CONTINUOUS DETECTION OF RUN-TIME VULNERABILITIES
AUTOMATE THE DETECTION OF RUN-TIME VULNERABILITIES DURING FUNCTIONAL TESTING
Checkmarx Interactive Application Security Testing fills the critical software security gap by leveraging existing functional testing activities to automate the detection of vulnerabilities on running applications. It is the industry’s first IAST solution that fully integrates with a Static Application Security Testing solution and offers customization of queries, leading to greater vulnerability coverage and more accurate results.
HOW TO BUY
DATASHEETS
OPTIMIZE YOUR REMEDIATION EFFORTS AT SCALE
The only IAST product in the market that is fully integrated with a best-of-breed SAST solution, enabling cross-product correlations that accelerate time-to-remediation. The code-level insight produced by static analysis, combined with the run-time knowledge coming from IAST, provides developers with a better understanding of where to fix the problem.
AUTOMATE SECURITY TESTING USING YOUR EXISTING PROCESSES
Checkmarx IAST relieves organizations from having to carry out dedicated security testing on running applications. A non-intrusive agent transparently integrates into the testing environment, continuously monitoring application activity to provide real-time feedback. Once functional testing is over, the security “scan” is also completed.
DELIVER SECURITY AS FAST AS APPLICATIONS CHANGE
Checkmarx IAST is built for DevOps, seamlessly fitting QA automation or CI/CD pipelines. The detection of vulnerabilities on running applications is automated to support application portfolios of virtually any size.
COMPLETE YOUR SOFTWARE SECURITY TESTING PORTFOLIO
Checkmarx IAST extends Checkmarx’s offering to fill a critical layer in your software security portfolio. While static analysis and software composition analysis ensure that you have scanned all home-grown code and third-party open source libraries, there are still certain flaws that can only be detected on a running application. Checkmarx IAST seals your SDLC with a security “stamp” without interrupting your existing DevOps and CI/CD workflows.


Support Languages



Vulnerability Coverage
SQL Injection
XXS Injection
OS Command Injection
PAth Traversal
XPath Injection
Parameter Tampering
Open Redirect
Trust Boundary Violation
Cross-Site Request Forgery
Sensitive Data Leakage
And More…
30-Minute Free Consultation
Due to our numerous partnerships, we can provide unbiased opinions on the best solution for your environment.
Unbeatable Prices
Our partnership levels give us the highest product discounts which we pass on as savings to our customers.
Professional Services
Finish your IT projects on-time and under budget with our nation-wide team of senior level engineers.
24x7 Tech Support
Rest assured knowing that our U.S. based IT support team is here for you on nights, weekends and when you need us most.