Likelihood to Recommend If you're a sysadmin, or anyone who's had to deploy network services, you've almost certainly had to use Nmap at some point or other. Need to see what devices are on your LAN? Nmap can tell you that. Want to check which ports your web server has open to the internet? Nmap is your friend.
Nmap is a powerful command-line tool and has many options that require some reading of documentation to get the best out of (although generally straightforward). If the thought of working at the command-line scares you (presumably not if you're reading this review), then you may want a much simpler tool, or at least check out Zenmap GUI.
Read full review Within our organization it is clear that when a codebase is available, and in a language that Veracode supports, the use of Veracode (with a particular focus to the static scanning platform) is a great suggestion. The depth of information it can provide with respect to security flaws is valuable, with very little setup required from the developers. When a codebase is unavailable, say in the instance of third-party applications for which you are creating extensions or some form of module, then static code scanning is not an option but even then dynamic scanning (DAST) may prove to be helpful, though potentially less so.
Read full review Pros NMap provides a very fast and a very thorough network "sweep" that allows you to quickly map out exactly what's on your network. NMap is highly configurable. The "canned" choices are very good in most instances, but using various switches and options, you can create a very specific scan and get exactly the results you're looking for. NMap is easy to use. Even a new administrator will be able to use the graphical version (Zenmap) with efficiency right away. Read full review The pipeline scan is a very fast way to scan code and inform developers if a new flaw is introduced by their pull requests. Upload & Scan provides an in-depth analysis of the codebase, which features like reporting being made easy. SCA Scans help us not only identify the vulnerabilities but also in helping fix them and in identifying if our application is using that part of the vulnerable library or not. Veracode is very easy to integrate into the CI/CD pipelines (especially Jenkins) Read full review Cons exporting, There's a serious lack of ability to export the information in a readable format to present to VPs and such. I always find myself doing a lot of data massaging to get it in a pretty format some scans can trigger sensitive IDS/IPS SYN scans can be particularly aggressive and cause problems on remote systems. Read full review MPT Results should be segmented from DAST/SAST results. MPT Reports should include more information on scoping and testing dates as generally provided by accounting firms conducting similar tests. Vulnerability readouts should not be so hidden in the platform (It shouldn't take as many clicks to get to and view). Read full review Likelihood to Renew At this time, and we just renewed a month ago, I dont see any products out there overall that can offer what Veracode does. Yes, its not cheap by any means, but for the money its the best application security scanning tool out there.
Read full review Usability - Almost no setup required and easy to configure - Very easy to use, intuitive UI with integrated analytics and learning portals. - Seamless to review the results, triage them, generate reports. - Security progression of the product/application is tracked via successive scans. - Privileges/Roles nicely fine grained and tightly controlled to let teams "view" only their products.
Read full review Reliability and Availability Veracode has always been up and available to us.
Read full review Performance At this point, it runs well and mostly in a timely fashion. Dynamic scans take days but this may be a config issue still to be resolved.
Read full review Support Rating There is a very large support community and a robust selection of add-ons and scripts. Once you get the use down this is one of the most powerful tools and you can find anything you are looking for as far as examples on the web. While not having official support its not lacking by any means.
Read full review Overall, Veracode support is helpful, community support is great, and documentation is available for self-service. Our Customer Success Manager is very helpful and reaches out regularly to see if we need assistance. We have not utilized many of the other resources offered by Veracode, however, in the future we would like to leverage secure coding training for our Development teams.
Read full review Implementation Rating We use it as a SAS service, so really just getting our teams to mold the use of Veracode into their SDLC has been a process of years in the making. It comes down to what your teams are ready and willing to accept and change. Management is key in getting their groups on board with using it regularly. If it doesnt have management backing, your security teams have little to no influence in getting this process off the ground fully.
Read full review Alternatives Considered Alternatives to Nmap (other IP scanners) are often much more limited in what they can do; They often only allow you to scan a specific subset of ports or a limited number of IP addresses in one command. Nmap is unrestricted in that regard. What makes Nmap stand out above the rest, is the complete network analysis package you get with it. It allows IP scanner, network deep-dives, hardware analysis, vulnerability analysis, encryption detailing, and so much more, in one free application
Read full review Mend.IO formerly WhiteSource software is a product we used prior to Vericode. It did not have all of the capabilities or depth of Vericode. Additionally, Whitesource did not offer automatic scanning as part of their product and there was no Certification program to speak of.
Read full review Scalability It meets our needs.
Read full review Return on Investment Nmap with Wireshark is free, so it's been a great combo team to gather info and test. It's allowed us to avoid fines from false positives and to fix actual issues ourselves. Great for finding hosts, helps keep the network secure. Read full review Developers are now realizing that security is there to help them, not just the people saying NO. When setting up Veracode integrations we found that Devs really like their IDEs and Repos. It's like a personal choice. However, as a company, it was unwieldy without devoting people to Veracode integrations to have so many so we had to slime the available IDEs to 3 and Repos to 3, just to be able to set up and maintain the integrations. Veracode is paying for itself (though through a different cost category). Our Development costs are going down and releases are getting quicker and more agile. Read full review ScreenShots