# Snyk, Tenable Vulnerability Management vs Checkmarx Comparison

| | Snyk | Tenable Vulnerability Management | Checkmarx | 
|---|---|---|---|
| **Star Rating** | 4.5 out of 5 | 4.5 out of 5 | 4.2 out of 5 | 
| **Total Reviews** | 132 | 122 | 36 | 
| **Largest Market Segment** | Mid-Market (45.4% of reviews) | Enterprise (58.0% of reviews) | Enterprise (53.1% of reviews) | 
| **Entry Level Price** | Free | No pricing available | No pricing available | 

---
## Top Pros & Cons

### Snyk

Pros:
- Vulnerability Detection (3 reviews)
- Vulnerability Identification (3 reviews)

Cons:
- False Positives (2 reviews)
- Poor Interface Design (2 reviews)

### Tenable Vulnerability Management

Pros:
- Ease of Use (12 reviews)
- Scanning Efficiency (10 reviews)

Cons:
- Expensive (6 reviews)
- Pricing Issues (6 reviews)

### Checkmarx

Pros:
- Implementation Ease (2 reviews)
- User Interface (2 reviews)

Cons:
- False Positives (1 reviews)
- Lacking Features (1 reviews)

---
## Ratings Comparison
| Rating | Snyk | Tenable Vulnerability Management | Checkmarx | 
|---|---|---|---|
  | **Meets Requirements** | 8.7 (94 reviews) | 8.9 (83 reviews) | 8.6 (27 reviews) | 
  | **Ease of Use** | 8.8 (95 reviews) | 8.9 (85 reviews) | 8.2 (27 reviews) | 
  | **Ease of Setup** | 9.1 (58 reviews) | 8.7 (69 reviews) | 7.7 (13 reviews) | 
  | **Ease of Admin** | 8.9 (51 reviews) | 8.7 (66 reviews) | 7.9 (13 reviews) | 
  | **Quality of Support** | 8.7 (79 reviews) | 8.1 (80 reviews) | 8.3 (22 reviews) | 
  | **Has the product been a good partner in doing business?** | 8.8 (48 reviews) | 8.6 (66 reviews) | 8.3 (12 reviews) | 
  | **Product Direction (% positive)** | 8.8 (84 reviews) | 8.9 (86 reviews) | 7.5 (23 reviews) | 

---
## Pricing

### Snyk

#### Entry-Level Pricing

Plan: FREE - Limited Tests, Unlimited Developers

Price: Free

Description: For individual developers and small teams looking to secure while they build. Unlimited Developers.

Key Features:
- 200 Open Source tests per month
- 100 Container tests per month
- 300 IaC tests per month

[Browse all 3 editions](https://www.g2.com/products/snyk/pricing)

#### Free Trial

No

### Tenable Vulnerability Management

#### Entry-Level Pricing

No pricing available

#### Free Trial

Yes

### Checkmarx

#### Entry-Level Pricing

No pricing available

#### Free Trial

Yes

---
## Features Comparison By Category

### Static Application Security Testing (SAST)

| Product | Score | Reviews |
|---|---|---|
| **Snyk** | 7.8/10 | 25 |
| **Tenable Vulnerability Management** | N/A | N/A |
| **Checkmarx** | 7.8/10 | 6 |

#### Administration

| Feature | Snyk | Tenable Vulnerability Management | Checkmarx | 
|---|---|---|---|
| **API / Integrations** | 8.6 (22 reviews) | Not enough data | 8.3 (5 reviews) | 
| **Extensibility** | 8.1 (18 reviews) | Not enough data | 8.3 (5 reviews) | 

#### Analysis

| Feature | Snyk | Tenable Vulnerability Management | Checkmarx | 
|---|---|---|---|
| **Reporting and Analytics** | 8.5 (23 reviews) | Not enough data | 8.6 (6 reviews) | 
| **Issue Tracking** | 8.3 (22 reviews) | Not enough data | 8.1 (6 reviews) | 
| **Static Code Analysis** | 8.7 (24 reviews) | Not enough data | 8.3 (6 reviews) | 
| **Code Analysis** | 8.9 (21 reviews) | Not enough data | 8.7 (5 reviews) | 

#### Testing

| Feature | Snyk | Tenable Vulnerability Management | Checkmarx | 
|---|---|---|---|
| **Command-Line Tools** | 7.8 (18 reviews) | Not enough data | 7.7 (5 reviews) | 
| **Manual Testing** | 6.5 (14 reviews) | Not enough data | 7.3 (5 reviews) | 
| **Test Automation** | 7.8 (19 reviews) | Not enough data | Not enough data | 
| **Compliance Testing** | 8.1 (15 reviews) | Not enough data | Not enough data | 
| **Black-Box Scanning** | 6.2 (13 reviews) | Not enough data | Not enough data | 
| **Detection Rate** | 7.5 (19 reviews) | Not enough data | Not enough data | 
| **False Positives** | 6.4 (17 reviews) | Not enough data | 5.3 (5 reviews) | 

#### Agentic AI - Static Application Security Testing (SAST)

| Feature | Snyk | Tenable Vulnerability Management | Checkmarx | 
|---|---|---|---|
| **Autonomous Task Execution** | Not enough data | Not enough data | Not enough data | 

### Dynamic Application Security Testing (DAST)

| Product | Score | Reviews |
|---|---|---|
| **Snyk** | N/A | N/A |
| **Tenable Vulnerability Management** | N/A | N/A |
| **Checkmarx** | N/A | N/A |

#### Administration

| Feature | Snyk | Tenable Vulnerability Management | Checkmarx | 
|---|---|---|---|
| **API / Integrations** | Not enough data | Not enough data | Not enough data | 
| **Extensibility** | Not enough data | Not enough data | Not enough data | 

#### Analysis

| Feature | Snyk | Tenable Vulnerability Management | Checkmarx | 
|---|---|---|---|
| **Reporting and Analytics** | Not enough data | Not enough data | Not enough data | 
| **Issue Tracking** | Not enough data | Not enough data | Not enough data | 
| **Static Code Analysis** | Not enough data | Not enough data | Not enough data | 
| **Vulnerability Scan** | Not enough data | Not enough data | Not enough data | 
| **Code Analysis** | Not enough data | Not enough data | Not enough data | 

#### Testing

| Feature | Snyk | Tenable Vulnerability Management | Checkmarx | 
|---|---|---|---|
| **Manual Testing** | Not enough data | Not enough data | Not enough data | 
| **Test Automation** | Not enough data | Not enough data | Not enough data | 
| **Compliance Testing** | Not enough data | Not enough data | Not enough data | 
| **Black-Box Scanning** | Not enough data | Not enough data | Not enough data | 
| **Detection Rate** | Not enough data | Not enough data | Not enough data | 
| **False Positives** | Not enough data | Not enough data | Not enough data | 

### Container Security

| Product | Score | Reviews |
|---|---|---|
| **Snyk** | 7.5/10 | 32 |
| **Tenable Vulnerability Management** | N/A | N/A |
| **Checkmarx** | N/A | N/A |

#### Administration

| Feature | Snyk | Tenable Vulnerability Management | Checkmarx | 
|---|---|---|---|
| **Risk Scoring** | 8.4 (29 reviews) | Not enough data | Not enough data | 
| **Secrets Management** | Feature Not Available | Not enough data | Not enough data | 
| **Security Auditing** | 7.9 (26 reviews) | Not enough data | Not enough data | 
| **Configuration Management** | 7.5 (19 reviews) | Not enough data | Not enough data | 

#### Monitoring

| Feature | Snyk | Tenable Vulnerability Management | Checkmarx | 
|---|---|---|---|
| **Continuous Image Assurance** | 8.0 (17 reviews) | Not enough data | Not enough data | 
| **Behavior Monitoring** | 6.5 (13 reviews) | Not enough data | Not enough data | 
| **Observability** | 7.1 (15 reviews) | Not enough data | Not enough data | 

#### Protection

| Feature | Snyk | Tenable Vulnerability Management | Checkmarx | 
|---|---|---|---|
| **Dynamic Image Scanning** | 7.4 (16 reviews) | Not enough data | Not enough data | 
| **Runtime Protection** | 7.5 (17 reviews) | Not enough data | Not enough data | 
| **Workload Protection** | 7.4 (14 reviews) | Not enough data | Not enough data | 
| **Network Segmentation** | 6.9 (12 reviews) | Not enough data | Not enough data | 

### Vulnerability Scanner

| Product | Score | Reviews |
|---|---|---|
| **Snyk** | 8.1/10 | 43 |
| **Tenable Vulnerability Management** | 8.2/10 | 51 |
| **Checkmarx** | N/A | N/A |

#### Performance

| Feature | Snyk | Tenable Vulnerability Management | Checkmarx | 
|---|---|---|---|
| **Issue Tracking** | 8.5 (36 reviews) | 8.4 (46 reviews) ✓ Verified | Not enough data | 
| **Detection Rate** | 8.5 (40 reviews) | 9.0 (48 reviews) ✓ Verified | Not enough data | 
| **False Positives** | 6.7 (32 reviews) | 7.1 (48 reviews) ✓ Verified | Not enough data | 
| **Automated Scans** | 9.1 (41 reviews) | 9.3 (48 reviews) ✓ Verified | Not enough data | 

#### Network

| Feature | Snyk | Tenable Vulnerability Management | Checkmarx | 
|---|---|---|---|
| **Compliance Testing** | 8.1 (25 reviews) | 8.5 (44 reviews) ✓ Verified | Not enough data | 
| **Perimeter Scanning** | 7.9 (19 reviews) | 8.7 (43 reviews) | Not enough data | 
| **Configuration Monitoring** | 8.2 (20 reviews) | 8.7 (40 reviews) ✓ Verified | Not enough data | 

#### Application

| Feature | Snyk | Tenable Vulnerability Management | Checkmarx | 
|---|---|---|---|
| **Manual Application Testing** | 7.8 (17 reviews) | Feature Not Available | Not enough data | 
| **Static Code Analysis** | 8.5 (34 reviews) | 7.5 (33 reviews) | Not enough data | 
| **Black Box Testing** | 7.4 (13 reviews) | Feature Not Available | Not enough data | 

#### Agentic AI - Vulnerability Scanner

| Feature | Snyk | Tenable Vulnerability Management | Checkmarx | 
|---|---|---|---|
| **Autonomous Task Execution** | Not enough data | 7.3 (5 reviews) | Not enough data | 
| **Proactive Assistance** | Not enough data | 7.3 (5 reviews) | Not enough data | 

### Software Composition Analysis

| Product | Score | Reviews |
|---|---|---|
| **Snyk** | 8.4/10 | 37 |
| **Tenable Vulnerability Management** | N/A | N/A |
| **Checkmarx** | N/A | N/A |

#### Functionality - Software Composition Analysis 

| Feature | Snyk | Tenable Vulnerability Management | Checkmarx | 
|---|---|---|---|
| **Language Support** | 8.1 (24 reviews) | Not enough data | Not enough data | 
| **Integration** | 8.7 (30 reviews) | Not enough data | Not enough data | 
| **Transparency** | 8.3 (31 reviews) | Not enough data | Not enough data | 

#### Effectiveness - Software Composition Analysis

| Feature | Snyk | Tenable Vulnerability Management | Checkmarx | 
|---|---|---|---|
| **Remediation Suggestions** | 8.3 (32 reviews) | Not enough data | Not enough data | 
| **Continuous Monitoring** | 8.7 (30 reviews) | Not enough data | Not enough data | 
| **Thorough Detection** | 8.2 (32 reviews) | Not enough data | Not enough data | 

### Risk-Based Vulnerability Management

| Product | Score | Reviews |
|---|---|---|
| **Snyk** | N/A | N/A |
| **Tenable Vulnerability Management** | 8.5/10 | 68 |
| **Checkmarx** | N/A | N/A |

#### Risk Analysis

| Feature | Snyk | Tenable Vulnerability Management | Checkmarx | 
|---|---|---|---|
| **Risk Scoring** | Not enough data | 8.9 (58 reviews) | Not enough data | 
| **Reporting** | Not enough data | 8.1 (59 reviews) | Not enough data | 
| **Risk-Prioritization** | Not enough data | 8.8 (58 reviews) | Not enough data | 

#### Vulnerability Assesment

| Feature | Snyk | Tenable Vulnerability Management | Checkmarx | 
|---|---|---|---|
| **Vulnerability Scanning** | Not enough data | 9.4 (60 reviews) | Not enough data | 
| **Vulnerability Intelligence** | Not enough data | 9.2 (57 reviews) | Not enough data | 
| **Contextual Data** | Not enough data | 8.7 (54 reviews) | Not enough data | 
| **Dashboards** | Not enough data | 8.2 (57 reviews) | Not enough data | 

#### Automation

| Feature | Snyk | Tenable Vulnerability Management | Checkmarx | 
|---|---|---|---|
| **Automated Remediation** | Not enough data | 7.7 (49 reviews) | Not enough data | 
| **Workflow Automation** | Not enough data | 7.8 (48 reviews) | Not enough data | 
| **Security Testing** | Not enough data | 8.1 (51 reviews) | Not enough data | 
| **Test Automation** | Not enough data | 8.1 (52 reviews) | Not enough data | 

### ServiceNow Store Apps

| Product | Score | Reviews |
|---|---|---|
| **Snyk** | N/A | N/A |
| **Tenable Vulnerability Management** | 8.5/10 | 8 |
| **Checkmarx** | N/A | N/A |

#### ServiceNow Apps

| Feature | Snyk | Tenable Vulnerability Management | Checkmarx | 
|---|---|---|---|
| **ServiceNow Integration** | Not enough data | 8.3 (7 reviews) | Not enough data | 
| **Value** | Not enough data | 8.3 (7 reviews) | Not enough data | 

#### Agentic AI - ServiceNow Store Apps

| Feature | Snyk | Tenable Vulnerability Management | Checkmarx | 
|---|---|---|---|
| **Autonomous Task Execution** | Not enough data | Not enough data | Not enough data | 
| **Multi-step Planning** | Not enough data | Not enough data | Not enough data | 
| **Cross-system Integration** | Not enough data | Not enough data | Not enough data | 
| **Proactive Assistance** | Not enough data | Not enough data | Not enough data | 

### Secure Code Review

| Product | Score | Reviews |
|---|---|---|
| **Snyk** | N/A | N/A |
| **Tenable Vulnerability Management** | N/A | N/A |
| **Checkmarx** | N/A | N/A |

#### Documentation

| Feature | Snyk | Tenable Vulnerability Management | Checkmarx | 
|---|---|---|---|
| **Feedback** | Not enough data | Not enough data | Not enough data | 
| **Prioritization** | Not enough data | Not enough data | Not enough data | 
| **Remediation Suggestions** | Not enough data | Not enough data | Not enough data | 

#### Security

| Feature | Snyk | Tenable Vulnerability Management | Checkmarx | 
|---|---|---|---|
| **False Positives** | Not enough data | Not enough data | Not enough data | 
| **Custom Compliance** | Not enough data | Not enough data | Not enough data | 
| **Agility** | Not enough data | Not enough data | Not enough data | 

### Software Supply Chain Security Tools

| Product | Score | Reviews |
|---|---|---|
| **Snyk** | N/A | N/A |
| **Tenable Vulnerability Management** | N/A | N/A |
| **Checkmarx** | N/A | N/A |

#### Security

| Feature | Snyk | Tenable Vulnerability Management | Checkmarx | 
|---|---|---|---|
| **Tampering** | Not enough data | Not enough data | Not enough data | 
| **Malicious Code** | Not enough data | Not enough data | Not enough data | 
| **Verification** | Not enough data | Not enough data | Not enough data | 
| **Security Risks** | Not enough data | Not enough data | Not enough data | 

#### Tracking

| Feature | Snyk | Tenable Vulnerability Management | Checkmarx | 
|---|---|---|---|
| **Bill of Materials** | Not enough data | Not enough data | Not enough data | 
| **Audit Trails** | Not enough data | Not enough data | Not enough data | 
| **Monitoring** | Not enough data | Not enough data | Not enough data | 

### Software Bill of Materials (SBOM)

| Product | Score | Reviews |
|---|---|---|
| **Snyk** | N/A | N/A |
| **Tenable Vulnerability Management** | N/A | N/A |
| **Checkmarx** | N/A | N/A |

#### Functionality - Software Bill of Materials (SBOM)

| Feature | Snyk | Tenable Vulnerability Management | Checkmarx | 
|---|---|---|---|
| **Format Support** | Not enough data | Not enough data | Not enough data | 
| **Annotations** | Not enough data | Not enough data | Not enough data | 
| **Attestation** | Not enough data | Not enough data | Not enough data | 

#### Management - Software Bill of Materials (SBOM)

| Feature | Snyk | Tenable Vulnerability Management | Checkmarx | 
|---|---|---|---|
| **Monitoring** | Not enough data | Not enough data | Not enough data | 
| **Dashboards** | Not enough data | Not enough data | Not enough data | 
| **User Provisioning** | Not enough data | Not enough data | Not enough data | 

### Static Code Analysis

| Product | Score | Reviews |
|---|---|---|
| **Snyk** | N/A | N/A |
| **Tenable Vulnerability Management** | N/A | N/A |
| **Checkmarx** | N/A | N/A |

#### Agentic AI - Static Code Analysis

| Feature | Snyk | Tenable Vulnerability Management | Checkmarx | 
|---|---|---|---|
| **Adaptive Learning** | Not enough data | Not enough data | Not enough data | 
| **Natural Language Interaction** | Not enough data | Not enough data | Not enough data | 
| **Proactive Assistance** | Not enough data | Not enough data | Not enough data | 

### AI AppSec Assistants

| Product | Score | Reviews |
|---|---|---|
| **Snyk** | N/A | N/A |
| **Tenable Vulnerability Management** | N/A | N/A |
| **Checkmarx** | N/A | N/A |

#### Performance - AI AppSec Assistants

| Feature | Snyk | Tenable Vulnerability Management | Checkmarx | 
|---|---|---|---|
| **Remediation** | Not enough data | Not enough data | Not enough data | 
| **Real-time Vulnerability Detection** | Not enough data | Not enough data | Not enough data | 
| **Accuracy** | Not enough data | Not enough data | Not enough data | 

#### Integration - AI AppSec Assistants

| Feature | Snyk | Tenable Vulnerability Management | Checkmarx | 
|---|---|---|---|
| **Stack Integration** | Not enough data | Not enough data | Not enough data | 
| **Workflow Integration** | Not enough data | Not enough data | Not enough data | 
| **Codebase Contextual Awareness** | Not enough data | Not enough data | Not enough data | 

### Interactive Application Security Testing (IAST)

| Product | Score | Reviews |
|---|---|---|
| **Snyk** | N/A | N/A |
| **Tenable Vulnerability Management** | N/A | N/A |
| **Checkmarx** | N/A | N/A |

#### Agentic AI - Interactive Application Security Testing (IAST)

| Feature | Snyk | Tenable Vulnerability Management | Checkmarx | 
|---|---|---|---|
| **Autonomous Task Execution** | Not enough data | Not enough data | Not enough data | 

---
## Categories

**Unique to Snyk (7):** [Software Composition Analysis Tools](https://www.g2.com/categories/software-composition-analysis), [Software Supply Chain Security Solutions](https://www.g2.com/categories/software-supply-chain-security-tools), [AI AppSec Assistants](https://www.g2.com/categories/ai-appsec-assistants), [Container Security Tools](https://www.g2.com/categories/container-security-tools), [Static Application Security Testing (SAST) Software](https://www.g2.com/categories/static-application-security-testing-sast), [Vulnerability Scanner Software](https://www.g2.com/categories/vulnerability-scanner), [Software Bill of Materials (SBOM) Software](https://www.g2.com/categories/software-bill-of-materials-sbom)

**Unique to Tenable Vulnerability Management (3):** [Risk-Based Vulnerability Management Software](https://www.g2.com/categories/risk-based-vulnerability-management), [Vulnerability Scanner Software](https://www.g2.com/categories/vulnerability-scanner), [ServiceNow Marketplace Apps](https://www.g2.com/categories/servicenow-store-apps)

**Unique to Checkmarx (6):** [AI AppSec Assistants](https://www.g2.com/categories/ai-appsec-assistants), [Static Application Security Testing (SAST) Software](https://www.g2.com/categories/static-application-security-testing-sast), [Dynamic Application Security Testing (DAST) Software](https://www.g2.com/categories/dynamic-application-security-testing-dast), [Secure Code Review Software](https://www.g2.com/categories/secure-code-review), [Static Code Analysis Tools](https://www.g2.com/categories/static-code-analysis), [Interactive Application Security Testing (IAST) Software](https://www.g2.com/categories/interactive-application-security-testing-iast)


---
## Reviewer Demographics

### By Company Size

| Segment | Snyk | Tenable Vulnerability Management | Checkmarx | 
|---|---|---|---|
| **Small-Business** | 35.4% | 10.7% | 18.8% | 
| **Mid-Market** | 45.4% | 31.3% | 28.1% | 
| **Enterprise** | 19.2% | 58.0% | 53.1% | 

### By Industry

#### Snyk

- **Computer Software:** 22.3%
- **Information Technology and Services:** 20.8%
- **Computer &amp; Network Security:** 9.2%
- **Hospital &amp; Health Care:** 5.4%
- **Financial Services:** 5.4%
- **Telecommunications:** 3.1%
- **Banking:** 3.1%
- **Education Management:** 2.3%
- **Internet:** 2.3%
- **Retail:** 1.5%
- **Other:** 24.6%

#### Tenable Vulnerability Management

- **Information Technology and Services:** 14.3%
- **Financial Services:** 13.4%
- **Computer &amp; Network Security:** 8.9%
- **Banking:** 6.3%
- **Computer Software:** 5.4%
- **Government Administration:** 4.5%
- **Hospital &amp; Health Care:** 4.5%
- **Telecommunications:** 2.7%
- **Security and Investigations:** 2.7%
- **Pharmaceuticals:** 2.7%
- **Other:** 34.8%

#### Checkmarx

- **Computer Software:** 15.6%
- **Information Technology and Services:** 15.6%
- **Banking:** 9.4%
- **Computer &amp; Network Security:** 9.4%
- **Automotive:** 6.3%
- **Investment Banking:** 3.1%
- **Internet:** 3.1%
- **International Trade and Development:** 3.1%
- **Insurance:** 3.1%
- **Legal Services:** 3.1%
- **Other:** 28.1%

---
## Alternatives

### Alternatives to Snyk

- [Aikido Security](https://www.g2.com/products/aikido-security/reviews) — 4.6/5 stars (141 reviews)
- [Mend.io](https://www.g2.com/products/mend-io/reviews) — 4.3/5 stars (112 reviews)
- [Wiz](https://www.g2.com/products/wiz-wiz/reviews) — 4.7/5 stars (791 reviews)
- [SonarQube](https://www.g2.com/products/sonarqube/reviews) — 4.4/5 stars (141 reviews)
- [Semgrep](https://www.g2.com/products/semgrep/reviews) — 4.6/5 stars (55 reviews)
- [Veracode Application Security Platform](https://www.g2.com/products/veracode-application-security-platform/reviews) — 3.8/5 stars (25 reviews)
- [GitLab](https://www.g2.com/products/gitlab/reviews) — 4.5/5 stars (890 reviews)
- [GitHub](https://www.g2.com/products/github/reviews) — 4.7/5 stars (2347 reviews)
- [SOOS](https://www.g2.com/products/soos/reviews) — 4.6/5 stars (42 reviews)
- [FortiCNAPP](https://www.g2.com/products/forticnapp/reviews) — 4.4/5 stars (386 reviews)

### Alternatives to Tenable Vulnerability Management

- [InsightVM (Nexpose)](https://www.g2.com/products/insightvm-nexpose/reviews) — 4.4/5 stars (78 reviews)
- [Wiz](https://www.g2.com/products/wiz-wiz/reviews) — 4.7/5 stars (791 reviews)
- [Qualys VMDR](https://www.g2.com/products/qualys-vmdr/reviews) — 4.4/5 stars (167 reviews)
- [Cisco Vulnerability Management (formerly Kenna.VM)](https://www.g2.com/products/cisco-vulnerability-management-formerly-kenna-vm/reviews) — 4.3/5 stars (217 reviews)
- [Intruder](https://www.g2.com/products/intruder/reviews) — 4.8/5 stars (206 reviews)
- [SentinelOne Singularity Endpoint](https://www.g2.com/products/sentinelone-singularity-endpoint/reviews) — 4.7/5 stars (201 reviews)
- [Burp Suite](https://www.g2.com/products/burp-suite/reviews) — 4.8/5 stars (129 reviews)
- [OpenVAS](https://www.g2.com/products/openvas/reviews) — 4.4/5 stars (32 reviews)
- [Amazon Inspector](https://www.g2.com/products/amazon-inspector/reviews) — 4.4/5 stars (26 reviews)
- [Microsoft Defender Vulnerability Management](https://www.g2.com/products/microsoft-defender-vulnerability-management/reviews) — 4.4/5 stars (34 reviews)

### Alternatives to Checkmarx

- [Veracode Application Security Platform](https://www.g2.com/products/veracode-application-security-platform/reviews) — 3.8/5 stars (25 reviews)
- [SonarQube](https://www.g2.com/products/sonarqube/reviews) — 4.4/5 stars (141 reviews)
- [GitLab](https://www.g2.com/products/gitlab/reviews) — 4.5/5 stars (890 reviews)
- [GitHub](https://www.g2.com/products/github/reviews) — 4.7/5 stars (2347 reviews)
- [HCL AppScan](https://www.g2.com/products/hcl-appscan/reviews) — 4.1/5 stars (76 reviews)
- [Coverity](https://www.g2.com/products/coverity/reviews) — 4.2/5 stars (55 reviews)
- [OpenText Core Application Security](https://www.g2.com/products/opentext-core-application-security/reviews) — 4.1/5 stars (34 reviews)
- [Invicti (formerly Netsparker)](https://www.g2.com/products/invicti-formerly-netsparker/reviews) — 4.6/5 stars (69 reviews)
- [Mend.io](https://www.g2.com/products/mend-io/reviews) — 4.3/5 stars (112 reviews)
- [Tenable Nessus](https://www.g2.com/products/tenable-nessus/reviews) — 4.5/5 stars (301 reviews)

---
## Top Discussions

### Snyk

- Title: [What is Snyk scanning?](https://www.g2.com/discussions/what-is-snyk-scanning) — 2 comments, 2 upvotes
  > **Top comment:** "Codebase and open source libraries"
- Title: [Is Snyk a SaaS?](https://www.g2.com/discussions/is-snyk-a-saas) — 2 comments
  > **Top comment:** "No"
- Title: [How good is Snyk?](https://www.g2.com/discussions/how-good-is-snyk) — 2 comments
  > **Top comment:** "very.

it&#39;s basically like dependabot, but more fleshed out"

### Tenable Vulnerability Management

- Title: [What is your primary use case for Tenable Vulnerability Management, and how has it impacted your security posture?](https://www.g2.com/discussions/what-is-your-primary-use-case-for-tenable-vulnerability-management-and-how-has-it-impacted-your-security-posture) — 1 comment
  > **Top comment:** "Hello, good morning!
Well, our first impression was of the completely vulnerable and exposed environment. This was a view we didn&#39;t have before Tenable VM...."
- Title: [What is Tenable.io used for?](https://www.g2.com/discussions/what-is-tenable-io-used-for) — 1 comment
  > **Top comment:** "vulnerability and security management."
- Title: [What is tenable io?](https://www.g2.com/discussions/what-is-tenable-io) — 1 comment
  > **Top comment:** "Tenable.io is user-friendly front end for Nessus scanners that provides a digestible view of all of the data the scanner is picking up. It allows you to..."
- Title: [Please advice on best practices for utilizing API to tie to visualization dashboards such as Power BI, Qlick, or Tableau](https://www.g2.com/discussions/34558-please-advice-on-best-practices-for-utilizing-api-to-tie-to-visualization-dashboards-such-as-power-bi-qlick-or-tableau) — 1 comment, 1 upvote
  > **Top comment:** "Table"

### Checkmarx

- Title: [What is Checkmarx used for?](https://www.g2.com/discussions/what-is-checkmarx-used-for) — 2 comments
  > **Top comment:** "Checkmarx is a static code analysis tool used for SAST (Static application security testing)"
- Title: [What is Checkmarx used for?](https://www.g2.com/discussions/checkmarx-what-is-checkmarx-used-for) — 1 comment, 1 upvote
  > **Top comment:** "Checkmarx is an ultimate tool for Static code scan and analysis through code vulnerability testing, SCA and secret detections. They have a prebuilt engine to..."
- Title: [Which testing method does Checkmarx support?](https://www.g2.com/discussions/which-testing-method-does-checkmarx-support) — 1 comment
  > **Top comment:** "Checkmarx does support all these testing methodologies -Sast, Dast, IAST, SCA "
- Title: [Does Checkmarx support DAST?](https://www.g2.com/discussions/does-checkmarx-support-dast) — 1 comment
  > **Top comment:** "You cannot test DAST Testing using Checkmarx"

---
**Source:** [G2.com](https://www.g2.com) | [Comparison Page](https://www.g2.com/compare/snyk-vs-tenable-vulnerability-management-vs-checkmarx)

