Checkmarx One vs F5 BIG-IP Local Traffic Manager (LTM) comparison

Cancel
You must select at least 2 products to compare!
Checkmarx Logo
34,421 views|22,362 comparisons
86% willing to recommend
F5 Logo
10,290 views|8,518 comparisons
83% willing to recommend
Comparison Buyer's Guide
Executive Summary

We performed a comparison between Checkmarx One and F5 BIG-IP Local Traffic Manager (LTM) based on real PeerSpot user reviews.

Find out in this report how the two Application Security Tools solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI.
To learn more, read our detailed Checkmarx One vs. F5 BIG-IP Local Traffic Manager (LTM) Report (Updated: March 2019).
769,662 professionals have used our research since 2012.
Featured Review
Quotes From Members
We asked business professionals to review the solutions they use.
Here are some excerpts of what they said:
Pros
"The solution is scalable, but other solutions are better.""The setup is fairly easy. We didn't struggle with the process at all.""The administration in Checkmarx is very good.""It shows in-depth code of where actual vulnerabilities are.""The main advantage of this solution is its centralized reporting functionality, which lets us track issues, then see and report on the priorities via a web portal.""The most valuable features of Checkmarx are the Best Fix Location and the Payments option because you can save a lot of time trying to mitigate the configuration. Using these tools can save you a lot of time.""The solution is always updating to continuously add items that create a level of safety from vulnerabilities. It's one of the key features they provide that's an excellent selling point. They're always ahead of the game when it comes to finding any vulnerabilities within the database.""It allows for SAST scanning of uncompiled code. Further, it natively integrates with all key repos formats (Git, TFS, SVN, Perforce, etc)."

More Checkmarx One Pros →

"The load balancing function, the monitors that you can create, and iRules programmability are most valuable.""Initial setup was straightforward. We were up and running in three hours.""NetFlow balancing and traffic balancing are good features.""The feature I find the most valuable is the support infrastructure.""Where we are finding the AWS version helpful is when we are trying to scale up new environments. AWS Marketplace helps here a lot.""We like the capability to combine the content switching with the intrusion prevention and adding the security roles, so we can expose certain sub-pieces outside without exposing everything.""It helps us recognize sessions from certain IPs that are authorized to manage the application. This is a function we haven't found anywhere else.""F5 BIG-IP Local Traffic Manager (LTM) is very easy to use, from SSL Management to enabling, disabling loads, applications, systems, and monitoring. Overall the solution keeps our application functional from a client's perspective 24 hours a day, seven days a week."

More F5 BIG-IP Local Traffic Manager (LTM) Pros →

Cons
"We are trying to find out if there is a way to identify the run-time null values. I am analyzing different tools to check if there is any tool that supports run-time null value identification, but I don't think any of the tools in the market currently supports this feature. It would be helpful if Checkmarx can identify and throw an exception for a null value at the run time. It would make things a lot easier if there is a way for Checkmarx to identify nullable fields or hard-coded values in the code. The accessibility for customized Checkmarx rules is currently limited and should be improved. In addition, it would be great if Checkmarx can do static code and dynamic code validation. It does a lot of security-related scanning, and it should also do static code and dynamic code validation. Currently, for security-related validation, we are using Checkmarx, and for static code and dynamic code validation, we are using some other tools. We are spending money on different tools. We can pay a little extra money and use Checkmarx for everything.""Updating and debugging of queries is not very convenient.""Checkmarx could improve the speed of the scans.""Checkmarx could improve the solution reports and false positives. The false positives could be reduced. For example, we have alerts that are tagged as vulnerabilities but when you drill down they are not.""Checkmarx has a slightly difficult compilation with the CI/CD pipeline.""Integration into the SDLC (i.e. support for last version of SonarQube) could be added.""If it is a very large code base then we have a problem where we cannot scan it.""The product can be improved by continuing to expand the application languages and frameworks that can be scanned for vulnerabilities. This includes expanded coverage for mobile applications as well as open-source development tools."

More Checkmarx One Cons →

"Its price can be better. It is a bit expensive.""Implementing whitepapers with a lot more applications could easily be added.""I'm not very sure about the security with F5 BIG-IP Local Traffic Manager (LTM). We have our own private data center, but we are going to migrate our private data center into the Azure cloud environment. Security will then be a major concern when we migrate our own whole infrastructure to the public cloud.""The management interface is unclear, complex, and not concise. I would like a better user interface.""Technical support could be improved.""The solution's hardware quality needs improvement.""Based on my experience using F5 and by only taking into consideration the last seven years, I have found that the reporting mechanism is bad.""The SharePoint SSO part has some room for improvement."

More F5 BIG-IP Local Traffic Manager (LTM) Cons →

Pricing and Cost Advice
  • "It is the right price for quality delivery."
  • "I believe pricing is better compared to other commercial tools."
  • "The pricing was not very good. This is just a framework which shouldn’t cost so much."
  • "The pricing is competitive and provides a lower TCO (total cost of ownership) for achieving application security."
  • "It is a good product but a little overpriced."
  • "The license has a vague language around P1 issues and the associated support. Make sure to review these in order to align them with your organizational policies."
  • "​Checkmarx is not a cheap scanning tool, but none of the security tools are cheap. Checkmarx is a powerful scanning tool, and it’s essential to have one of these products."
  • "We got a special offer for a 30% reduction for three years, after our first year. I think for a real source-code scanning tool, you have to add a lot of money for Open Source Analysis, and AppSec Coach (160 Euro per user per year)."
  • More Checkmarx One Pricing and Cost Advice →

  • "Though functionality is high, its cost can be considered slightly higher than its competitors​."
  • "The licensing pricing seems relatively easy enough to get your head around. I would advise anyone to ensure that you have a conversation with an F5 consultant before purchasing, as you would with most products."
  • "Take a look at the modules that you are going to use. Look into the best bundles for them."
  • "The only area that has room for improvement would be pricing, so its competitors do not have a say."
  • "If your IT budget is good, go for it."
  • "This product is costly from a licensing perspective considering its competitors."
  • "Check other vendors like Cisco, Citrix or A10 Networks. There are plenty in the market with which you can achieve same thing."
  • "Great product for the money. But they can get really expensive, so get what meets your needs."
  • More F5 BIG-IP Local Traffic Manager (LTM) Pricing and Cost Advice →

    report
    Use our free recommendation engine to learn which Application Security Tools solutions are best for your needs.
    769,662 professionals have used our research since 2012.
    Questions from the Community
    Top Answer:I would like to recommend Checkmarx. With Checkmarx, you are able to have an all in one solution for SAST and SCA as well. Veracode is only a cloud solution. Hope this helps.
    Top Answer:Compared to the solutions we used previously, Checkmarx has reduced our workload by almost 75%.
    Top Answer:The solution's price is high and you pay based on the number of users.
    Top Answer:The support from F5 BIG-IP LTM is good.
    Top Answer:There are a few licensing options available for F5 BIG-IP LTM. You can have a perpetual license which is a lifetime license. You then only need to renew the support, if you choose to open a ticket… more »
    Top Answer:The pricing must be more flexible. We get billed for firewalls based on the usage. It will be helpful if the solution provides such flexibility.
    Ranking
    Views
    34,421
    Comparisons
    22,362
    Reviews
    21
    Average Words per Review
    513
    Rating
    7.7
    Views
    10,290
    Comparisons
    8,518
    Reviews
    29
    Average Words per Review
    485
    Rating
    8.4
    Comparisons
    Also Known As
    F5 BIG-IP, BIG-IP LTM, F5 ASM, Viprion, F5 BIG-IP Virtual Edition , Crescendo Networks Application Delivery Controller, BIG IP
    Learn More
    Overview

    Checkmarx is a highly accurate and flexible static code analysis product that allows organizations to automatically scan uncompiled code and identify hundreds of security vulnerabilities in all major coding languages and software frameworks. Checkmarx is available as a standalone product and can be effectively integrated into the software development lifecycle (SDLC) to streamline vulnerability detection and remediation. Checkmarx is trusted by leading organizations such as SAP, Samsung, and Salesforce.com.

    Checkmarx is a global leader in software security solutions for modern software development. Checkmarx delivers a comprehensive software security platform that unites with DevOps by scanning uncompiled source code for security vulnerabilities early in the development life cycle to reduce and remediate risk from software vulnerabilities. Using Checkmarx, teams avoid software security vulnerabilities managed via a single and unified dashboard without slowing down their delivery schedule.

    Checkmarx balances the needs of the entire organization, delivering seamless security from the start and throughout the entire software development life cycle. Checkmarx can be deployed on-premises in a private data center or hosted via a public cloud.

    Checkmarx Features

    Some of Checkmarx’s features include:

    • Source code scanning: Detect and repair more vulnerabilities before you release your code.

    • Open-source scanning: Find and eliminate the risks in your open-source code.

    • Interactive code scanning: Scan for vulnerabilities and runtime threats.

    • Open-source security for infrastructure as code: Identify and fix insecure IaC configurations that put your application at risk.

    Reviews from Real Users

    Checkmarx stands out among its competitors for a number of reasons. Two major ones are its ability to enable developers to secure their code with a single management dashboard and its high-speed scanning abilities.

    PeerSpot users note the effectiveness of these features. A CEO at a tech services company writes, “The most valuable features are the easy-to-understand interface, and it’s very user-friendly. We spend some time tuning to start scanning a new project, which is only a few clicks. A few simple tunes for custom rules and we can start our scan. We can do the work quickly and we don't need to compile the source code because Checkmarx does the work without compiling the project. The scanning is very quick. It's about 20,000 lines per hour, which is a good speed for scanning.”

    A director at a tech services company notes, “The features and technologies are very good. The flexibility and the roadmap have also been very good. They're at the forefront of delivering the additional capabilities that are required with cloud delivery, etc. Their ability to deliver what customers require and when they require is very important.”

    A senior manager at a manufacturing company writes, “The identification of verification-related security vulnerabilities is really important and one of the key things. It also identifies vulnerabilities for any kind of third-party tool coming into the system or any third-party tools that you are using, which is very useful for avoiding random hacking."

    F5 BIG-IP LTM optimizes the speed and reliability of your apps via both network and application layers. Using real-time protocol and traffic management decisions based on app and server and connection management conditions, and TCP and content offloading, BIG-IP LTM dramatically improves application and infrastructure responsiveness. BIG-IP LTM's architecture includes protocol awareness to control traffic for the most important applications. BIG-IP LTM tracks the dynamic performance levels of servers and delivers SSL performance and visibility for inbound and outbound traffic, to protect the user experience by encrypting everything from the client to the server.

    BIG-IP LTM provides enterprise-class Application Delivery Controller (ADC). You get granular layer 7 control, SSL offloading and acceleration capabilities, and advanced scaling technologies that deliver performance and reliability on-demand. The highly optimized TCP/IP stack combines TCP/IP techniques and improvements in the latest RFCs with extensions to minimize the effect of congestion and packet loss and recovery. Independent testing tools and customer experiences show LTM's TCP stack delivers up to a 2x performance gain for users and a 4x increase in bandwidth efficiency.

    Sample Customers
    YIT, Salesforce, Coca-Cola, SAP, U.S. Army, Liveperson, Playtech Case Study: Liveperson Implements Innovative Secure SDLC
    Riken, TransUnion, Tepco Systems Administration, Daejeon University, G&T Bank, Danamon, CyberAgent Inc.
    Top Industries
    REVIEWERS
    Computer Software Company31%
    Financial Services Firm19%
    Comms Service Provider9%
    Manufacturing Company9%
    VISITORS READING REVIEWS
    Financial Services Firm21%
    Computer Software Company15%
    Manufacturing Company9%
    Insurance Company5%
    REVIEWERS
    Comms Service Provider20%
    Financial Services Firm15%
    Computer Software Company15%
    Media Company6%
    VISITORS READING REVIEWS
    Financial Services Firm17%
    Computer Software Company14%
    Government9%
    Comms Service Provider7%
    Company Size
    REVIEWERS
    Small Business38%
    Midsize Enterprise13%
    Large Enterprise50%
    VISITORS READING REVIEWS
    Small Business17%
    Midsize Enterprise11%
    Large Enterprise72%
    REVIEWERS
    Small Business33%
    Midsize Enterprise17%
    Large Enterprise50%
    VISITORS READING REVIEWS
    Small Business18%
    Midsize Enterprise14%
    Large Enterprise68%
    Buyer's Guide
    Checkmarx One vs. F5 BIG-IP Local Traffic Manager (LTM)
    March 2019
    Find out what your peers are saying about Checkmarx One vs. F5 BIG-IP Local Traffic Manager (LTM) and other solutions. Updated: March 2019.
    769,662 professionals have used our research since 2012.

    Checkmarx One is ranked 3rd in Application Security Tools with 67 reviews while F5 BIG-IP Local Traffic Manager (LTM) is ranked 1st in Application Delivery Controllers (ADC) with 116 reviews. Checkmarx One is rated 7.6, while F5 BIG-IP Local Traffic Manager (LTM) is rated 8.2. The top reviewer of Checkmarx One writes "The report function is a great, configurable asset but sometimes yields false positives". On the other hand, the top reviewer of F5 BIG-IP Local Traffic Manager (LTM) writes "Helps deliver applications to users in a reliable, secure, and optimized way". Checkmarx One is most compared with SonarQube, Veracode, Fortify on Demand, Snyk and Coverity, whereas F5 BIG-IP Local Traffic Manager (LTM) is most compared with Citrix NetScaler, Fortinet FortiADC, Microsoft Azure Application Gateway, NGINX Plus and A10 Networks Thunder ADC. See our Checkmarx One vs. F5 BIG-IP Local Traffic Manager (LTM) report.

    We monitor all Application Security Tools reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.