

Find out in this report how the two Application Security Tools solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI.
Overall, between the fast scanning, automation, automatic reporting, and easy detection, it has reduced manual effort enough that we did not need an extra reviewer, even as our codebase or team size grew.
Based on my interactions with the clients, I can tell that there is a return on investment because if something is not profitable and it's not helping to save costs or vulnerabilities, clients wouldn't come back to renew their license year after year.
The major return on investment is the security of our data.
If you raise a support case with Checkmarx, it is handled smoothly.
The customer support team is amazing and they provide on-phone call, email support, and on-website support.
I have relied on Checkmarx One customer support hundreds of times for several things, and Checkmarx One support is very proactive and very responsive.
I would rate the technical support of F5 BIG-IP Local Traffic Manager (LTM) nine out of ten.
Overall, my experience with F5 is very good compared to Radware.
Approximately four billion lines of code are being scanned monthly.
Since it is cloud-based, the infrastructure and PaaS, IaaS, and SaaS are taken care of by the cloud marketplace.
Checkmarx One's scalability has changed my organization because the strong collaboration between the development and security team helps us to do things much faster.
I would rate the stability of this solution a nine on a scale of 1 to 10 where one is low stability and 10 is high.
Checkmarx One is often down when the cloud provider experiences issues.
Integration into the IDE being used would be beneficial so that code does not need to be uploaded to the website and an IDE-friendly report could be generated.
It could suggest how the code base is written and automatically populate the source code with three different solution options to choose from.
If you can improve the speed optimization, it takes around 30 to 40 minutes for checking a build. If you can make it within five minutes or 10 minutes, that would be great.
The pricing of F5 BIG-IP Local Traffic Manager (LTM) is on the higher side compared to competitors, but it is worth it.
For a small team under 50 developers, normal expenses come under 30 to 60K.
Due to the number of years I've implemented Checkmarx One, there are rebates and discounts from the OEM which makes it a lot more profitable.
The pricing should be reasonable, matching what we are paying for.
The product is costly.
Since replacing the previous tool, SAST and SCA scans are conducted in a couple of minutes instead of hours or days.
The best features Checkmarx One offers, over the past years, include broad language and technical support that Checkmarx provides, covering most languages.
Checkmarx One has positively impacted our organization as we tend to find vulnerabilities very early in the development cycle.
The impact of SSL offloading on reducing server load and latency is very much positive because whatever traffic we receive, we encrypt at our F5 BIG-IP Local Traffic Manager (LTM) level, which has definitely reduced the additional load and SSL decryption load on the servers, so it has very much helped us and it is very smooth; it will not take much time and will not impact our regular traffic.
One of the most beneficial features of F5 BIG-IP Local Traffic Manager (LTM) is its ability to identify compromised traffic and its capabilities in authentication.
| Product | Market Share (%) |
|---|---|
| Checkmarx One | 9.9% |
| SonarQube | 16.9% |
| Snyk | 5.6% |
| Other | 67.6% |
| Product | Market Share (%) |
|---|---|
| F5 BIG-IP Local Traffic Manager (LTM) | 14.9% |
| NetScaler | 13.0% |
| Fortinet FortiADC | 9.8% |
| Other | 62.3% |


| Company Size | Count |
|---|---|
| Small Business | 32 |
| Midsize Enterprise | 9 |
| Large Enterprise | 46 |
| Company Size | Count |
|---|---|
| Small Business | 62 |
| Midsize Enterprise | 32 |
| Large Enterprise | 85 |
Checkmarx One is an enterprise cloud-native application security platform focused on providing cross-tool, correlated results to help AppSec and developer teams prioritize where to focus time and resources.
Checkmarx One offers comprehensive application scanning across the SDLC:
Checkmarx One provides everything you need to secure application development from the first line of code through deployment and runtime in the cloud. With an ever-evolving set of AppSec engines, correlation and prioritization features, and AI capabilities, Checkmarx One helps consolidate expanding lists of AppSec tools and make better sense of results. Its capabilities are designed to provide an improved developer experience to build trust with development teams and ensure the success of your AppSec program investment.
F5 BIG-IP LTM optimizes the speed and reliability of your apps via both network and application layers. Using real-time protocol and traffic management decisions based on app and server and connection management conditions, and TCP and content offloading, BIG-IP LTM dramatically improves application and infrastructure responsiveness. BIG-IP LTM's architecture includes protocol awareness to control traffic for the most important applications. BIG-IP LTM tracks the dynamic performance levels of servers and delivers SSL performance and visibility for inbound and outbound traffic, to protect the user experience by encrypting everything from the client to the server.
BIG-IP LTM provides enterprise-class Application Delivery Controller (ADC). You get granular layer 7 control, SSL offloading and acceleration capabilities, and advanced scaling technologies that deliver performance and reliability on-demand. The highly optimized TCP/IP stack combines TCP/IP techniques and improvements in the latest RFCs with extensions to minimize the effect of congestion and packet loss and recovery. Independent testing tools and customer experiences show LTM's TCP stack delivers up to a 2x performance gain for users and a 4x increase in bandwidth efficiency.
We monitor all Application Security Tools reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.