We Scan Your Source Code

Identify software security vulnerabilities & fix them

  • Easy to use
  • Scans uncompiled code
  • Highly accurate
  • On-Premise & On-Demand

Start A FREE Trial

Testimonials

salesforce.com logo 86x67

salesforce.com selected Checkmarx’s next generation static code analysis tool as the official Force.com Security Source Code Scanner. With hundreds of millions LoC scanned to date, Checkmarx ensures all AppExchange applications are secured to the highest standards.

salesforce.com

Checkmarx plays a fundamental role in hardening our web application. Exploits are becoming more sophisticated and Checkmarx is our first line of defense.

Daniel Bondurant -
CTO Wiredrive.com

logo_liveperson_0 thumbnail 119width

“Checkmarx’s technology is highly accurate and easy to use. It offers great performance and the ability to scan incomplete code samples. It was agile enough to support specific requests we had for our secure SDLC and was the most sensible decision commercially”

Yair Rovek -
Security Specialist - LivePerson

US Army

The US Army is a longtime customer of Checkmarx’s next generation Source Code Analysis (SCA).

US Army

Playtech Logo 119x35

Checkmarx is loved by both our infosec team and our developers. It is easy to use and provides highly accurate results combined with the flexibility we need to enforce our application security policy.

Kobi Lechner -
Information Security Manager - Playtech

Checkmarx Blog

May 2014
30

Hacking It Forward

How do security researchers stay motivated and interested? For some of us, it seems like one XSS flaw or SQL injection would look exactly like the next, but the thrill of discovering these security vulnerabilities is more than enough to keep the fire going for some researchers. Osanda Malith Jayathissa,…

May 2014
27

eBay Data Breach: A Big Wake-Up Call for e-Commerce Giants

eBay, the world’s largest and most used eCommerce platform, has suffered a major security breach. More than 100 million users have been affected in what has become this year’s biggest cybercrime so far. It’s still not clear how the intruders gained access to the eBay databases, but this is definitely…

May 2014
20

Learning from the Experts – How JavaScript and HTML5 Vulnerabilities Affect Application Security

Checkmarx recently sponsored an educational webinar to raise Application Security awareness amongst developers and IT professionals. JavaScript and HTML5 were given special attention in the online event hosted by SecureWorld. The aim was to shed some light on the vulnerabilities created by the integration of new features and functionality into…

May 2014
14

7 Tips For Choosing The Right Tool To Secure Your Application

With more and more leading applications and websites are being hacked, internet users are thinking twice before sharing personal information online. With hacktivism, commercial espionage and criminal hackings on the rise, it has become extremely crucial to safeguard databases and make sure that adequate application-layer security is in place. Unfortunately,…

May 2014
05

IoT-Hacking Horror Stories: Screaming at Babies & Jamming the Roads

In the ‘wonderful world’ of the Internet of Things, two interesting stories – one about hacking traffic systems and another about attackers screaming at babies in their cribs – have recently popped up that should make us stop and think about its current state of security.  Taking It To The…