We performed a comparison between Checkmarx One and Synopsys Defensics based on real PeerSpot user reviews.
Find out what your peers are saying about Sonar, Veracode, Checkmarx and others in Application Security Tools."It shows in-depth code of where actual vulnerabilities are."
"The product's most valuable feature is static code and supply chain effect analysis. It provides a lot of visibility."
"Checkmarx pinpoints the vulnerability in the code and also presents the flow of malicious input across the application."
"It can integrate very well with DAST solutions. So both of them are combined into an integrated solution for customers running application security."
"Our static operation security has been able to identify more security issues since implementing this solution."
"It's not an obstacle for developers. They can easily write their code and make it more secure with Checkmarx."
"The ability to track the vulnerabilities inside the code (origin and destination of weak variables or functions)."
"The solution has good performance, it is able to compute in 10 to 15 minutes."
"The product is related to US usage with TLS contact fees, i.e. how more data center connections will help lower networking costs."
"We have found multiple issues in our embedded system network protocols, related to buffer overflow. We have reduced some of these issues."
"Whatever the test suit they give, it is intelligent. It will understand the protocol and it will generate the test cases based on the protocol: protocol, message sequence, protocol, message structure... Because of that, we can eliminate a lot of unwanted test cases, so we can execute the tests and complete them very quickly."
"With Checkmarx, normally you need to use one tool for quality and you need to use another tool for security. I understand that Checkmarx is not in the parity space because it's totally different, but they could include some free features or recommendations too."
"I would like to see the tool’s pricing improved."
"Checkmarx could improve the speed of the scans."
"The product can be improved by continuing to expand the application languages and frameworks that can be scanned for vulnerabilities. This includes expanded coverage for mobile applications as well as open-source development tools."
"Checkmarx has a slightly difficult compilation with the CI/CD pipeline."
"Checkmarx needs to be more scalable for large enterprise companies."
"If it is a very large code base then we have a problem where we cannot scan it."
"Licensing models and Swift language support are the aspects in which this product needs to improve. Swift is a new language, in which major customers require support for lower prices."
"Codenomicon Defensics should be more advanced for the testing sector. It should be somewhat easy and flexible to install."
"It does not support the complete protocol stack. There are some IoT protocols that are not supported and new protocols that are not supported."
"Sometimes, when we are testing embedded devices, when we trigger the test cases, the target will crash immediately. It is very difficult for us to identify the root cause of the crash because they do not provide sophisticated tools on the target side. They cover only the client-side application... They do not have diagnostic tools for the target side. Rather, they have them but they are very minimal and not very helpful."
Earn 20 points
Checkmarx One is ranked 3rd in Application Security Tools with 67 reviews while Synopsys Defensics is ranked 5th in Fuzz Testing Tools. Checkmarx One is rated 7.6, while Synopsys Defensics is rated 8.6. The top reviewer of Checkmarx One writes "The report function is a great, configurable asset but sometimes yields false positives". On the other hand, the top reviewer of Synopsys Defensics writes "Technical support provided protocol-specific documentation to prove that some positives were not false". Checkmarx One is most compared with SonarQube, Veracode, Fortify on Demand, Snyk and Coverity, whereas Synopsys Defensics is most compared with SonarQube, Snyk, Fortify on Demand, Invicti and OWASP Zap.
We monitor all Application Security Tools reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.