We Scan Your Source Code

Identify software security vulnerabilities & fix them

  • Easy to use
  • Scans uncompiled code
  • Highly accurate
  • On-Premise & On-Demand

Start A FREE Trial

Testimonials

Atlassian Logo Thumbnail

“Using Checkmarx is easier than other tools. Important – you do not need to integrate it into your build process, just throw source code at it.”

Vitaly Osipov -
Information Security Expert - Atlassian

Playtech Logo 119x35

Checkmarx is loved by both our infosec team and our developers. It is easy to use and provides highly accurate results combined with the flexibility we need to enforce our application security policy.

Kobi Lechner -
Information Security Manager - Playtech

logo_liveperson_0 thumbnail 119width

“Checkmarx’s technology is highly accurate and easy to use. It offers great performance and the ability to scan incomplete code samples. It was agile enough to support specific requests we had for our secure SDLC and was the most sensible decision commercially”

Yair Rovek -
Security Specialist - LivePerson

US Army

The US Army is a longtime customer of Checkmarx’s next generation Source Code Analysis (SCA).

US Army

salesforce.com logo 86x67

salesforce.com selected Checkmarx’s next generation static code analysis tool as the official Force.com Security Source Code Scanner. With hundreds of millions LoC scanned to date, Checkmarx ensures all AppExchange applications are secured to the highest standards.

salesforce.com

Checkmarx Blog

April 2014
24

Top-Selling WiFi DSL Modems Routing Hackers Your Way

WiFi DSL routers have become a staple part of all professional computing setups. Unfortunately, wireless communication also introduces numerous vulnerabilities. A massive backdoor was found in popular NetGear, Linksys/Cisco and SerComm WiFi DSL modems back in December 2014. Security patches released by the companies have not solved the problem. More than…

April 2014
23

Web App Attacks: 7 Takeaways from the New Verizon DBIR

Hackers going after Web applications are getting smarter and faster by automating their malicious tools, and organizations are struggling to keep up. This was among the biggest revelations in Verizons’ 2014 Data Breach Investigations Report. The report analyzed over 63,000 security incidents over the past year, 1,367 of which resulted…

April 2014
22

Mind Your Fingers. Samsung Galaxy S5 Fingerprint Scanner Exploited

Fingerprint scanners are becoming the rage in the smartphone industry. Apple introduced its proprietary sensor in its flagship 5s device last year and Samsung has done it recently with its new Galaxy S5 model. But its not all good news. The Korean manufacturer’s latest security solution can be rendered useless…

April 2014
18

5 Security Stories To Know Right Now

While the Heartbleed bug again dominated the news this week, a few other security stories deserve some love. Here are your top five of the week – get caught up for the weekend! Michaels Credit Card Breach: 3 Million Customers At Risk The arts and crafts chain Michaels Stores Inc….

April 2014
16

The Honeypot Sting: Hacking the Hackers

How can you tell who’s up to no good when it comes to your networks and computer systems? Simon Bell, a computer science student in his last year at the University of Sussex, has set out to help answer that question. He’s created an SSH (Secure Shell) honeypot written in…