What is the Cost?

Request a quote

link

See how it works

Watch the demo
link

Want to know more?

Let's talk

link

Interactive Code Scanning, vulnerabilities, SAST, OSA, AST, Codebashing, checkmarx, ndm

CONTINUOUS DETECTION OF RUN-TIME VULNERABILITIES

AUTOMATE THE DETECTION OF RUN-TIME VULNERABILITIES DURING FUNCTIONAL TESTING

Checkmarx Interactive Application Security Testing fills the critical software security gap by leveraging existing functional testing activities to automate the detection of vulnerabilities on running applications. It is the industry’s first IAST solution that fully integrates with a Static Application Security Testing solution and offers customization of queries, leading to greater vulnerability coverage and more accurate results.

HOW TO BUY

(888) 864-1641

For pricing or technical questions, please contact us!

Email Our Team

DATASHEETS

OPTIMIZE YOUR REMEDIATION EFFORTS AT SCALE

The only IAST product in the market that is fully integrated with a best-of-breed SAST solution, enabling cross-product correlations that accelerate time-to-remediation. The code-level insight produced by static analysis, combined with the run-time knowledge coming from IAST, provides developers with a better understanding of where to fix the problem.

AUTOMATE SECURITY TESTING USING YOUR EXISTING PROCESSES

Checkmarx IAST relieves organizations from having to carry out dedicated security testing on running applications. A non-intrusive agent transparently integrates into the testing environment, continuously monitoring application activity to provide real-time feedback. Once functional testing is over, the security “scan” is also completed.

DELIVER SECURITY AS FAST AS APPLICATIONS CHANGE

Checkmarx IAST is built for DevOps, seamlessly fitting QA automation or CI/CD pipelines. The detection of vulnerabilities on running applications is automated to support application portfolios of virtually any size.

COMPLETE YOUR SOFTWARE SECURITY TESTING PORTFOLIO

Checkmarx IAST extends Checkmarx’s offering to fill a critical layer in your software security portfolio. While static analysis and software composition analysis ensure that you have scanned all home-grown code and third-party open source libraries, there are still certain flaws that can only be detected on a running application. Checkmarx IAST seals your SDLC with a security “stamp” without interrupting your existing DevOps and CI/CD workflows.

checkmarx, application security testing, cybersecurity
checkmarx, application security testing, cybersecurity

Support Languages

java, source code scanning, codebashing, sast, open source
node, nodejs, source code scanning, codebashing, sast, open source, node js
microsoft, dot net, net, source code scanning, codebashing, sast, open source

Vulnerability Coverage

SQL Injection

XXS Injection

OS Command Injection

PAth Traversal

XPath Injection

Parameter Tampering

Open Redirect

Trust Boundary Violation

Cross-Site Request Forgery

Sensitive Data Leakage

And More…

free consultation, SAST, OSA, AST, Codebashing, checkmarx, ndm30-Minute Free Consultation

Due to our numerous partnerships, we can provide unbiased opinions on the best solution for your environment.

unbeatable pricing, SAST, OSA, AST, Codebashing, checkmarx, ndmUnbeatable Prices

Our partnership levels give us the highest product discounts which we pass on as savings to our customers.

Professional Services, SAST, OSA, AST, Codebashing, checkmarx, ndmProfessional Services

Finish your IT projects on-time and under budget with our nation-wide team of senior level engineers.

24x7 Tech Support, SAST, OSA, AST, Codebashing, checkmarx, ndm24x7 Tech Support

Rest assured knowing that our U.S. based IT support team is here for you on nights, weekends and when you need us most.