We Scan Your Source Code

Identify software security vulnerabilities & fix them

  • Easy to use
  • Scans uncompiled code
  • Highly accurate
  • On-Premise & On-Demand

Start A FREE Trial

Testimonials

Playtech Logo 119x35

Checkmarx is loved by both our infosec team and our developers. It is easy to use and provides highly accurate results combined with the flexibility we need to enforce our application security policy.

Kobi Lechner -
Information Security Manager - Playtech

salesforce.com logo 86x67

salesforce.com selected Checkmarx’s next generation static code analysis tool as the official Force.com Security Source Code Scanner. With hundreds of millions LoC scanned to date, Checkmarx ensures all AppExchange applications are secured to the highest standards.

salesforce.com

Atlassian Logo Thumbnail

“Using Checkmarx is easier than other tools. Important – you do not need to integrate it into your build process, just throw source code at it.”

Vitaly Osipov -
Information Security Expert - Atlassian

logo_liveperson_0 thumbnail 119width

“Checkmarx’s technology is highly accurate and easy to use. It offers great performance and the ability to scan incomplete code samples. It was agile enough to support specific requests we had for our secure SDLC and was the most sensible decision commercially”

Yair Rovek -
Security Specialist - LivePerson

US Army

The US Army is a longtime customer of Checkmarx’s next generation Source Code Analysis (SCA).

US Army

Checkmarx Blog

April 2014
22

Mind Your Fingers. Samsung Galaxy S5 Fingerprint Scanner Exploited

Fingerprint scanners are becoming the rage in the smartphone industry. Apple introduced its proprietary sensor in its flagship 5s device last year and Samsung has done it recently with its new Galaxy S5 model. But its not all good news. The Korean manufacturer’s latest security solution can be rendered useless…

April 2014
18

5 Security Stories To Know Right Now

While the Heartbleed bug again dominated the news this week, a few other security stories deserve some love. Here are your top five of the week – get caught up for the weekend! Michaels Credit Card Breach: 3 Million Customers At Risk The arts and crafts chain Michaels Stores Inc….

April 2014
16

The Honeypot Sting: Hacking the Hackers

How can you tell who’s up to no good when it comes to your networks and computer systems? Simon Bell, a computer science student in his last year at the University of Sussex, has set out to help answer that question. He’s created an SSH (Secure Shell) honeypot written in…

April 2014
13

Mobile Sunday: Sandroid Trojan; From Russia with Love

The smartphone revolution is enabling the harvesting of banking information and credit card numbers in new ways. There were almost 100,000 malicious modifications to mobile malware in 2013, with over 98% connected to the Android platform. Sandroid is the latest high-profile mobile Trojan, wreaking havoc amongst middle-east banking customers. This…

April 2014
11

Top 5 in Security: Your Weekly Update

The security industry took a massive hit this week with the Heartbleed bug, and while it took most of the focus, there’s some notable news that you may have missed. Here are your top 5 security stories of the week: Heartbleed Bug Wreaks Havoc On The Internet The Heartbleed bug…