We performed a comparison between Checkmarx One and Synopsys Defensics based on real PeerSpot user reviews.
Find out what your peers are saying about Sonar, Veracode, Checkmarx and others in Application Security Tools."The most valuable feature is the simple user interface."
"Checkmarx has helped us deliver more secure products. We are able to do static code analysis with the tool before shipping our code to production. When the integration is in the pipeline, this tool gives us early notifications on code fixes."
"The best thing about Checkmarx is the amount of vulnerabilities that it can find compared to other free tools."
"Vulnerability details is valuable."
"It's not an obstacle for developers. They can easily write their code and make it more secure with Checkmarx."
"The most valuable features of Checkmarx are the automation and information that it provides in the reports."
"The user interface is excellent. It's very user friendly."
"Helps us check vulnerabilities in our SAP Fiori application."
"Whatever the test suit they give, it is intelligent. It will understand the protocol and it will generate the test cases based on the protocol: protocol, message sequence, protocol, message structure... Because of that, we can eliminate a lot of unwanted test cases, so we can execute the tests and complete them very quickly."
"We have found multiple issues in our embedded system network protocols, related to buffer overflow. We have reduced some of these issues."
"The product is related to US usage with TLS contact fees, i.e. how more data center connections will help lower networking costs."
"Checkmarx could improve by reducing the price."
"Checkmarx could improve the speed of the scans."
"The validation process needs to be sped up."
"The solution's user interface could be improved because it seems outdated."
"Its pricing model can be improved. Sometimes, it is a little complex to understand its pricing model."
"C, C++, VB and T-SQL are not supported by this product. Although, C and C++ were advertised as being supported."
"In terms of dashboarding, the solution could provide a little more flexibility in terms of creating more dashboards. It has some of its own dashboards that come out of the box. However, if I have to implement my own dashboards that are aligned to my organization's requirements, that dashboarding feature has limited capability right now."
"The tool is currently quite static in terms of finding security vulnerabilities. It would be great if it was more dynamic and we had even more tools at our disposal to keep us safe. It would help if there was more scanning or if the process was more automated."
"It does not support the complete protocol stack. There are some IoT protocols that are not supported and new protocols that are not supported."
"Sometimes, when we are testing embedded devices, when we trigger the test cases, the target will crash immediately. It is very difficult for us to identify the root cause of the crash because they do not provide sophisticated tools on the target side. They cover only the client-side application... They do not have diagnostic tools for the target side. Rather, they have them but they are very minimal and not very helpful."
"Codenomicon Defensics should be more advanced for the testing sector. It should be somewhat easy and flexible to install."
Earn 20 points
Checkmarx One is ranked 3rd in Application Security Tools with 67 reviews while Synopsys Defensics is ranked 5th in Fuzz Testing Tools. Checkmarx One is rated 7.6, while Synopsys Defensics is rated 8.6. The top reviewer of Checkmarx One writes "The report function is a great, configurable asset but sometimes yields false positives". On the other hand, the top reviewer of Synopsys Defensics writes "Technical support provided protocol-specific documentation to prove that some positives were not false". Checkmarx One is most compared with SonarQube, Veracode, Fortify on Demand, Snyk and Coverity, whereas Synopsys Defensics is most compared with Snyk, SonarQube, Fortify on Demand, Invicti and OWASP WSFuzzer.
We monitor all Application Security Tools reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.