Checkmarx Software Composition Analysis vs Sonatype Repository Firewall comparison

Cancel
You must select at least 2 products to compare!
Comparison Buyer's Guide
Executive Summary

We performed a comparison between Checkmarx Software Composition Analysis and Sonatype Repository Firewall based on real PeerSpot user reviews.

Find out in this report how the two Software Composition Analysis (SCA) solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI.
To learn more, read our detailed Checkmarx Software Composition Analysis vs. Sonatype Repository Firewall Report (Updated: March 2024).
771,157 professionals have used our research since 2012.
Featured Review
Quotes From Members
We asked business professionals to review the solutions they use.
Here are some excerpts of what they said:
Pros
"It is very easy and user friendly. It never requires any kind of technical support. You can do everything on your own.""The most valuable feature of Checkmarx Software Composition Analysis is the comprehensive security scan.""The product is stable and scalable.""I appreciate the user-friendly interface. The GUI is excellent, providing detailed information on outdated versions, including version numbers and the flow of library calls. This allows me to plan and prioritize library changes based on potential vulnerabilities, even if the affected library is indirectly used in my project. The tool offers specific guidance on addressing these issues.""What's most valuable in Checkmarx Software Composition Analysis is that it provides security from the start. In the traditional approach, an enterprise or company validates the solution before launching to a production environment, but in the modern approach, security must be checked and provided from the beginning and from the design, and this is where Checkmarx Software Composition Analysis comes in. The solution helps you make sure that every open-source application that you use is secure, and that there's no vulnerability inside that open-source application.""The tool's visual scan analysis shows me all the libraries' vulnerabilities and license types. It helps identify the most complex issues with licenses. It provides good visibility. SCA shows me all libraries that are vulnerable and the extent of their vulnerability.""The integration part is easy...It's a stable solution right now.""One of the strong points of this solution is that it allows you to incorporate it into a CICB pipeline. It has the ability to do incremental scans. If you scan a very large application, it might take two hours to do the initial scan. The subsequent scans, as people are making changes to the app, scan the Delta and are very fast. That's a really nice implementation. The way they have incorporated the functionality of the incremental scans is something to be aware of. It is quite good. It has been very solid. We haven't really had any issues, and it does what it advertises to do very nicely."

More Checkmarx Software Composition Analysis Pros →

"Another thing that I like about Sonatype is that if you download something today, and five days from today it becomes vulnerable, it will notify you.""The product's network and intrusion protection features are valuable. It also has rules and compliance features for security."

More Sonatype Repository Firewall Pros →

Cons
"Checkmarx Software Composition Analysis should improve dynamic analysis.""It can have better licensing models.""Some of the recommendations provided by the product are generic. Even if the recommendations provided by the product are of low level, the appropriate ones can help users deal with vulnerabilities.""I would rate the scalability a seven out of ten.""I have received complaints from my customers that the pricing could be improved.""Parts of the implementation process could improve by making it more user-friendly.""In terms of areas for improvement, what could be improved in Checkmarx Software Composition Analysis is pricing because customers always compare the pricing among secure DevOps solutions in the market. Checkmarx Software Composition Analysis has a lot of competitors yet its features aren't much different. Pricing is the first thing customers consider, and from a partner perspective, if you can offer affordable pricing to your customers, it's more likely you'll have a winning deal. The performance of Checkmarx Software Composition Analysis also needs improvement because sometimes, it's slow, and in particular, scanning could take several hours.""Instant updates for end users to identify vulnerabilities as soon as possible will make Checkmarx Software Composition Analysis better. The UI of the solution could also be improved."

More Checkmarx Software Composition Analysis Cons →

"The tool needs to improve its file systems. The product should also include zero test feature.""What I don't like is the lack of an option to pick up the phone and call someone for support. That is something they need to improve on. They need to have a professional services package, or they need to include that option with their services."

More Sonatype Repository Firewall Cons →

Pricing and Cost Advice
  • "It is a little bit high priced. It would be better if it was a little less expensive."
  • "Pricing for Checkmarx Software Composition Analysis needs to be competitive."
  • "The license model is somewhat perplexing as it comprises multiple aspects that can be confusing for customers. The model is determined by the number of registered users and the number of projects being scanned, along with a third component that adds to the complexity."
  • "My customers need to pay for the licensing part, and they need to opt for an annual subscription."
  • "We don't have a license. The usage is limited to one, two, three, five, or ten people. It is currently used for all projects, and there are plans to increase its usage."
  • More Checkmarx Software Composition Analysis Pricing and Cost Advice →

  • "The pricing is reasonable if you're a large enterprise developing code. It's not super-expensive."
  • More Sonatype Repository Firewall Pricing and Cost Advice →

    report
    Use our free recommendation engine to learn which Software Composition Analysis (SCA) solutions are best for your needs.
    771,157 professionals have used our research since 2012.
    Questions from the Community
    Top Answer:The tool's visual scan analysis shows me all the libraries' vulnerabilities and license types. It helps identify the most complex issues with licenses. It provides good visibility. SCA shows me all… more »
    Top Answer:We have a license. The usage is limited to one, two, three, five, or ten people. It is currently used for all projects, and there are plans to increase its usage.
    Top Answer:Checkmarx Software Composition Analysis should improve dynamic analysis.
    Top Answer:The product's network and intrusion protection features are valuable. It also has rules and compliance features for security.
    Top Answer:The product helps with vulnerability and security assessment. It also helps with assessment at the configuration level.
    Ranking
    Views
    1,653
    Comparisons
    1,240
    Reviews
    9
    Average Words per Review
    460
    Rating
    9.1
    Views
    1,040
    Comparisons
    510
    Reviews
    1
    Average Words per Review
    105
    Rating
    8.0
    Comparisons
    Also Known As
    CxSCA
    Sonatype Nexus Firewall, Nexus Firewall
    Learn More
    Overview

    Checkmarx Software Composition Analysis (SCA) helps organizations manage the risks associated with open source and third-party components in their software applications. While leveraging open source libraries and third-party dependencies is common practice, it can also introduce security vulnerabilities and license risks.


    Checkmarx SCA offers a multifaceted approach to managing these risks by:


    • Automatically scanning project repositories, build configurations, and manifests to create a comprehensive inventory of all components, including version information and associated licenses.

    • Performing vulnerability assessments on each component, including identifying and prioritizing actual exploitable or reachable vulnerabilities.

    • Protecting organizations from software supply chain attacks involving malicious packages, such as the XZ Utils backdoor.

    • Identifying licenses associated and providing insights into license obligations, restrictions, and potential conflicts.

    • Integrating seamlessly into existing development workflows and CI/CD pipelines.

    • Providing actionable remediation guidance to help organizations address identified vulnerabilities and compliance issues effectively.

    Sonatype Repository Firewall is a cloud-based security solution designed to safeguard your software supply chain against malicious components. It operates by meticulously scanning and evaluating each new component against customized governance policies, thereby effectively identifying and blocking potential threats before they infiltrate your development pipeline. What sets Sonatype Repository Firewall apart is its user-friendly setup, seamless integration with existing workflows, and remarkable scalability, making it suitable for software development environments of any size. Key features include blocking malicious components through behavioral analysis, malware scanning, and vulnerability assessment, as well as the ability to enforce custom governance policies. By utilizing this tool, organizations can enhance their software supply chain security, mitigate risks related to supply chain attacks, bolster compliance with industry standards, and ultimately reduce costs associated with security incidents. 

    Sample Customers
    AXA, Liveperson, Aaron's, Playtech, Morningstar
    EDF, Tomitribe, Crosskey, Blackboard, Travel audience
    Top Industries
    REVIEWERS
    Energy/Utilities Company22%
    Manufacturing Company22%
    Outsourcing Company11%
    Financial Services Firm11%
    VISITORS READING REVIEWS
    Financial Services Firm38%
    Manufacturing Company13%
    Computer Software Company12%
    Healthcare Company4%
    VISITORS READING REVIEWS
    Financial Services Firm33%
    Government8%
    Computer Software Company7%
    Manufacturing Company5%
    Company Size
    REVIEWERS
    Small Business57%
    Large Enterprise43%
    VISITORS READING REVIEWS
    Small Business13%
    Midsize Enterprise8%
    Large Enterprise79%
    VISITORS READING REVIEWS
    Small Business15%
    Midsize Enterprise11%
    Large Enterprise74%
    Buyer's Guide
    Checkmarx Software Composition Analysis vs. Sonatype Repository Firewall
    March 2024
    Find out what your peers are saying about Checkmarx Software Composition Analysis vs. Sonatype Repository Firewall and other solutions. Updated: March 2024.
    771,157 professionals have used our research since 2012.

    Checkmarx Software Composition Analysis is ranked 8th in Software Composition Analysis (SCA) with 12 reviews while Sonatype Repository Firewall is ranked 14th in Software Composition Analysis (SCA) with 3 reviews. Checkmarx Software Composition Analysis is rated 9.2, while Sonatype Repository Firewall is rated 8.4. The top reviewer of Checkmarx Software Composition Analysis writes "Comprehensive security scan, helpful support, and high availability". On the other hand, the top reviewer of Sonatype Repository Firewall writes "You will get clean code every time, and that's a great achievement". Checkmarx Software Composition Analysis is most compared with Black Duck, JFrog Xray, Semgrep Supply Chain, Fortify Static Code Analyzer and Mend.io, whereas Sonatype Repository Firewall is most compared with JFrog Xray, Cisco Secure Firewall, Black Duck, GitHub and Veracode. See our Checkmarx Software Composition Analysis vs. Sonatype Repository Firewall report.

    See our list of best Software Composition Analysis (SCA) vendors.

    We monitor all Software Composition Analysis (SCA) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.