value and started adopting Veracode.
What is most valuable?
Static Scanning is the most valuable feature of Veracode.
What needs improvement?
Veracode's policy reporting, which ensures compliance with industry standards and regulations, is valuable. It would also be helpful to have a specific example that we can relate to in order to better understand it. Currently, the information is scattered, so precision would greatly assist us.
Veracode can be improved in terms of software composition analysis and related vulnerabilities. For instance, when an application team provides us with their software code, we perform code scanning. During this process, we often encounter software composition analysis vulnerabilities that require the application team to upgrade their Java file from version X to version Y. We then communicate this to the application team, and they proceed with the upgrade. Once the upgrade is complete, we conduct a rescan. However, during the rescan, Veracode may identify compatibility issues with the upgraded version Y. This situation puts the application team in a difficult position, as they may be unable to accommodate this change within their project schedule. Therefore, this is an area where I believe Veracode could make improvements.
The technical consultation can be enhanced to effectively address the communication variations among different regions.
For how long have I used the solution?
I have been using Veracode for three years.
What do I think about the stability of the solution?
Veracode is 100 percent stable.
What do I think about the scalability of the solution?
Veracode can scale to meet our maximum requirements.
How are customer service and support?
There are cultural differences in the way we communicate with people from different countries. So, when a Japanese person is talking to an American, the rapid conversation provided by the American technical support person may not be easily understood by the Japanese individual. As a result, instead of having just one discussion or consultation with Veracode, we end up having three to four consultations.
How would you rate customer service and support?
Neutral
What other advice do I have?
I give Veracode a ten out of ten.
We are using Veracode in multiple locations and departments.
Veracode does not require any maintenance.
Veracode is an extremely user-friendly tool, operating through a web interface. Additionally, the support and guidance offered by the Veracode team are excellent. Considering all of these factors, I believe Veracode should be the choice for anyone.
Which deployment model are you using for this solution?
On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.
DevOps and Cloud Architect at a hospitality company with 1-10 employees
Great for automatic penetration testing and providing the ability to investigate problems
Pros and Cons
- "Provides the ability to understand the black zones in our system."
- "Security can always be improved."
What is our primary use case?
I'm the manager of DevOps and cloud architecture.
How has it helped my organization?
This product has given us the ability to investigate and understand the black zones in our system.
What is most valuable?
Veracode can emulate the most sophisticated attack and create unique or specific use cases around automatic penetration testing. It gives us the ability to investigate any sensitivities to vulnerabilities that we may have.
What needs improvement?
Security can always be improved. I'd like to know how we can better prevent intrusions to our systems and create risk analysis use cases and understand them. What is the level of risk for what we want to do? How can we understand the process better? I'd like to have a better overview of what's going on.
For how long have I used the solution?
I've been using this solution for five years.
What do I think about the stability of the solution?
The solution is stable.
What do I think about the scalability of the solution?
The solution is scalable.
How are customer service and support?
There are three layers of technical support and we have used all of them over time. We are happy with the service they provide.
What other advice do I have?
It's important to understand your environment and know the specific use cases for your organization. Creating good orchestration application metrics is very important.
I rate this product eight out of 10.
Which deployment model are you using for this solution?
Public Cloud
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Product Security Engineer at a tech services company with 5,001-10,000 employees
Good pipeline scanner, requires minimal maintenance, and helps easily reveal design flaws
Pros and Cons
- "With the pipeline scanner, it's easier for developers to scan their products, as they don't have to export anything from their computers. They can do everything with the command line on their computer."
- "Maybe the pipeline scanning doesn't support enough languages. It might only support Java and Python only, so that could be improved."
What is our primary use case?
I'm working on security reviews for our in-house products. We are trying to solve problems. The use case for Veracode is to discover flaws in design before our application reaches end customers. We are using Veracode as one of the tools to ensure that our products are following secure design guidelines.
How has it helped my organization?
We have some applications where Veracode found a potential XSS due improper input controls. Based on Veracode recommendations, I work with dev team and remediate the flaw. That's something that I would probably missed if I did only the manual code review.
What is most valuable?
We recently started working with pipeline scanner, which is quite useful. In Veracode, you need to import zip files for the source code. With the pipeline scanner, it's easier for developers to scan their products, as they can do everything via command line. When a scanner detects a flaw, it also generates a good explanation about that flaw and good references for mitigation. That's also very useful for us.
What needs improvement?
In terms of improvement, I don't have any valuable input. The application works fine and I don't have any negative feedback. Maybe pipeline scanner can be improved to support some additional language packages.
For how long have I used the solution?
I've used the solution for two years now. It hasn't been that long.
What do I think about the stability of the solution?
The solution is stable. I haven't experienced any hiccups in my work in any way.
How are customer service and support?
I haven't worked with Vercode's support and therefore cannot comment on how helpful or responsive they are.
Which solution did I use previously and why did I switch?
I don't have experience with other SAST products.
How was the initial setup?
This solution was already deployed when I was hired. I can't speak to what the deployment process was like.
The maintenance is minimal. I just need to create accounts for people who want to scan by themselves and that's it. It's easily maintainable.
What's my experience with pricing, setup cost, and licensing?
I don't have any insights on pricing. I don't handle any aspects of the licensing process so I can't speak to the overall costs or terms.
What other advice do I have?
We are accessing via a web browser to Veracode. I'm guessing it's some type of cloud deployment, hosted by Veracode.
We have a lot of applications that are scanned with Veracode. We did scans for some of our core products, as well as on-demand products, and web applications. I'm mostly working with web applications for now.
Based on my experience, new users should check as many features as they can, and also read the reports carefully. That way, they can get a full picture of how this product works.
I'd rate the solution a nine out of ten.
Which deployment model are you using for this solution?
Public Cloud
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Assistant Vice President of Programming and Development at a financial services firm with 501-1,000 employees
Allows us to streamline identification of vulnerabilities and quickly address them
Pros and Cons
- "When we expanded our definition of critical systems to include an internal application to be scanned by Veracode, we had initial scans that produced hundreds of vulnerabilities. We expected this, based on how the code was treated previously, but the Veracode platform allowed us to streamline our identification of these items and develop a game plan to quickly address them."
- "Code analysis tool to help identify code issues before entered into production."
- "Vulnerability Management and mitigation recommendations help with resolution of issues found, prior to deployment to production."
- "Developer Sandboxes help move scanning earlier within the SDLC."
- "The only notable problem we have had is that when new versions of Swift have come out, we have found Veracode tends to be a bit behind in updates to support the new language changes."
- "The Greenlight product that integrates into the IDE is not available for PHP, which is our primary language."
What is our primary use case?
Static code analysis for internally developed critical systems.
How has it helped my organization?
When we expanded our definition of critical systems to include an internal application to be scanned by Veracode, we had initial scans that produced hundreds of vulnerabilities. We expected this, based on how the code was treated previously, but the Veracode platform allowed us to streamline our identification of these items and develop a game plan to quickly address them. This has also lead to better overall code quality for the team, by pointing out some dated practices that needed updating.
We have required that our critical systems pass a Veracode scan prior to code being deployed into production. We also have included a step in the development stage to run specific code through a Veracode Sandbox to encourage better code quality, early on in the development lifecycle.
Veracode has helped us meet the requirements of our yearly external audits and has improved code quality, leading to less down time and less buggy code that users will encounter.
What is most valuable?
- Code analysis tool to help identify code issues before entered into production.
- Vulnerability Management and mitigation recommendations help with resolution of issues found, prior to deployment to production.
- Developer Sandboxes help move scanning earlier within the SDLC.
- The platform itself has a lot of AppSec best practices information, especially in the mitigation recommendation process. They have also offered cybersecurity e-learning for our team.
What needs improvement?
The only notable problem we have had is that when new versions of Swift have come out, we have found Veracode tends to be a bit behind in updates to support the new language changes.
Also the Greenlight product that integrates into the IDE is not available for PHP, which is our primary language.
For how long have I used the solution?
More than five years.
What do I think about the stability of the solution?
No issues with stability.
What do I think about the scalability of the solution?
No issues with scalability.
How is customer service and technical support?
We have rarely needed to use tech support, and when we have it has performed as expected.
How was the initial setup?
Straightforward. Just add the applications in the portal and start scanning.
What was our ROI?
We don’t have the metrics to track specific dollars, but Veracode has saved us the cost of hundreds of employee hours by streamlining our vulnerability discovery process in legacy code, and by improving the quality of code released into production.
As we support our organization's customer-facing digital channels by writing higher quality code, we have reduced the amount of bugs or downtime a user experiences using our systems. This saves in employee time and also increases engagement with our digital channels.
What's my experience with pricing, setup cost, and licensing?
Pricing seems fair for what is offered, and licensing has been no problem. All developers are able to get the access they need.
Which other solutions did I evaluate?
Yes, but too long ago to remember which ones.
What other advice do I have?
I would definitely recommend CA Veracode.
Just make sure you define a process for your developers prior to implementing the technology.
Disclosure: PeerSpot contacted the reviewer to collect the review and to validate authenticity. The reviewer was referred by the vendor, but the review is not subject to editing or approval by the vendor.
Senior Information Security Program Manager at a financial services firm with 10,001+ employees
Gives us every vulnerability that has been identified, so there is no human intervention
Pros and Cons
- "The ability on static scans to be able to do sandbox scans which do not generate metrics."
- "I would love to be able to do a dynamic sandbox scan. I think that that would allow us to really get a lot more buy-in from the software development teams."
What is our primary use case?
The primary use case is application security and application security testing, specifically static and dynamic analysis, and software composition analysis. It has performed excellently.
How has it helped my organization?
The benefits are the fact that it identifies our vulnerabilities, and it has improved us by allowing us to pull everything to the left in agreement with our SDLC and with our developers, and have them not only get buy-in because they can run sandbox scans that allow them not to generate metrics, but also run policy scans where we identify what the policy is and what is acceptable. So, it has helped us secure our company and our applications.
What is most valuable?
- The ability on static scans to be able to do sandbox scans which do not generate metrics.
- Gives us every vulnerability that has been identified, so there is no human intervention. Therefore, we can actually look and prioritize our own vulnerabilities as opposed to having someone else try to get in between.
What needs improvement?
I would love to be able to do a dynamic sandbox scan. I think that that would allow us to really get a lot more buy-in from the software development teams. We would be able to scan our applications, identify the vulnerabilities, not generate metrics, which would allow the teams to address the vulnerabilities earlier in the cycle, and then have cleaner scans later on.
Also, I would maybe like to see a better report engine.
What do I think about the stability of the solution?
It is extremely stable.
What do I think about the scalability of the solution?
So far, extremely scalable.
How are customer service and technical support?
We do have ongoing technical support. We use them more as a backstop. My team handles most of the calls and issues that any of the developers might have.
CA support has excellent time frames. They are knowledgeable and get back to you with an actual solution, which is always a plus.
How was the initial setup?
The initial setup was very straightforward.
- It is SaaS, so we did not have to install anything locally.
- We were able to give our privileged users better roles because it is role-based, and to do multi-factor authentication. All we have to do, once we set up our trust relationship, we have single sign-on and we white-listed everything. So, it is everything that we wanted from a security point of view, and it is easy to roll out.
Disclosure: PeerSpot contacted the reviewer to collect the review and to validate authenticity. The reviewer was referred by the vendor, but the review is not subject to editing or approval by the vendor.
Senior Software Developer at a pharma/biotech company with 201-500 employees
A robust and full-featured solution that provides a good analysis of the vulnerabilities
Pros and Cons
- "The analysis of the vulnerabilities and the results are the most valuable features."
- "It can have more APIs and capabilities to handle other things well. We were doing a trial for it. There were two things that I looked at: one was uploading some Java-related content and the other was uploading database SQL files and having the review done on the quarterback. The Java portion of it worked fine, and it was pretty seamless, but the database portion was not. We uploaded some files to use for vulnerabilities, and the tell-all portion of it was pretty easy. We uploaded a war file and Java files, and we got the reports back on these. They were pretty clear to understand. We did the same thing for the database portion for the most part. However, the content wasn't getting uploaded in a predictable fashion, and it was slow and hard to get done. We had to do it over and over. After it indicated that the content was uploaded, there were no results. There were zero search findings. It was possibly a user error, something that we didn't do correctly, but they had acknowledged that it was something they were currently enhancing. This is something that could be made easier if they haven't already done that. I don't know how many releases they've had in that timeframe. I haven't looked at it since then. It was a trial period."
What is our primary use case?
We used it for initial discovery and analysis and for reviewing the product. We were doing a trial. We had uploaded code on the Veracode server for analysis.
We used the cloud service or the cloud website where you could interact and identify the artifacts that you wanted to be reviewed, analyzed, and reported on. There was a plugin that we used with some of our IDs. It probably was Greenlight.
How has it helped my organization?
It pointed out some areas to be improved that we were not aware of. That was very helpful because if you don't know that there is a problem, you can't fix it.
What is most valuable?
The analysis of the vulnerabilities and the results are the most valuable features.
What needs improvement?
It can have more APIs and capabilities to handle other things well. We were doing a trial for it. There were two things that I looked at: one was uploading some Java-related content and the other was uploading database SQL files and having the review done on the quarterback.
The Java portion of it worked fine, and it was pretty seamless, but the database portion was not. We uploaded some files to use for vulnerabilities, and the tell-all portion of it was pretty easy. We uploaded a war file and Java files, and we got the reports back on these. They were pretty clear to understand. We did the same thing for the database portion for the most part. However, the content wasn't getting uploaded in a predictable fashion, and it was slow and hard to get done. We had to do it over and over. After it indicated that the content was uploaded, there were no results. There were zero search findings. It was possibly a user error, something that we didn't do correctly, but they had acknowledged that it was something they were currently enhancing. This is something that could be made easier if they haven't already done that. I don't know how many releases they've had in that timeframe. I haven't looked at it since then. It was a trial period.
What do I think about the stability of the solution?
It seemed fairly stable other than the database portion where the SQL files didn't seem to get uploaded.
What do I think about the scalability of the solution?
I didn't think there would be any concerns. We didn't exercise that. We didn't, in other words, try to upload gazillion artifacts and files. We just uploaded a few just to see how they handle it. It seemed fairly robust.
There were about ten Java and database developers who were using this solution. We were all collectively reviewing it and getting feedback on it.
How are customer service and technical support?
We didn't use their technical support.
Which solution did I use previously and why did I switch?
There was no other solution.
How was the initial setup?
I wasn't that involved in the setup. I was basically a reviewer after it was all done.
What about the implementation team?
I don't think there was any in-house work. I think it was just all on their server. We didn't have any equipment or any software per se other than just downloading a plugin or IDE, which essentially did the same sort of code analysis.
What's my experience with pricing, setup cost, and licensing?
Its cost for what we needed it for was too high. It wasn't too high for other companies and it was competitively priced, but for us, it just didn't fit. We did plan to use it and increase the usage. In the end, it may have been abandoned because of the cost, but I'm not a hundred percent sure. So, even though we had planned on using it more and more, because of the cost and the business conditions of things, we didn't have the opportunity to really use it more.
Which other solutions did I evaluate?
There were a few other solutions we had looked at, but they didn't seem to be as robust. They also didn't have good reviews. That's why we chose this solution.
What other advice do I have?
It is a robust software service for security analysis. It seemed to be pretty full-featured. We didn't exercise every single thing. Just a few of the features didn't seem to be up to snuff for our needs.
I would rate Veracode Manual Penetration Testing an eight out of ten.
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Buyer's Guide
Download our free Veracode Report and get advice and tips from experienced pros
sharing their opinions.
Updated: November 2024
Product Categories
Application Security Tools Static Application Security Testing (SAST) Container Security Software Composition Analysis (SCA) Penetration Testing Services Static Code Analysis Application Security Posture Management (ASPM)Popular Comparisons
SonarQube Server (formerly SonarQube)
GitLab
Checkmarx One
Snyk
Mend.io
Fortify on Demand
Sonatype Lifecycle
CrowdStrike Falcon Cloud Security
Acunetix
PortSwigger Burp Suite Professional
HCL AppScan
GitHub Advanced Security
Qualys Web Application Scanning
GitHub
Klocwork
Buyer's Guide
Download our free Veracode Report and get advice and tips from experienced pros
sharing their opinions.
Quick Links
Learn More: Questions:
- What is the biggest difference between Veracode and Checkmarx?
- Which gives you more for your money - SonarQube or Veracode?
- Checkmarx or Veracode. Which should we choose?
- Would you recommend Veracode? What are some of your use cases?
- Checkmarx vs SonarQube; SonarQube interoperability with Checkmarx or Veracode
- What do I scan when changing code in Veracode?
- If you had to both encrypt and compress data during transmission, which would you do first and why?
- When evaluating Application Security, what aspect do you think is the most important to look for?
- What are the Top 5 cybersecurity trends in 2022?
- What are the threats associated with using ‘bogus’ cybersecurity tools?
How good is adding agents working in Banking and financial and Healthcare industries?