We Scan Your Source Code

Identify software security vulnerabilities & fix them

  • Easy to use
  • Scans uncompiled code
  • Highly accurate
  • On-Premise & On-Demand

Start A FREE Trial

Testimonials

logo_liveperson_0 thumbnail 119width

“Checkmarx’s technology is highly accurate and easy to use. It offers great performance and the ability to scan incomplete code samples. It was agile enough to support specific requests we had for our secure SDLC and was the most sensible decision commercially”

Yair Rovek -
Security Specialist - LivePerson

Atlassian Logo Thumbnail

“Using Checkmarx is easier than other tools. Important – you do not need to integrate it into your build process, just throw source code at it.”

Vitaly Osipov -
Information Security Expert - Atlassian

Checkmarx plays a fundamental role in hardening our web application. Exploits are becoming more sophisticated and Checkmarx is our first line of defense.

Daniel Bondurant -
CTO Wiredrive.com

US Army

The US Army is a longtime customer of Checkmarx’s next generation Source Code Analysis (SCA).

US Army

salesforce.com logo 86x67

salesforce.com selected Checkmarx’s next generation static code analysis tool as the official Force.com Security Source Code Scanner. With hundreds of millions LoC scanned to date, Checkmarx ensures all AppExchange applications are secured to the highest standards.

salesforce.com

Checkmarx Blog

April 2014
18

5 Security Stories To Know Right Now

While the Heartbleed bug again dominated the news this week, a few other security stories deserve some love. Here are your top five of the week – get caught up for the weekend! Michaels Credit Card Breach: 3 Million Customers At Risk The arts and crafts chain Michaels Stores Inc….

April 2014
16

The Honeypot Sting: Hacking the Hackers

How can you tell who’s up to no good when it comes to your networks and computer systems? Simon Bell, a computer science student in his last year at the University of Sussex, has set out to help answer that question. He’s created an SSH (Secure Shell) honeypot written in…

April 2014
13

Mobile Sunday: Sandroid Trojan; From Russia with Love

The smartphone revolution is enabling the harvesting of banking information and credit card numbers in new ways. There were almost 100,000 malicious modifications to mobile malware in 2013, with over 98% connected to the Android platform. Sandroid is the latest high-profile mobile Trojan, wreaking havoc amongst middle-east banking customers. This…

April 2014
11

Top 5 in Security: Your Weekly Update

The security industry took a massive hit this week with the Heartbleed bug, and while it took most of the focus, there’s some notable news that you may have missed. Here are your top 5 security stories of the week: Heartbleed Bug Wreaks Havoc On The Internet The Heartbleed bug…

April 2014
10

All You Wanted to Know About the Heartbleed Bug

The steep rise in E-commerce and online transactions has made application security a major priority. SSL and TLS protocols were the benchmarks of online safety until recently. Everything changed when Random Storm, a British security company, exposed the Heartbleed bug. This major vulnerability has simply dented the once reliable OpenSSL technology. Hundreds of…