Checkmarx One vs F5 BIG-IP Local Traffic Manager (LTM) vs Fortinet FortiDDoS comparison

Cancel
You must select at least 2 products to compare!
Checkmarx Logo
35,279 views|23,132 comparisons
86% willing to recommend
F5 Logo
10,469 views|8,686 comparisons
83% willing to recommend
Fortinet Logo
1,342 views|1,187 comparisons
90% willing to recommend
Comparison Buyer's Guide
Executive Summary

We performed a comparison between Checkmarx One, F5 BIG-IP Local Traffic Manager (LTM), and Fortinet FortiDDoS based on real PeerSpot user reviews.

Find out what your peers are saying about Sonar, Veracode, Checkmarx and others in Application Security Tools.
To learn more, read our detailed Application Security Tools Report (Updated: April 2024).
769,065 professionals have used our research since 2012.
Featured Review
Quotes From Members
We asked business professionals to review the solutions they use.
Here are some excerpts of what they said:
Pros
"The most valuable feature of Checkmarx is the user interface, it is very easy to use. We do not need to configure anything, we only have to scan to see the results.""It gives the proper code flow of vulnerabilities and the number of occurrences.""Less false positive errors as compared to any other solution.""The administration in Checkmarx is very good.""It allows for SAST scanning of uncompiled code. Further, it natively integrates with all key repos formats (Git, TFS, SVN, Perforce, etc).""The identification of verification-related security vulnerabilities is really important and one of the key things. It also identifies vulnerabilities for any kind of third-party tool coming into the system or any third-party tools that you are using, which is very useful for avoiding random hacking.""Compared to the solutions we used previously, Checkmarx has reduced our workload by almost 75%.""The solution allows us to create custom rules for code checks."

More Checkmarx One Pros →

"The occasion in which we needed technical support, we didn't have problems with them, because they always answered our questions without any trouble.""It is a scalable solution.""It integrates with AWS WAF, which makes it easy to deploy without changes to your infrastructure.""It has so many features. ​First of all, it has a full proxy architecture, it has multiple modules. The best feature is the WAF, the web application firewall module. It also has cashing type capabilities. It has all kinds of load-balancing algorithms based on your IT requirements.""The main reason that we suggest this product to our clients is the great integration with other security tools, such as IBM Guardium.""The configuration and integration into the AWS environment was pretty easy.""The solution has good load balancing capabilities.""Bandwidth optimization and capacity awareness of the bandwidth are valuable features. Its video streaming capabilities are also very useful."

More F5 BIG-IP Local Traffic Manager (LTM) Pros →

"I find the interface easy to use.""This solution can protect Layer 3, Layer 4 and Layer 7 attacks of applications for us.""It allows me to see all the traffic on my network.""The product's initial setup phase was really easy.""It is a user-friendly product in terms of monitoring and updating policies.""The product allows the users to adjust the thresholds.""The solution is very user-friendly and very easy to use.""The most valuable feature is the cloud DDoS scrubbing capability."

More Fortinet FortiDDoS Pros →

Cons
"Checkmarx could improve the speed of the scans.""I really would like to integrate it as a service along with the SAP HANA Cloud Platform. It will then be easy to use it directly as a service.""The cost per user is high and should be reduced.""Checkmarx could be improved with more integration with third-party software.""I would like to see the rate of false positives reduced.""You can't use it in the continuous delivery pipeline because the scanning takes too much time.""As the solution becomes more complex and feature rich, it takes more time to debug and resolve problems. Feature-wise, we have no complaints, but Checkmarx becomes harder to maintain as the product becomes more complex. When I talk to support, it takes them longer to fix the problem than it used to.""They could work to improve the user interface. Right now, it really is lacking."

More Checkmarx One Cons →

"Initial setup is tricky, if you do not understand the design of this product.""Security and Reporting.""Certificate management needs improvement. I would like automated deployment of new certificates without manual intervention to be in the next release of this product.""My only point of contention would be that it is a little pricey.""I would like to see improvement in the manageability and easier setup.""They need to improve the interface and some of the functionalities.""Reporting could be improved and configuration made easier.""If we decide to migrate to the cloud, I don't think that BIG-IP is a good solution and we probably won't use it."

More F5 BIG-IP Local Traffic Manager (LTM) Cons →

"Alerts and reporting features must be improved.""The only thing they need to do is to automate it. Today, you must create tools that do not require the use of an expert or anyone with special skills.""The product’s pricing needs improvement.""The web interface could be much better.""All the thresholds that need to be configured should be included in the default so that user will not forget or misconfigure.""The primary area for improvement is the on-premises capacity limit, currently fixed at 10 GB.""I find that there have been issues in the past year with the solution hanging. It freezes often.""I would like to see analytics, big data."

More Fortinet FortiDDoS Cons →

Pricing and Cost Advice
  • "It is the right price for quality delivery."
  • "I believe pricing is better compared to other commercial tools."
  • "The pricing was not very good. This is just a framework which shouldn’t cost so much."
  • "The pricing is competitive and provides a lower TCO (total cost of ownership) for achieving application security."
  • "It is a good product but a little overpriced."
  • "The license has a vague language around P1 issues and the associated support. Make sure to review these in order to align them with your organizational policies."
  • "​Checkmarx is not a cheap scanning tool, but none of the security tools are cheap. Checkmarx is a powerful scanning tool, and it’s essential to have one of these products."
  • "We got a special offer for a 30% reduction for three years, after our first year. I think for a real source-code scanning tool, you have to add a lot of money for Open Source Analysis, and AppSec Coach (160 Euro per user per year)."
  • More Checkmarx One Pricing and Cost Advice →

  • "Though functionality is high, its cost can be considered slightly higher than its competitors​."
  • "The licensing pricing seems relatively easy enough to get your head around. I would advise anyone to ensure that you have a conversation with an F5 consultant before purchasing, as you would with most products."
  • "Take a look at the modules that you are going to use. Look into the best bundles for them."
  • "The only area that has room for improvement would be pricing, so its competitors do not have a say."
  • "If your IT budget is good, go for it."
  • "This product is costly from a licensing perspective considering its competitors."
  • "Check other vendors like Cisco, Citrix or A10 Networks. There are plenty in the market with which you can achieve same thing."
  • "Great product for the money. But they can get really expensive, so get what meets your needs."
  • More F5 BIG-IP Local Traffic Manager (LTM) Pricing and Cost Advice →

  • "It's quite pricey."
  • "The solution is reasonably priced."
  • "The product’s pricing needs improvement."
  • More Fortinet FortiDDoS Pricing and Cost Advice →

    report
    Use our free recommendation engine to learn which Application Security Tools solutions are best for your needs.
    769,065 professionals have used our research since 2012.
    Questions from the Community
    Top Answer:I would like to recommend Checkmarx. With Checkmarx, you are able to have an all in one solution for SAST and SCA as… more »
    Top Answer:Compared to the solutions we used previously, Checkmarx has reduced our workload by almost 75%.
    Top Answer:The solution's price is high and you pay based on the number of users.
    Top Answer:The support from F5 BIG-IP LTM is good.
    Top Answer:There are a few licensing options available for F5 BIG-IP LTM. You can have a perpetual license which is a lifetime… more »
    Top Answer:The pricing must be more flexible. We get billed for firewalls based on the usage. It will be helpful if the solution… more »
    Top Answer:Arbor would be the best bid, apart from Arbor, Palo Alto and Fortinet have good solutions. As this is an ISP, I would… more »
    Top Answer:The product's initial setup phase was really easy.
    Top Answer:The pricing for FortiDDoS was on the expensive side for us, and the scalability options were limited. When upgrading… more »
    Ranking
    Views
    35,279
    Comparisons
    23,132
    Reviews
    21
    Average Words per Review
    513
    Rating
    7.7
    Views
    10,469
    Comparisons
    8,686
    Reviews
    29
    Average Words per Review
    485
    Rating
    8.4
    Views
    1,342
    Comparisons
    1,187
    Reviews
    3
    Average Words per Review
    301
    Rating
    8.0
    Comparisons
    Also Known As
    F5 BIG-IP, BIG-IP LTM, F5 ASM, Viprion, F5 BIG-IP Virtual Edition , Crescendo Networks Application Delivery Controller, BIG IP
    Fortinet DDoS, FortiDDos
    Learn More
    Overview

    Checkmarx is a highly accurate and flexible static code analysis product that allows organizations to automatically scan uncompiled code and identify hundreds of security vulnerabilities in all major coding languages and software frameworks. Checkmarx is available as a standalone product and can be effectively integrated into the software development lifecycle (SDLC) to streamline vulnerability detection and remediation. Checkmarx is trusted by leading organizations such as SAP, Samsung, and Salesforce.com.

    Checkmarx is a global leader in software security solutions for modern software development. Checkmarx delivers a comprehensive software security platform that unites with DevOps by scanning uncompiled source code for security vulnerabilities early in the development life cycle to reduce and remediate risk from software vulnerabilities. Using Checkmarx, teams avoid software security vulnerabilities managed via a single and unified dashboard without slowing down their delivery schedule.

    Checkmarx balances the needs of the entire organization, delivering seamless security from the start and throughout the entire software development life cycle. Checkmarx can be deployed on-premises in a private data center or hosted via a public cloud.

    Checkmarx Features

    Some of Checkmarx’s features include:

    • Source code scanning: Detect and repair more vulnerabilities before you release your code.

    • Open-source scanning: Find and eliminate the risks in your open-source code.

    • Interactive code scanning: Scan for vulnerabilities and runtime threats.

    • Open-source security for infrastructure as code: Identify and fix insecure IaC configurations that put your application at risk.

    Reviews from Real Users

    Checkmarx stands out among its competitors for a number of reasons. Two major ones are its ability to enable developers to secure their code with a single management dashboard and its high-speed scanning abilities.

    PeerSpot users note the effectiveness of these features. A CEO at a tech services company writes, “The most valuable features are the easy-to-understand interface, and it’s very user-friendly. We spend some time tuning to start scanning a new project, which is only a few clicks. A few simple tunes for custom rules and we can start our scan. We can do the work quickly and we don't need to compile the source code because Checkmarx does the work without compiling the project. The scanning is very quick. It's about 20,000 lines per hour, which is a good speed for scanning.”

    A director at a tech services company notes, “The features and technologies are very good. The flexibility and the roadmap have also been very good. They're at the forefront of delivering the additional capabilities that are required with cloud delivery, etc. Their ability to deliver what customers require and when they require is very important.”

    A senior manager at a manufacturing company writes, “The identification of verification-related security vulnerabilities is really important and one of the key things. It also identifies vulnerabilities for any kind of third-party tool coming into the system or any third-party tools that you are using, which is very useful for avoiding random hacking."

    F5 BIG-IP LTM optimizes the speed and reliability of your apps via both network and application layers. Using real-time protocol and traffic management decisions based on app and server and connection management conditions, and TCP and content offloading, BIG-IP LTM dramatically improves application and infrastructure responsiveness. BIG-IP LTM's architecture includes protocol awareness to control traffic for the most important applications. BIG-IP LTM tracks the dynamic performance levels of servers and delivers SSL performance and visibility for inbound and outbound traffic, to protect the user experience by encrypting everything from the client to the server.

    BIG-IP LTM provides enterprise-class Application Delivery Controller (ADC). You get granular layer 7 control, SSL offloading and acceleration capabilities, and advanced scaling technologies that deliver performance and reliability on-demand. The highly optimized TCP/IP stack combines TCP/IP techniques and improvements in the latest RFCs with extensions to minimize the effect of congestion and packet loss and recovery. Independent testing tools and customer experiences show LTM's TCP stack delivers up to a 2x performance gain for users and a 4x increase in bandwidth efficiency.

    Distributed Denial of Service (DDoS) attacks are ever-evolving and use a variety of technologies. To successfully combat these attacks, you need a dynamic, multi-layered security solution. FortiDDoS protects from both known and zero day attacks with very low latency. It’s easy to deploy and manage, and includes comprehensive reporting and analysis tools.

    Sample Customers
    YIT, Salesforce, Coca-Cola, SAP, U.S. Army, Liveperson, Playtech Case Study: Liveperson Implements Innovative Secure SDLC
    Riken, TransUnion, Tepco Systems Administration, Daejeon University, G&T Bank, Danamon, CyberAgent Inc.
    Black Gold Regional Schools, Amadeus Hospitality, Jefferson County, Chunghwa Telecom, City of Boroondara, Dimension Data
    Top Industries
    REVIEWERS
    Computer Software Company31%
    Financial Services Firm19%
    Comms Service Provider9%
    Manufacturing Company9%
    VISITORS READING REVIEWS
    Financial Services Firm21%
    Computer Software Company15%
    Manufacturing Company9%
    Insurance Company5%
    REVIEWERS
    Comms Service Provider20%
    Financial Services Firm15%
    Computer Software Company15%
    Media Company6%
    VISITORS READING REVIEWS
    Financial Services Firm17%
    Computer Software Company14%
    Government9%
    Comms Service Provider7%
    VISITORS READING REVIEWS
    Computer Software Company15%
    Financial Services Firm10%
    Manufacturing Company9%
    Comms Service Provider9%
    Company Size
    REVIEWERS
    Small Business38%
    Midsize Enterprise13%
    Large Enterprise50%
    VISITORS READING REVIEWS
    Small Business17%
    Midsize Enterprise11%
    Large Enterprise72%
    REVIEWERS
    Small Business33%
    Midsize Enterprise17%
    Large Enterprise50%
    VISITORS READING REVIEWS
    Small Business18%
    Midsize Enterprise14%
    Large Enterprise68%
    REVIEWERS
    Small Business62%
    Large Enterprise38%
    VISITORS READING REVIEWS
    Small Business25%
    Midsize Enterprise18%
    Large Enterprise57%
    Buyer's Guide
    Application Security Tools
    April 2024
    Find out what your peers are saying about Sonar, Veracode, Checkmarx and others in Application Security Tools. Updated: April 2024.
    769,065 professionals have used our research since 2012.