Try our new research platform with insights from 80,000+ expert users

Community Spotlight #19

EB
Director of Community at PeerSpot (formerly IT Central Station)
  • 43
Published:Aug 2, 2022
Search for a product comparison in Static Application Security Testing (SAST)
PeerSpot user

1 Comment

Last commented on Aug 2, 2022
EB
Director of Community at PeerSpot (formerly IT Central Station)
Real User
Aug 2, 2022
Chris Childerhose - PeerSpot reviewer
Enterprise Architect at ThinkON
Real User
Top 5Leaderboard
Aug 2, 2022

@Evgeny Belenky my pleasure always great to give back to the community.

PeerSpot user
Find out what your peers are saying about SonarSource Sàrl, Veracode, Checkmarx and others in Static Application Security Testing (SAST). Updated: December 2025.
879,455 professionals have used our research since 2012.
Related Questions
Ariel Lindenfeld - PeerSpot reviewer
VP Product at PeerSpot
May 15, 2024
May 15, 2024
SAST is crucial for organizations aiming to secure their software during the development phase. Developers should consider the following aspects: Identify vulnerabilities early Cost-effective security measures Compliance with standards Improvement of code quality Automated security checks The importance of SAST lies in its capability to identify vulnerabilities early in the software development...
See 1 answer
Rivka Alexander - PeerSpot reviewer
Content Specialist at PeerSpot
May 15, 2024
SAST is crucial for organizations aiming to secure their software during the development phase. Developers should consider the following aspects: Identify vulnerabilities early Cost-effective security measures Compliance with standards Improvement of code quality Automated security checks The importance of SAST lies in its capability to identify vulnerabilities early in the software development process. By incorporating SAST tools, companies can detect security flaws during the coding stage, minimizing the cost and effort required to fix issues post-deployment. Addressing vulnerabilities before the software reaches production not only reduces potential security risks but also ensures that any patches needed have minimal impact on the project's overall timeline. Additionally, SAST tools automate security checks, providing continuous analysis without disrupting the workflow, thereby making early vulnerability detection a more integral part of software development.Compliance with industry standards is another significant importance of SAST. Organizations are often required to adhere to specific regulatory standards and frameworks, such as OWASP, PCI-DSS, or HIPAA. SAST helps ensure compliance by verifying code against these standards, reducing the risk of non-compliance and potential legal consequences. Implementing SAST also contributes to improving code quality by enforcing good coding practices, which enhances robustness and reliability. By integrating SAST, developers receive feedback that not only identifies issues but also suggests best practices, fostering a secure software development environment focused on quality and compliance.
reviewer2163450 - PeerSpot reviewer
Works at Onyxia
Apr 26, 2023
Apr 26, 2023
Come on guys, the correct answer to this is the Microsoft Admin Portal and your Azure Admin and the Security and Compliance centers. Everyone wants to buy new SaaS when most of the Controls and Safeguards are built into MS. Steven Palange, steven_palange@tlic.com reach out for any and all your SaaS renewals.
See 2 answers
SP
Information Technology Infrastructure Specialist at TLIC
Apr 25, 2023
Come on guys, the correct answer to this is the Microsoft Admin Portal and your Azure Admin and the Security and Compliance centers. Everyone wants to buy new SaaS when most of the Controls and Safeguards are built into  MS. Steven Palange, steven_palange@tlic.com reach out for any and all your SaaS renewals. 
reviewer2054484 - PeerSpot reviewer
Principal Cybersecurity Architect at a manufacturing company with 10,001+ employees
Apr 26, 2023
For small companies, utilize the tooling you already have in place like the MS Office or the Atlassian Suite, etc. Ultimately, as you grow towards enterprise scale, Archer and ServiceNow (Governance, Risk, Compliance) can help with everything from compliance workflow to tracking incidence response. As a Cyber Architect in a corporate Fortune 500, we use a medley of integration with our SIEM, Vulnerability Tool, and all the collected data can be accessed by Tableau to generate a dynamic web graph. When you start tracking vulnerabilities and incidents, the data you accumulate can be expressed in your appropriate CPI. If you lack data for a particular CPI, then you may a gap in your cyber program.
Download Free Report
Download our free Backup and Recovery Report and find out what your peers are saying about Veeam Software, Hewlett Packard Enterprise, Commvault, and more! Updated: December 2025.
DOWNLOAD NOW
879,455 professionals have used our research since 2012.