Try our new research platform with insights from 80,000+ expert users

Checkmarx One vs The NodeZero Platform by Horizon3.ai comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Feb 8, 2026

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Checkmarx One
Ranking in Vulnerability Management
17th
Ranking in Risk-Based Vulnerability Management
8th
Average Rating
7.8
Reviews Sentiment
6.6
Number of Reviews
81
Ranking in other categories
Application Security Tools (2nd), Static Application Security Testing (SAST) (3rd), Container Security (15th), Static Code Analysis (2nd), API Security (3rd), Dynamic Application Security Testing (DAST) (2nd), DevSecOps (3rd), Application Security Posture Management (ASPM) (3rd), AI Security (2nd)
The NodeZero Platform by Ho...
Ranking in Vulnerability Management
8th
Ranking in Risk-Based Vulnerability Management
5th
Average Rating
9.0
Reviews Sentiment
5.8
Number of Reviews
12
Ranking in other categories
Advanced Threat Protection (ATP) (11th), Penetration Testing Services (1st), Breach and Attack Simulation (BAS) (1st)
 

Mindshare comparison

As of March 2026, in the Vulnerability Management category, the mindshare of Checkmarx One is 1.3%, up from 1.0% compared to the previous year. The mindshare of The NodeZero Platform by Horizon3.ai is 1.5%, up from 0.9% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Vulnerability Management Mindshare Distribution
ProductMindshare (%)
The NodeZero Platform by Horizon3.ai1.5%
Checkmarx One1.3%
Other97.2%
Vulnerability Management
 

Featured Reviews

Shahzad Shahzad - PeerSpot reviewer
Senior Solution Architect | L3+ Systems & Cloud Engineer | SRE Specialist at Canada Cloud Solution
Enable secure development workflows while identifying opportunities for faster scans and improved AI guidance
Checkmarx One is a very strong platform, but there are several areas where it can improve to support modern DevSecOps workflows even better. For example, better real-time developer guidance is needed. The IDE plugin should offer richer AI-powered auto-fixes similar to SNYK Code or GitHub Copilot Security, as current guidance is good but not deeply contextual for large-scale enterprise codebases. This matters because it reduces developer friction and accelerates shift-left adoption. More transparency control over the correlation engines is another need. The correlation engine is powerful but not fully transparent. Users want to understand why vulnerabilities were correlated or de-prioritized, which helps AppSec teams trust the prioritization logic. Faster SAST scan and more language coverage is needed since SAST scan can still be slow for very large mono-repos and there is limited deep support for new language frameworks like Rust and Go, along with advanced coverage for serverless-specific frameworks. This matters because large organizations want sub-minute scans in CI/CD as cloud-native ecosystems evolve fast. A strong API security module is another area for enhancement. API security scanning could be improved with active testing, API discovery, full Swagger, OpenAPI, drift detection, and schema-based fuzzing. This is important as API attacks are one of the biggest AppSec risks in 2025. Checkmarx One is strong, but I see a few areas for improvement including faster SAST scanning for large mono-repos, deeper language framework support, more transparent correlation logic, and stronger API security that includes discovery and runtime context. The IDE plugin could offer more AI-assisted fixes, and the SBOM lifecycle tracking can evolve further. Enhancing integration with SIEM and SOAR would also make enterprise adoption smoother, and these improvements would help developers and AppSec teams move faster with more accuracy.
SH
Chief Information Officer at a construction company with 1,001-5,000 employees
Has unified our IT teams by providing clear visibility into network vulnerabilities and accelerated remediation with real-world attack testing
One of the things that we've shared with Horizon is just the reporting. They've made a lot of changes over time, but when examining computers, most average normal people don't look at a computer and identify it as 114.82.117.180. They identify it as 'the printer for accounting.' When many of the reports give the very detailed technical IP address or serial number, that's really not helpful for anyone other than the person, the hands-on person that's trying to remediate it. All the managers, all the leaders, having information in that format isn't helpful. Being able to have information about what those devices are would be very helpful. There's a technical reason they can't just have an easy button because some people have really complicated networks. When examining things for the average company, the average executive, that 114 number, there's only one of those. But if examining an AT&T or a Walmart, it isn't unique. They haven't solved that problem. But for the 90% of companies, being able to have just a human readable name for all devices on your network in all of the reports all of the time would be the most beneficial.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"The most valuable features are the easy to understand interface, and it 's very user-friendly."
"Less false positive errors as compared to any other solution."
"The main thing we find valuable about Checkmarx is the ease of use. It's easy to initiate scans and triage defects."
"Checkmarx has helped us deliver more secure products. We are able to do static code analysis with the tool before shipping our code to production. When the integration is in the pipeline, this tool gives us early notifications on code fixes."
"The solution communicates where to fix the issue for the purpose of less iterations."
"Checkmarx pinpoints the vulnerability in the code and also presents the flow of malicious input across the application."
"Checkmarx One has positively impacted the organization by providing resolution strategies and indicating which vulnerabilities need to be fixed."
"Scan reviews can occur during the development lifecycle."
"My favorite feature about The NodeZero Platform is that it's autonomous, and it truly delivers on that promise—it can be set and forgotten while it performs its tasks, and it does exactly what it claims to do."
"The NodeZero Platform's real attack capabilities help in identifying vulnerabilities on our on-prem systems because it provides actual vulnerabilities by attacking our systems."
"I rate the stability of the NodeZero Platform a ten out of ten."
"The NodeZero Platform's real attack capabilities help identify vulnerabilities on my on-premise systems by adding an element of validation and offensive security testing on top of known vulnerabilities. The feature that allows security teams to fix and retest vulnerabilities instantly is very useful, even though it may not happen literally 'instantly.' It's a necessary tool for any organization to understand whether vulnerabilities are genuinely exploitable by attackers. With its near-real-time testing capabilities, it's an essential part of any security portfolio."
"Honestly, it's one of the most transformational technologies we've implemented in our company."
"After the third party conducts the pen test, The NodeZero Platform is run, and it finds the same things they found and sometimes a few other things that they did not even identify."
"We experienced a threat that could have severely crippled us, but we were able to shut it down before it escalated, thanks to internal vulnerability testing and addressing critical vulnerabilities using their tool."
"The NodeZero Platform by Horizon3.ai impacts our organization positively as we are a cybersecurity distributor that presents solutions to our partners, and I would have to say it is hands down one of the best solutions we sell to help address customer pain points related to manual testing, generating excitement in the channel, closing deals, and fostering discussions around pentesting."
 

Cons

"The tool is currently quite static in terms of finding security vulnerabilities. It would be great if it was more dynamic and we had even more tools at our disposal to keep us safe. It would help if there was more scanning or if the process was more automated."
"It takes around 30 to 40 minutes for checking a build. If you can make it within five minutes or 10 minutes, that would be great."
"Checkmarx could improve the REST APIs by including automation."
"Checkmarx has a slightly difficult compilation with the CI/CD pipeline."
"Updating and debugging of queries is not very convenient."
"They should make it more container-friendly and optimized for the CI pipeline. They should make it a little less heavy. Right now, it requires a SQL database, and the way the tool works is that it has an engine and then it has an analysis database in which it stores the information. So, it is pretty heavy from that perspective because you have to have a full SQL Server. They're working on something called Checkmarx Light, which is a slim-down version. They haven't released it yet, but that's what we need. There should be something a little more slimmed down that can just run the analysis and output the results in a format that's readable as opposed to having a full, really big, and thick deployment with a full database server."
"I really would like to integrate it as a service along with the SAP HANA Cloud Platform. It will then be easy to use it directly as a service."
"We can run only one project at a time."
"The only issue we’ve encountered is that sometimes the scans take a long time to complete."
"I encountered challenges with patch management, as we struggled to test and implement patches due to time constraints. This led to our patch management process being ineffective."
"You need to be cautious about what it scans, as it could potentially cause issues."
"The reports are quite useless."
"I think The NodeZero Platform could improve by leveraging GPUs for password cracking, which would be pretty good."
"The areas for improvement for The NodeZero Platform involve integration and automation. It would be beneficial if it could integrate directly with vulnerability management tools that would allow the platform to automatically import data, identify vulnerable systems, and test targets immediately, potentially even enabling automated feedback loops for rescanning since the process is currently manual."
"The speed of the scans takes some time, but in my opinion, it is not surprising for what it is doing."
"One of the areas where improvement is needed is in the visibility and reporting for large enterprises."
 

Pricing and Cost Advice

"The number of users and coverage for languages will have an impact on the cost of the license."
"​Checkmarx is not a cheap scanning tool, but none of the security tools are cheap. Checkmarx is a powerful scanning tool, and it’s essential to have one of these products."
"I believe pricing is better compared to other commercial tools."
"We got a special offer for a 30% reduction for three years, after our first year. I think for a real source-code scanning tool, you have to add a lot of money for Open Source Analysis, and AppSec Coach (160 Euro per user per year)."
"It is an expensive solution."
"The solution's price is high and you pay based on the number of users."
"It's relatively expensive."
"This solution is expensive. The customized package allows you to buy additional users at any time."
Information not available
report
Use our free recommendation engine to learn which Vulnerability Management solutions are best for your needs.
883,619 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Financial Services Firm
18%
Manufacturing Company
10%
Computer Software Company
9%
Government
5%
Computer Software Company
9%
Comms Service Provider
8%
Manufacturing Company
8%
Government
8%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business32
Midsize Enterprise9
Large Enterprise46
By reviewers
Company SizeCount
Small Business7
Midsize Enterprise1
Large Enterprise4
 

Questions from the Community

What alternatives are there for Fortify WebInspect and Fortify SCA?
I would like to recommend Checkmarx. With Checkmarx, you are able to have an all in one solution for SAST and SCA as well. Veracode is only a cloud solution. Hope this helps.
What do you like most about Checkmarx?
Compared to the solutions we used previously, Checkmarx has reduced our workload by almost 75%.
What is your experience regarding pricing and costs for Checkmarx?
Checkmarx One is a premium solution, so budget accordingly. Make sure you understand how licensing scales with additional applications and users. I advise negotiating multi-year contracts or bundle...
What do you like most about Horizon3.ai?
Penetration testing and scans are useful features.
What needs improvement with Horizon3.ai?
I think The NodeZero Platform could improve by leveraging GPUs for password cracking, which would be pretty good.
What is your primary use case for Horizon3.ai?
We use The NodeZero Platform for control validation and we are also looking for the likelihood of vulnerabilities.
 

Also Known As

No data available
Horizon3.ai
 

Overview

 

Sample Customers

YIT, Salesforce, Coca-Cola, SAP, U.S. Army, Liveperson, Playtech Case Study: Liveperson Implements Innovative Secure SDLC
Government agencies, Defense Industrial Base organizations, and enterprises in regulated industries such as finance, healthcare, manufacturing, and criticalinfrastructure rely on NodeZero to meet rigorous security and compliance requirements with continuous, scheduled, and on-demand testing.
Find out what your peers are saying about Checkmarx One vs. The NodeZero Platform by Horizon3.ai and other solutions. Updated: January 2026.
883,619 professionals have used our research since 2012.