Try our new research platform with insights from 80,000+ expert users

Checkmarx Software Composition Analysis vs Debricked Security comparison

 

Comparison Buyer's Guide

Executive Summary

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Checkmarx Software Composit...
Ranking in Software Composition Analysis (SCA)
8th
Average Rating
9.0
Reviews Sentiment
7.6
Number of Reviews
13
Ranking in other categories
No ranking in other categories
Debricked Security
Ranking in Software Composition Analysis (SCA)
20th
Average Rating
0.0
Reviews Sentiment
8.4
Number of Reviews
1
Ranking in other categories
Vulnerability Management (113th)
 

Mindshare comparison

As of July 2025, in the Software Composition Analysis (SCA) category, the mindshare of Checkmarx Software Composition Analysis is 2.6%, down from 2.9% compared to the previous year. The mindshare of Debricked Security is 0.9%, up from 0.6% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Software Composition Analysis (SCA)
 

Featured Reviews

Tharindu Malwenna - PeerSpot reviewer
Efficient library identification and upgrade suggestions improve application security
We have many third-party libraries in our organization. I used Checkmarx Software Composition Analysis to identify all the libraries we use and determine whether they are used or unused within the application Checkmarx Software Composition Analysis provides identification of libraries and…
Jonathan Steyn - PeerSpot reviewer
Allows for organizations and projects to manage open source vulnerabilities in an efficient, smooth and secure way
Debricked Security has already implemented several improvements, which are great. One area that could be improved is simplifying the process of converting other SBOM data formats into files that Debricked can understand. While the conversion isn't difficult, it is pretty technical and could be challenging for non-technical users. Apart from that, all software features work seamlessly. The integration with endpoints took less than fifteen minutes, and everything from security conventions to automation rules works perfectly. As for AI, Debricked Security uses it effectively, reducing manual work and unnecessary analysis. It enhances data analysis, making it much easier for customers, which I appreciate about the tool.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"The customer service and support were good."
"The integration part is easy...It's a stable solution right now."
"It has improved identification capabilities, scalability, and integration with AI, such as the AI-powered suggestions."
"It is a stable solution...It is a scalable solution."
"One of the strong points of this solution is that it allows you to incorporate it into a CICB pipeline. It has the ability to do incremental scans. If you scan a very large application, it might take two hours to do the initial scan. The subsequent scans, as people are making changes to the app, scan the Delta and are very fast. That's a really nice implementation. The way they have incorporated the functionality of the incremental scans is something to be aware of. It is quite good. It has been very solid. We haven't really had any issues, and it does what it advertises to do very nicely."
"I appreciate the user-friendly interface. The GUI is excellent, providing detailed information on outdated versions, including version numbers and the flow of library calls. This allows me to plan and prioritize library changes based on potential vulnerabilities, even if the affected library is indirectly used in my project. The tool offers specific guidance on addressing these issues."
"We were able to reduce the number of vulnerable libraries by 50%, leading to significant operational improvement."
"The product is stable and scalable."
"One of the most valuable features of Debricked Security is its ability to integrate with other tools like the Software Security Center and Fortify on Demand. This integration allows users to make comparisons and generate detailed reports based on the data that Debricked Security populates or aggregates. While this feature may not be unique, it is highly effective for detecting vulnerabilities and providing comprehensive insights."
 

Cons

"API security is an area with shortcomings that needs improvement."
"Some of the recommendations provided by the product are generic. Even if the recommendations provided by the product are of low level, the appropriate ones can help users deal with vulnerabilities."
"The solution could improve by determining the success factor of an upgrade, which is currently lacking."
"The solution could improve by determining the success factor of an upgrade, which is currently lacking."
"Parts of the implementation process could improve by making it more user-friendly."
"In terms of areas for improvement, what could be improved in Checkmarx Software Composition Analysis is pricing because customers always compare the pricing among secure DevOps solutions in the market. Checkmarx Software Composition Analysis has a lot of competitors yet its features aren't much different. Pricing is the first thing customers consider, and from a partner perspective, if you can offer affordable pricing to your customers, it's more likely you'll have a winning deal. The performance of Checkmarx Software Composition Analysis also needs improvement because sometimes, it's slow, and in particular, scanning could take several hours."
"I have received complaints from my customers that the pricing could be improved."
"It can have better licensing models."
"Debricked Security has already implemented several improvements, which are great. One area that could be improved is simplifying the process of converting other SBOM data formats into files that Debricked can understand. While the conversion isn't difficult, it is pretty technical and could be challenging for non-technical users. Apart from that, all software features work seamlessly. The integration with endpoints took less than fifteen minutes, and everything from security conventions to automation rules works perfectly. As for AI, Debricked Security uses it effectively, reducing manual work and unnecessary analysis. It enhances data analysis, making it much easier for customers, which I appreciate about the tool."
 

Pricing and Cost Advice

"It is a little bit high priced. It would be better if it was a little less expensive."
"The license model is somewhat perplexing as it comprises multiple aspects that can be confusing for customers. The model is determined by the number of registered users and the number of projects being scanned, along with a third component that adds to the complexity."
"Pricing for Checkmarx Software Composition Analysis needs to be competitive."
"We don't have a license. The usage is limited to one, two, three, five, or ten people. It is currently used for all projects, and there are plans to increase its usage."
"My customers need to pay for the licensing part, and they need to opt for an annual subscription."
"Regarding the cost, in my country, I would say it is expensive. However, I’m not directly involved in the sales process, so I don't have the exact license costs."
report
Use our free recommendation engine to learn which Software Composition Analysis (SCA) solutions are best for your needs.
862,543 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Financial Services Firm
35%
Manufacturing Company
11%
Computer Software Company
8%
Insurance Company
4%
Computer Software Company
17%
Comms Service Provider
11%
Financial Services Firm
9%
Healthcare Company
8%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
No data available
 

Questions from the Community

What do you like most about Checkmarx Software Composition Analysis?
The tool's visual scan analysis shows me all the libraries' vulnerabilities and license types. It helps identify the most complex issues with licenses. It provides good visibility. SCA shows me all...
What is your experience regarding pricing and costs for Checkmarx Software Composition Analysis?
Pricing is complex and high for small organizations but offers great benefits for larger organizations. It is notably different compared to competitors like GitHub Advanced Security.
What needs improvement with Checkmarx Software Composition Analysis?
The solution could improve by determining the success factor of an upgrade, which is currently lacking.
What is your experience regarding pricing and costs for Debricked Security?
Regarding the cost, in my country, I would say it is expensive. However, I’m not directly involved in the sales process, so I don't have the exact license costs.
What needs improvement with Debricked Security?
Debricked Security has already implemented several improvements, which are great. One area that could be improved is simplifying the process of converting other SBOM data formats into files that De...
What is your primary use case for Debricked Security?
I initially did proof of value or concept walkthroughs of Debricked Security for the customer. I demonstrated the value of Debricked and how it enhances their current security architecture. With my...
 

Also Known As

CxSCA
No data available
 

Overview

 

Sample Customers

AXA, Liveperson, Aaron's, Playtech, Morningstar
Information Not Available
Find out what your peers are saying about Black Duck, Snyk, Veracode and others in Software Composition Analysis (SCA). Updated: July 2025.
862,543 professionals have used our research since 2012.