Checkmarx One

Container Security

Secure your containerized applications throughout the SDLC, from the first line of code to deployment and runtime in the cloud.

image_Hero_Container Security

Securing Your Containers with Checkmarx

Checkmarx Container Security simplifies image scanning, monitors Docker environments, and helps resolves vulnerabilities. Identify, triage, prioritize, and address security flaws across the SDLC to prevent issues in production workloads.

Container Image Scanning

Container Image Scanning 

Scan container images to uncover vulnerabilities, outdated versions, insecure dependencies, legal issues, malware, misconfigurations, and compliance risks in base images, software dependencies, and application code layers.

Runtime Insights Correlation

Runtime Insights Correlation

Correlate pre-production and runtime data to identify exploitable vulnerabilities in running container images, reduce noise by up to 95%, and prioritize remediation efforts.

Triage and Prioritize Vulnerabilities

Triage-and-Prioritize-Vulnerabilities - Container Security

Triage vulnerabilities by editing severity per project, updating severity levels and statuses (e.g. Verify, Not Exploitable), and maintaining detailed audit trails to ensure effective and traceable remediation.

Base Image Remediation

Base Image Remediation - Container Security

Identifies container image vulnerabilities and recommends safer base images, helping developers choose more secure foundations for their applications and enhance overall security by reducing risk.

Container Focused Visibility and Reporting

Container-centric-Visibility-and-Reporting - Container Security

Results View offers detailed vulnerability distribution and runtime analysis, while Scan Risk Report summarizes results with severity details (downloadable in various formats), to ensure thorough risk management and compliance.

  • Container Image Scanning

    Scan container images to uncover vulnerabilities, outdated versions, insecure dependencies, legal issues, malware, misconfigurations, and compliance risks in base images, software dependencies, and application code layers.

  • Runtime Insights Correlation

    Correlate pre-production and runtime data to identify exploitable vulnerabilities in running container images, reduce noise by up to 95%, and prioritize remediation efforts.

  • Triage and Prioritize Vulnerabilities

    Triage vulnerabilities by editing severity per project, updating severity levels and statuses (e.g. Verify, Not Exploitable), and maintaining detailed audit trails to ensure effective and traceable remediation.

  • Base Image Remediation

    Identifies container image vulnerabilities and recommends safer base images, helping developers choose more secure foundations for their applications and enhance overall security by reducing risk.

  • Container Focused Visibility and Reporting

    Results View offers detailed vulnerability distribution and runtime analysis, while Scan Risk Report summarizes results with severity details (downloadable in various formats), to ensure thorough risk management and compliance.

Container Image Scanning 
Runtime Insights Correlation
Triage-and-Prioritize-Vulnerabilities - Container Security
Base Image Remediation - Container Security
Container-centric-Visibility-and-Reporting - Container Security
Mid Page CTA Background

Secure Your Containers with Checkmarx

Checkmarx’ multi-layered approach analyzes base images, code, and dependencies for vulnerabilities, prioritizes risks, and offers remediation guidance. Integrate with CI/CD pipelines and Sysdig for runtime insights.

What’s in it for you

Effectively Prioritize and Remediate Risk

Reduce alert noise by prioritizing risk with runtime context. Assess vulnerabilities by exploitability and severity, manage severity per project, and get safer base image recommendations.

Frame 1707482190

Remediate Container Images Faster

Enable developers to pinpoint vulnerabilities and take efficient targeted remediation actions by breaking down container images into visible layers.

Container Security I02

From Pre-Production to Runtime

Get a container-centric view into security risk that combines identifying open source vulnerabilities in both static and container images and running containerized applications.

SSCS I03

Build #DevSecTrust

Empower your developers to build secure apps faster with security testing that integrates into existing tools. The Docker Extension enhances this by scanning images, provides feedback, and enables early fixes.

Prioritize

Prioritize Vulnerabilities for Effective Remediation

Prioritize vulnerabilities based on impact and runtime insights while managing severity and status with detailed audit trails to ensure effective remediation and compliance.

Improved Visibility

Improved Visibility for Better Decision Making

Deliver comprehensive visibility into vulnerabilities with detailed severity analysis and flexible reporting options to enhance your ability to prioritize risks and ensure efficient compliance.

What Our Customers Say About Us

See why enterprises trust our approach to AppSec to secure their business-critical applications

“Checkmarx One definitely checks all my boxes from a security standpoint and has a great interface that’s engaging and easy to use. Some of the solutions we considered were more complicated. With Checkmarx One, it’s easy to get right to the problem with little to no learning curve.”

“Incorporating Checkmarx’s technology has revolutionized our development culture. It’s more than just technology; it serves as the foundation of our security strategy, ensuring that our applications are secure by design.”

“The success of our AppSec program can be directly attributed to the tooling, processes and support provided by Checkmarx managed services. Our mission revolves around providing secure and compliant lottery and gaming applications and services to our clients around the globe, and with Checkmarx SAST, SCA and associated components enhanced by their stellar service support, we deliver on this promise with confidence and certainty.”

“After nearly nine years of using Checkmarx’s SAST, CGI’s journey has been one of seamless integration and consistent satisfaction. The last three years have been particularly smooth, reflecting the solution’s reliability and our successful partnership.”

“After reviewing the Checkmarx platform, I’m not sure how Veracode is able to exist while being at a similar price point.”

“Checkmarx’s execution is impressive; it’s brought all the products under one cloud platform.”

“By Far The Best AppSec Tooling Decision We Have Made!!”

“We were thrilled to find Checkmarx, which helped us improve the SLA for identifying and remediating risk, reduce risk and the number of vulnerabilities, and eliminate high- and medium-risk issues.”

“Checkmarx made security team and developers life easier.”

FAQ

What is container security?

Container security focuses on reducing the security risks of containerized applications. These include vulnerabilities in application source code and open source software found in static container images, container infrastructure risks, and runtime risks found in production applications.

How does Checkmarx secure containers effectively?

As with any type of application, identifying software vulnerabilities as early as possible in the software development lifecycle (SDLC) helps to reduce the cost and business risk associated with container security. However, some risks only become apparent after applications are deployed in a runtime environment.

Checkmarx helps you address software vulnerabilities in your source code and open source software, while partnering with Sysdig to correlate pre-production and runtime insights and identify vulnerabilities that are called by your code and exploitable in runtime containerized applications.

Does Checkmarx provide remediation container vulnerabilities?

Yes! Checkmarx provides remediation guidance for vulnerabilities discovered in both your source code and open source software.

Not only do we provide remediation guidance, but we also help you better prioritize vulnerabilities to fix first, by correlating between your source code, the methods in open source libraries called by your code, and open source libraries found in running containerized applications.

How do I enable container runtime insights within Checkmarx?

You can independently purchase container security capabilities from Checkmarx for development environments and Sysdig for production environments.

Correlating pre-production and runtime insights requires both a Checkmarx One and Sysdig Cloud Secure License.

Checkmarx One

The Cloud-Native Enterprise Application Security Platform

Checkmarx One delivers a full suite of enterprise AppSec solutions in a unified, cloud-based platform that allows enterprises to secure their applications from the first line of code to deployment in the cloud.

Get everything your enterprise needs to integrate AppSec across every stage of the SDLC and build a successful AppSec program.

Explore Checkmarx One Packaging & Pricing

Application Security Posture
Management (ASPM) Consolidated, correlated, prioritized insights to help your team manage risk

Code

AI Powered
  • SAST

    Conduct fast and accurate scans to identify risk in your custom code.

  • DAST

    Identify vulnerabilities only seen in production and assess their behavior.

  • API Security

    Eliminate shadow and zombie APls and mitigate API-specific risks.

Supply Chain

AI Powered
  • SCA

    Easily identify, prioritize, remediate, and manage open source security and license risks.

  • Malicious Package Protection

    Detect and remediate malicious or suspicious third-party packages that may be endangering your organization.

  • AI Security

    Built to accelerate AppSec teams and help developers secure applications from the first line of code.

  • Secrets Detection

    Minimize risk by quickly identifying and eliminating exposed secrets.

  • Repository Health

    Reduce security risks by health-scoring the code repositories used in your applications.

Cloud

AI Powered
  • Container Security

    Scan container images, configurations, and identify open source packages and vulnerabilities preproduction and runtime.

  • IaC Security

    Automatically scan your laC files for security vulnerabilities, compliance issues, and infrastructure misconfigurations.

Dev Enablement

  • Codebashing

    Secure code training to upskill your developers and reduce risk from the first line of code.

Services

  • Premium Support

    Maximize ROI with prioritized technical support, metrics monitoring, and operational assistance.

  • Premium Services

    Augment your security team with Checkmarx services to ensure the success of your AppSec program.

  • Maturity Assessment

    Assess the current state of your AppSec program, benchmark against peers, and get actionable next steps for improvement.

Dev Enablement

  • Codebashing

    Codebashing

    Secure code training to upskill your developers and reduce risk from the first line of code.

Unified Dashboard, Reporting & Risk Management

Application Security Posture
Management (ASPM)

Consolidated, correlated, prioritized insights to help your team manage risk

AI Powered

Code

  • SAST

    Static Application Security Testing (SAST)

    Conduct fast and accurate scans to identify risk in your custom code.

  • DAST

    Dynamic Application Security Testing (DAST)

    Identify vulnerabilities only seen in production and assess their behavior.

  • API Security

    API Security

    Eliminate shadow and zombie APls and mitigate API-specific risks.

Supply Chain

  • SCA

    Software Composition Analysis (SCA)

    Easily identify, prioritize, remediate, and manage open source security and license risks.

  • Malicious Package Protection

    Malicious Package Protection

    Detect and remediate malicious or suspicious third-party packages that may be endangering your organization.

  • AI Security

    AI Security

    Built to accelerate AppSec teams and help developers secure applications from the first line of code.

  • Secrets Detection

    Secrets Detection

    Minimize risk by quickly identifying and eliminating exposed secrets.

  • Repository Health

    Repository Health

    Reduce security risks by health-scoring the code repositories used in your applications.

Cloud

  • Container Security

    Container Security

    Scan container images, configurations, and identify open source packages and vulnerabilities preproduction and runtime.

  • IaC Security

    IaC Security

    Automatically scan your laC files for security vulnerabilities, compliance issues, and infrastructure misconfigurations.

Services

  • Premium Support

    Premium Support

    Maximize ROI with prioritized technical support, metrics monitoring, and operational assistance.

  • Premium Services

    Premium Services

    Augment your security team with Checkmarx services to ensure the success of your AppSec program.

  • Maturity Assessment

    Maturity Assessment

    Assess the current state of your AppSec program, benchmark against peers, and get actionable next steps for improvement.

Get a Demo

Get Started with Checkmarx Container Security Today

Join the growing club of enterprises that rely on Checkmarx Container Security.

Trusted By: