Skip to Content
logo

Docs

  • Home
  • Quick start
    • FAQ
      • Billing
      • Integrations
      • Platform
      • Scanner
      • Ask our pentesters to explain a vulnerability
      • Fix code with gen AI from the IDE
      • See safe dependency versions
      • Import repositories to test
      • Invite team members to sign up
      • Billing for the Advanced plan
      • Continuous Hacking free trial, plans and pricing
      • Continuous Hacking methodology
      • Continuous Hacking PoV
      • CVSSF metric
      • Glossary
      • Main website
      • Platform demo
      • Tutorial videos
      • What is DAST?
      • What is SAST?
      • What is SCA?
      • Assign vulnerability remediation to a team member
      • See details of the reported security vulnerabilities
    • Sign up to Fluid Attacks
      • Break the build
      • Install CI Gate to break the build
      • Verify whether a fix was successful
  • Find and fix
    • Use the platform
        • Sign-up and login
        • Interface and sections
        • Groups section
        • Group configuration
        • Create and delete groups
        • Create another organization
        • Portfolios
        • ToE and SBOM
        • Register payment method
        • Members
        • Understand roles
        • Group authors
        • Organization authors
        • Repositories
        • Import them with OAuth
        • Repositories out of scope
        • Credentials
        • Environments
        • Resolve events
        • Analyze your supply chain security
        • Assign treatments
        • Correlate your threat model to vulnerabilities
        • CVSS score adjustment
        • Examine the evidence of exploitability
        • Find reachable dependency vulnerabilities
        • Request a vulnerability be dismissed as Zero Risk
        • See vulnerabilities assigned to you
        • See where vulnerabilities are and more details
        • Verify fixes with reattacks
        • Vulnerability signature update
      • Help options
        • AI Agent
        • Live chat
        • Email
        • Comments
        • Talk to a Pentester
        • Tutorial videos or demo
        • Vulnerability reporting
        • Standard compliance
        • ZTNA logs
        • Recent downloads
        • Common analytics
        • Organization analytics
        • Group analytics
        • Portfolio analytics
        • Chart options
        • CI Gate configuration
        • CI Gate executions
        • Security gates
        • Vulnerability acceptance
        • Prioritization attributes
        • Explore the user menu
        • Enable and disable notifications
        • Subscribe to News
        • Leave a group
      • See vulnerabilities
        • Fluid Attacks' scanners
        • OWASP Benchmark results
        • Your feedback
      • Use the scanners
        • Local run
        • CI/CD integration
        • Understanding outputs
        • Findings exclusion
      • Use a configuration file
        • SAST scanner
        • SCA scanner
        • DAST scanner
        • APK scanner
      • Automatic remediation
      • Custom remediation guides
      • Introduction to Sorts
      • Sorts user guide
      • Connection mechanisms
      • Cloud connection
      • Egress connection
      • Connector connection
      • Types of authentication
      • AWS CodeCommit
    • Service-level agreement
      • Availability SLA
      • Response SLA
      • Accuracy SLA
      • False negatives
      • False positives
      • Scope
    • Support information
      • Changelog
        • 2023
        • 2024
        • 2025
        • 2026
      • Roadmap
      • AI functions
      • Attack surfaces
      • Binaries
      • Browsers
      • CI/CD
      • Clouds
      • CVEs for reachability
      • Evidence formats
      • Frameworks
      • IDE functionalities
      • Languages
      • Languages for fixes
      • Package managers
      • Remediation
      • SCM systems
      • Secrets
      • Standards
      • Ticketing systems
      • Documentation sections
  • Integrations
      • Bug-tracking systems
      • Tools and integrations
      • Access Talk to a Pentester and help from Jira issues
      • Automate Jira issue creation
      • Create Jira issues for vulnerabilities
      • Go to vulnerability evidence and more from Jira issues
      • Install the Fluid Attacks app for Jira Cloud
      • Link vulnerabilities to Jira issues or unlink them
      • Request reattacks from Jira issues
      • Set up the Jira integration
      • Set up the Azure DevOps integration
      • Set up the GitLab integration
    • VS Code
      • Functions
      • Troubleshooting
      • Identify and address vulnerabilities from IntelliJ
      • Install the IntelliJ plugin
      • Identify and address vulnerabilities from Cursor
      • Install the Cursor extension
      • AWS Marketplace integration
    • MCP server
      • Installation
      • Capabilities and use cases
      • Docker installation
    • PR/MR scanner
      • For GitLab
      • For Azure DevOps
      • Troubleshooting
      • File exclusion
    • API
      • Learn the basics
    • Webhooks
  • Stack
      • Bash
      • Python
      • Terraform
      • TypeScript
      • Ariadne
      • Commitlint
      • D3
      • Docker
      • ESLint
      • GraphQL
      • Hypercorn
      • Kubernetes
      • Labels
      • Mypy
      • Nix Flakes
      • Platform audit logs
      • Platform authentication
      • Platform authorization
      • Pydantic
      • Pydantic AI
      • React
      • Ruff
      • Sops
      • Starlette
      • Tree-sitter
      • Visual Studio Code
      • AWS
      • Batch
      • Bedrock
      • BigCodeBench
      • BugSnag
      • Checkly
      • Claude 3.5 Sonnet
      • Cloudflare
      • CloudWatch
      • Cost Management
      • Datadog
      • dbt
      • DynamoDB
      • EBS
      • EC2
      • EKS
      • ELB
      • Engineering metrics
      • ePayco
      • EventBridge
      • GitLab
      • GitLab CI
      • Google Workspace
      • IAM
      • Jamf
      • KMS
      • Lambda
      • LogRocket
      • Okta
      • OpenAI
      • OpenSearch
      • Organizations
      • QuickSight
      • S3
      • SageMaker
      • Snowflake
      • Statuspage
      • Step Functions
      • Stripe
      • Treli
      • Ubiquiti
      • Vanta
      • Voyage AI
      • VPC
      • VPN
      • Zoho One
      • Zoho Sign
    • Pentesting tools
  • Compliance
    • Authentication
      • Clients
      • Password policies
      • Staff
    • Authorization
      • Access revocation
      • Clients
      • Employee termination
      • Endpoints
      • Secret rotation
      • Sessions
      • Staff
    • Availability
      • Distributed apps
      • Distributed firewall
      • Everything backed up
      • Multiple zones
      • Recovery objective
    • Confidentiality
      • Device (re)enrolling
      • Direct hiring
      • Encryption at rest
      • Encryption in transit
      • No personal gain
      • Personnel NDA
      • Secure deletion
    • Integrity
      • Applicant evaluation
      • Awareness
      • Certification Hub
      • Certified cloud provider
      • Certified security analysts
      • Comprehensive reporting
      • Developing for integrity
      • Monitoring
      • Production data isolation
      • Secure emails
      • SLSA compliance
      • Standard timezone
      • Static website
      • Training plan
    • Non-repudiation
      • Everything as code
      • Extensive logs
    • Privacy
      • Data privacy policy
      • Data retention policy
      • Data use policy
      • Email obfuscation
      • Time tracking
      • Manual for the NDR
      • Subprocessor OpenAI
      • OTR messaging
      • Polygraph tests
      • Project pseudonymization
      • Data transmission
      • Unsubscribe email
      • Use of cookies
    • Resilience
      • Continuity and recovery
      • Equipment and telecommuting
      • Everything is decentralized
      • Redundant roles
    • Transparency
      • Complaint management
      • Data leakage policy
      • Ethics hotline
      • Help channel
      • Incident management
      • Information security responsibility
      • Open source
      • Quality policy
      • Status page
      • Testing our technology
      • Vulnerability releasing
  • Compare
    • 42Crunch
    • 7 Way Security
    • Aikido
    • Anvil Secure
    • Apiiro
    • AppCheck
    • Appdome
    • Appknox
    • Aqua
    • Armorcode
    • Arnica
    • Astra
    • Backslash
    • Base4
    • Bishop Fox
    • Black Duck
    • Black Hills
    • Breachlock
    • Bright Security
    • Burp Suite
    • Checkmarx
    • CloudGuard
    • Cobalt
    • Codacy
    • Conviso
    • Cure53
    • Cycode
    • Cyscope
    • Cyver
    • Data Theorem
    • DataDog
    • DeepSource
    • DefectDojo
    • Detectify
    • Devel
    • Dynatrace
    • Edgescan
    • Endor Labs
    • Escape
    • Evolve Security
    • Faraday Security
    • FortiDevSec
    • Fortify
    • GitHub Advanced Security (GHAS)
    • Ghost Security
    • GitLab Ultimate
    • GuardRails
    • HackerOne
    • Hackmetrix
    • Hadrian
    • HCL AppScan
    • Heeler
    • Hopper Security
    • ImmuniWeb
    • Inspectiv
    • Intigriti
    • Intruder
    • Invicti
    • JFrog
    • Jit
    • Kiuwan
    • Legit Security
    • Mandiant
    • Mend
    • Mindgard
    • Moderne
    • NetSPI
    • NowSecure
    • Nucleus Security
    • Oligo Security
    • Orca Security
    • Oversecured
    • OX Security
    • Phoenix Security
    • PlexTrac
    • Praetorian
    • Prancer
    • Prisma Cloud
    • Probely
    • Prowler
    • ReversingLabs
    • RunSybil
    • Safety
    • Securitum
    • Seemplicity
    • Semgrep
    • Snyk
    • Socket
    • SonarQube
    • Sonatype Lifecycle
    • SOOS
    • StackHawk
    • Strike
    • Synacktiv
    • Tenable Nessus
    • ThreatModeler
    • Veracode
    • White Jaguars
    • Wiz
    • Xygeni
    • ZAP
    • ZeroPath

  • Log in to the platform 
  • Home
  • Quick start
    • FAQ
      • Billing
      • Integrations
      • Platform
      • Scanner
      • Ask our pentesters to explain a vulnerability
      • Fix code with gen AI from the IDE
      • See safe dependency versions
      • Import repositories to test
      • Invite team members to sign up
      • Billing for the Advanced plan
      • Continuous Hacking free trial, plans and pricing
      • Continuous Hacking methodology
      • Continuous Hacking PoV
      • CVSSF metric
      • Glossary
      • Main website
      • Platform demo
      • Tutorial videos
      • What is DAST?
      • What is SAST?
      • What is SCA?
      • Assign vulnerability remediation to a team member
      • See details of the reported security vulnerabilities
    • Sign up to Fluid Attacks
      • Break the build
      • Install CI Gate to break the build
      • Verify whether a fix was successful
  • Find and fix
    • Use the platform
        • Sign-up and login
        • Interface and sections
        • Groups section
        • Group configuration
        • Create and delete groups
        • Create another organization
        • Portfolios
        • ToE and SBOM
        • Register payment method
        • Members
        • Understand roles
        • Group authors
        • Organization authors
        • Repositories
        • Import them with OAuth
        • Repositories out of scope
        • Credentials
        • Environments
        • Resolve events
        • Analyze your supply chain security
        • Assign treatments
        • Correlate your threat model to vulnerabilities
        • CVSS score adjustment
        • Examine the evidence of exploitability
        • Find reachable dependency vulnerabilities
        • Request a vulnerability be dismissed as Zero Risk
        • See vulnerabilities assigned to you
        • See where vulnerabilities are and more details
        • Verify fixes with reattacks
        • Vulnerability signature update
      • Help options
        • AI Agent
        • Live chat
        • Email
        • Comments
        • Talk to a Pentester
        • Tutorial videos or demo
        • Vulnerability reporting
        • Standard compliance
        • ZTNA logs
        • Recent downloads
        • Common analytics
        • Organization analytics
        • Group analytics
        • Portfolio analytics
        • Chart options
        • CI Gate configuration
        • CI Gate executions
        • Security gates
        • Vulnerability acceptance
        • Prioritization attributes
        • Explore the user menu
        • Enable and disable notifications
        • Subscribe to News
        • Leave a group
      • See vulnerabilities
        • Fluid Attacks' scanners
        • OWASP Benchmark results
        • Your feedback
      • Use the scanners
        • Local run
        • CI/CD integration
        • Understanding outputs
        • Findings exclusion
      • Use a configuration file
        • SAST scanner
        • SCA scanner
        • DAST scanner
        • APK scanner
      • Automatic remediation
      • Custom remediation guides
      • Introduction to Sorts
      • Sorts user guide
      • Connection mechanisms
      • Cloud connection
      • Egress connection
      • Connector connection
      • Types of authentication
      • AWS CodeCommit
    • Service-level agreement
      • Availability SLA
      • Response SLA
      • Accuracy SLA
      • False negatives
      • False positives
      • Scope
    • Support information
      • Changelog
        • 2023
        • 2024
        • 2025
        • 2026
      • Roadmap
      • AI functions
      • Attack surfaces
      • Binaries
      • Browsers
      • CI/CD
      • Clouds
      • CVEs for reachability
      • Evidence formats
      • Frameworks
      • IDE functionalities
      • Languages
      • Languages for fixes
      • Package managers
      • Remediation
      • SCM systems
      • Secrets
      • Standards
      • Ticketing systems
      • Documentation sections
  • Integrations
      • Bug-tracking systems
      • Tools and integrations
      • Access Talk to a Pentester and help from Jira issues
      • Automate Jira issue creation
      • Create Jira issues for vulnerabilities
      • Go to vulnerability evidence and more from Jira issues
      • Install the Fluid Attacks app for Jira Cloud
      • Link vulnerabilities to Jira issues or unlink them
      • Request reattacks from Jira issues
      • Set up the Jira integration
      • Set up the Azure DevOps integration
      • Set up the GitLab integration
    • VS Code
      • Functions
      • Troubleshooting
      • Identify and address vulnerabilities from IntelliJ
      • Install the IntelliJ plugin
      • Identify and address vulnerabilities from Cursor
      • Install the Cursor extension
      • AWS Marketplace integration
    • MCP server
      • Installation
      • Capabilities and use cases
      • Docker installation
    • PR/MR scanner
      • For GitLab
      • For Azure DevOps
      • Troubleshooting
      • File exclusion
    • API
      • Learn the basics
    • Webhooks
  • Stack
      • Bash
      • Python
      • Terraform
      • TypeScript
      • Ariadne
      • Commitlint
      • D3
      • Docker
      • ESLint
      • GraphQL
      • Hypercorn
      • Kubernetes
      • Labels
      • Mypy
      • Nix Flakes
      • Platform audit logs
      • Platform authentication
      • Platform authorization
      • Pydantic
      • Pydantic AI
      • React
      • Ruff
      • Sops
      • Starlette
      • Tree-sitter
      • Visual Studio Code
      • AWS
      • Batch
      • Bedrock
      • BigCodeBench
      • BugSnag
      • Checkly
      • Claude 3.5 Sonnet
      • Cloudflare
      • CloudWatch
      • Cost Management
      • Datadog
      • dbt
      • DynamoDB
      • EBS
      • EC2
      • EKS
      • ELB
      • Engineering metrics
      • ePayco
      • EventBridge
      • GitLab
      • GitLab CI
      • Google Workspace
      • IAM
      • Jamf
      • KMS
      • Lambda
      • LogRocket
      • Okta
      • OpenAI
      • OpenSearch
      • Organizations
      • QuickSight
      • S3
      • SageMaker
      • Snowflake
      • Statuspage
      • Step Functions
      • Stripe
      • Treli
      • Ubiquiti
      • Vanta
      • Voyage AI
      • VPC
      • VPN
      • Zoho One
      • Zoho Sign
    • Pentesting tools
  • Compliance
    • Authentication
      • Clients
      • Password policies
      • Staff
    • Authorization
      • Access revocation
      • Clients
      • Employee termination
      • Endpoints
      • Secret rotation
      • Sessions
      • Staff
    • Availability
      • Distributed apps
      • Distributed firewall
      • Everything backed up
      • Multiple zones
      • Recovery objective
    • Confidentiality
      • Device (re)enrolling
      • Direct hiring
      • Encryption at rest
      • Encryption in transit
      • No personal gain
      • Personnel NDA
      • Secure deletion
    • Integrity
      • Applicant evaluation
      • Awareness
      • Certification Hub
      • Certified cloud provider
      • Certified security analysts
      • Comprehensive reporting
      • Developing for integrity
      • Monitoring
      • Production data isolation
      • Secure emails
      • SLSA compliance
      • Standard timezone
      • Static website
      • Training plan
    • Non-repudiation
      • Everything as code
      • Extensive logs
    • Privacy
      • Data privacy policy
      • Data retention policy
      • Data use policy
      • Email obfuscation
      • Time tracking
      • Manual for the NDR
      • Subprocessor OpenAI
      • OTR messaging
      • Polygraph tests
      • Project pseudonymization
      • Data transmission
      • Unsubscribe email
      • Use of cookies
    • Resilience
      • Continuity and recovery
      • Equipment and telecommuting
      • Everything is decentralized
      • Redundant roles
    • Transparency
      • Complaint management
      • Data leakage policy
      • Ethics hotline
      • Help channel
      • Incident management
      • Information security responsibility
      • Open source
      • Quality policy
      • Status page
      • Testing our technology
      • Vulnerability releasing
  • Compare
    • 42Crunch
    • 7 Way Security
    • Aikido
    • Anvil Secure
    • Apiiro
    • AppCheck
    • Appdome
    • Appknox
    • Aqua
    • Armorcode
    • Arnica
    • Astra
    • Backslash
    • Base4
    • Bishop Fox
    • Black Duck
    • Black Hills
    • Breachlock
    • Bright Security
    • Burp Suite
    • Checkmarx
    • CloudGuard
    • Cobalt
    • Codacy
    • Conviso
    • Cure53
    • Cycode
    • Cyscope
    • Cyver
    • Data Theorem
    • DataDog
    • DeepSource
    • DefectDojo
    • Detectify
    • Devel
    • Dynatrace
    • Edgescan
    • Endor Labs
    • Escape
    • Evolve Security
    • Faraday Security
    • FortiDevSec
    • Fortify
    • GitHub Advanced Security (GHAS)
    • Ghost Security
    • GitLab Ultimate
    • GuardRails
    • HackerOne
    • Hackmetrix
    • Hadrian
    • HCL AppScan
    • Heeler
    • Hopper Security
    • ImmuniWeb
    • Inspectiv
    • Intigriti
    • Intruder
    • Invicti
    • JFrog
    • Jit
    • Kiuwan
    • Legit Security
    • Mandiant
    • Mend
    • Mindgard
    • Moderne
    • NetSPI
    • NowSecure
    • Nucleus Security
    • Oligo Security
    • Orca Security
    • Oversecured
    • OX Security
    • Phoenix Security
    • PlexTrac
    • Praetorian
    • Prancer
    • Prisma Cloud
    • Probely
    • Prowler
    • ReversingLabs
    • RunSybil
    • Safety
    • Securitum
    • Seemplicity
    • Semgrep
    • Snyk
    • Socket
    • SonarQube
    • Sonatype Lifecycle
    • SOOS
    • StackHawk
    • Strike
    • Synacktiv
    • Tenable Nessus
    • ThreatModeler
    • Veracode
    • White Jaguars
    • Wiz
    • Xygeni
    • ZAP
    • ZeroPath

  • Log in to the platform 

On This Page

  • How does Fluid Attacks’ solution compare to Checkmarx’s?
  • Organization
  • Service
  • Product
  • Integrations
  • More like Checkmarx
CompareCheckmarx

Checkmarx

Last updated: Mar 5, 2026

How does Fluid Attacks’ solution compare to Checkmarx’s?

The following comparison table enables you to discern the performance of both providers across various attributes essential for meeting your company’s cybersecurity needs. To better understand each attribute, read their descriptions in the dedicated page .

Organization
AttributeEssentialAdvancedCheckmarx
FocusNative ASPM  with in-house scanners AI-powered PTaaS  on top of native ASPM  with in-house scanners Native ASPM with in-house scanners
ExtrasNoneNoneNone
Headcount157 Same 997
Headcount distributionEngineering 40% , IT 14%, sales 15%, marketing 2%, operations 4% and others 25%Same Engineering 30%, IT 18%, sales 17%, marketing 3%, operations 3% and others 29%
Headcount growth+14% , +15%, -1%Same +1%, +8%, +6%
HeadquartersCO  and USSame FR, IN, IL, PT, SG, UK and US
CountriesAR , BO, CA, CL, CO, DO, MX, PA, PE and USSame IL, IN, PT and US
Reputation9.76 from 228 reviews over 8 years on Gartner  and Clutch Same8.51 from 221 reviews over 11 years on G2, Gartner, PeerSpot, Software Advice and TrustRadius
Followers22K based on the following: Facebook , Instagram , LinkedIn , X  and YouTube Same149K based on the following: Facebook, LinkedIn, X and YouTube
Research firmsNoneNoneForrester, Frost & Sullivan, GigaOM, IDC, Info-Tech Research Group and Nucleus Research
Founded2001 Same 2006
FundingBootstrappedSame$92M USD in 4 rounds from 6 investors
AcquisitionsNoneNoneAcquired 0 times and made 4 acquisitions
Revenue10M  to 15MSame 100M to 500M
CVEs as CNA Researcher289 CVEs reported  to MITRE , ranked in the top 10 CVE labs worldwide Same 11 CVEs reported to MITRE
ComplianceSOC 2 Type II  and SOC 3 Same CSA STAR Level 1, FedRAMP Authorized, HIPAA, ISO/IEC 27001 and SOC 2 Type II
Bug bountyYes Yes No
Visits27K  per month. Top 3: 34% PE, 33% CO, 6% CL. Others 27%Same 69K per month. Top 3: 32% US, 14% IN, 5% IL and others 49%
Authority31 out of 100 Same 44 out of 100
Public vulnerability DBDiscovered  and third-partySame Discovered and third-party
ContentBlog , documentation , e-books , glossary , reports, success stories , videos , webinars and white papersSameAnalysis reports, blog, customer testimonials, documentation, infographics, reports, solution briefs, videos, webinars and white papers
Comprehensive documentation13 documentation sections , 7 in common and 6 additionalSame 8 documentation sections, 7 in common and 1 additional
CommunityForum Same Forum
Sync training1 workshop Same 2 live security education courses (subscription-based)
Async training3 product use courses , all freeSame Security education platform (subscription-based)
DistributionDirect  or with any of its 14 partners SameDirect or with any of its 66 partners
MarketplacesAWS Same AWS
FreemiumNoNoNo
Free trial21-day free trial PoV PoC
DemoYes Yes Yes
Open demoNoNoNo
PricingContact sales  and marketplace Contact sales Contact sales and marketplace
Pricing tiers1 plan 1 plan 5 plans (SAST, SSCS, essentials, professional, enterprise). None transparent
Minimum termMonthly Monthly Annually
Minimum payment periodMonthly Monthly Annually
Minimum capabilitiesASPM , binary SAST, DAST, IaC, SAST, SCA and secretsSame plus: AI SAST , API security testing, PTaaS, RE and SCRSAST
Minimum scope1 author Same 1 license
Pricing driversAuthors Same Developers
Free implementationYes Yes No
Free supportYes Yes No
Service
AttributeEssentialAdvancedCheckmarx
PTaaSNoYes No
Reverse engineeringNoYes No
Secure code reviewNoYes No
PivotingNoYes No
ExploitationNoYes No
Manual reattacksNot applicableUnlimited reattacks Not applicable
Zero-day vulnerabilitiesNoneContinuous zero-day  vulnerability researchContinuous zero-day vulnerability research
SLAAvailability Accuracy , availability  and response Availability and response
Minimum availability99.95%  per yearSame 99.5% per period
After-sale guaranteesNoYesNo
AccreditationsCNA  and Penetration Testing by CREST Same CNA, DevOps ISV Competency and Security ISV Competency
Hacker certificationsNot applicable202 from 59 different types Not applicable
Type of contractEmployeeSameEmployee
Endpoint controlNoTotal Not applicable
Channel controlNoTotalNot applicable
StandardsSome requirements from 67 standards , 18 in common and 49 additionalAll requirements from the same standards 20 standards, 18 in common and 2 additional
Detection methodAutomated tools Automated tools , AI  and human intelligenceAutomated tools and AI
False positives3.87 times better6.66 times better12% F0.5 score per quantity
False negatives5.6 times better17.98 times better4% F2.0 score per severity
Remediation5 , 3 in common and 2 additionalSame, plus 1 4, 3 in common and 1 additional
Output5 , 4 in common and 1 additionalSame, plus 2 6, 4 in common and 2 additional
Product
AttributeEssentialAdvancedCheckmarx
ASPMYes Yes Yes
APIGraphQL with JSON Same REST with JSON
IDE5 functionalities , 4 in common and 1 additionalSame , plus 1 functionality6 functionalities, 4 in common and 2 additional
CLIYes Yes Yes
CI/CDBreaks the build Same Breaks the build
Vulnerability sources4 sources , 1 in common and 3 additionalSame 6 sources, 1 in common and 5 additional
Threat model alignmentYes Yes Yes
Priority criteriaCVSS v4.0 , CVSSF , EPSS  and KEVSame CVSS v4.0, EPSS and KEV
Custom prioritizationPriority score Same Project classification
Scanner originIn-house In-house In-house and external (ZAP for DAST and KICS for IaC)
SCA19 package managers , 15 in common and 4 additionalSame 20 package managers, 15 in common and 5 additional
AI securityNoYes No
Reachability12 languages Same No information
Reachability typeDeterministic Same Deterministic
SBOM22 package managers , 11 in common and 11 additionalSame 20 package managers, 11 in common and 9 additional
Malware detectionYesYesYes
Autofix on componentsNoNoYes
Source SAST (languages)12 , 11 in common and 1 additionalSame 36, 11 in common and 25 additional
Source SAST (frameworks)22 , 10 in common and 12 additionalSame 52, 10 in common and 42 additional
Custom rulesNoNoPolicies
IaC6 , 5 in common and 1 additional4 , all in common12, 9 in common and 3 additional
Binary SAST1 type of binary Same , plus 2 types of binariesNo
DAST7 attack surface types , 2 in common and 5 additionalSame 3 attack surface types, 2 in common and 1 additional
API security testingNo4 types of APIs , 3 in common and 1 additional3 types of APIs, all in common
IASTNoNoNo
ASMNoNoNo
Secrets15 secrets types , 5 in common and 10 additionalSame , plus verify other attack vectors and secrets exploitability5 secrets types, all in common
AI3 functions , 2 in common and 1 additionalSame 3 functions, 2 in common and 1 additional
MCPYes Yes Yes
Open-sourceMPL-2 license , totally equivalent  to the paid version Not applicableApache License version 2, partially equivalent to the paid version
Provisioning as codeYes Yes Yes
DeploymentSaaS (multi-tenant) Same SaaS (multi-tenant) + on-premises (single-tenant)
RegionsUS Same AE, ANZ, EU, IN, IL, SG and US
StatusYes Yes Yes
Incidents3 per year Same 7.3 per year
Integrations
AttributeEssentialAdvancedCheckmarx
SCM6 , 3 in common and 3 additionalSame 4, 3 in common and 1 additional
Binary repositoriesNoneNone5
Ticketing3 , all in commonSame 5, 3 in common and 2 additional
ChatOpsNoneNone2
IDE3 , 2 in common and 1 additionalSame 4, 2 in common and 2 additional
CI/CD21 , 10 in common and 11 additionalSame 17, 10 in common and 7 additional
SCANative Same Native
SASTNative Same Native
DASTNative Same Native powered by ZAP
IASTNoneNoneNone
SecretsNative Same Native
RemediationNoneNone3
Bug bountyNoneNoneNone
Vulnerability managementNoneNone4
ComplianceNoneNoneNone

The latest update to this comparison was on Feb 16, 2026. The primary sources of information were checkmarx.com and docs.checkmarx.com, which were supplemented by specialized information-gathering sites, social media, and other sources.

More like Checkmarx

  • Aikido 
  • GitLab Ultimate 
  • Jit 
  • Snyk 

Free trial — Search for vulnerabilities in your apps for free with Fluid Attacks’ automated security testing! Start your 21-day free trial  and discover the benefits of the Continuous Hacking  Essential plan . If you prefer the Advanced plan, which includes the expertise of Fluid Attacks’ hacking team, fill out this contact form .

Tags

aspmcomparemalwareiacsecretsscadastsbomopensourcesastcontainersapireachabilitymcp
Burp SuiteCloudGuard

Fluid Attacks 2026. All rights reserved.