TrustRadius: an HG Insights company

Veracode Reviews & Insights

Score8.7 out of 10

217 Reviews and Ratings

Top industries

Based on 1,273 HG Insights installations.

Community Insights for Veracode

Synthesised from 6 verified reviews.


Synthesised from 6 reviews


Veracode is a comprehensive application security platform primarily utilized by development and security teams to integrate security practices early into the software development lifecycle. Reviewers consistently highlight its robust capabilities in Static Application Security Testing (SAST) and Software Composition Analysis (SCA), with 83% of users leveraging these core functions to scan code, repositories, and CI/CD pipelines. The platform excels at enabling a "shift left" security approach, empowering developers to identify and remediate vulnerabilities proactively, a benefit noted by 50% of reviewers. This proactive stance significantly enhances an organization's overall security posture, with 83% of users reporting improved effectiveness in detecting insecure code and preventing critical vulnerabilities from reaching production. A key strength of Veracode lies in its deep integration capabilities, specifically with Integrated Development Environments (IDEs) and Continuous Integration/Continuous Delivery (CI/CD) pipelines, which 50% of reviewers praised for facilitating early security scanning. Its effective scanning of compiled code and comprehensive reporting dashboards were also frequently cited by half of the reviewers, providing valuable insights for managing security issues. This integration and robust scanning contribute to tangible business benefits, including cost and time savings through security tool consolidation, as reported by 50% of users, and accelerated release cycles. However, Veracode presents areas for improvement that impact user experience and flexibility. Half of the reviewers expressed a desire for more robust and adaptable integration and API options, indicating a need for greater connectivity. Similarly, 50% of users pointed to the user interface and overall web experience as needing modernization and more intuitive navigation. Enhancements to reporting and analytics capabilities were also suggested by half of the reviewers, implying a desire for deeper data presentation and customization. Despite these areas for refinement, Veracode's contribution to developer education and efficiency, noted by 50% of users, underscores its value in fostering a more secure development culture.


  • Comprehensive SAST and SCA capabilities for various code types.
  • Deep integration with IDEs and CI/CD pipelines for early security scanning.
  • Effective scanning of compiled code.
  • Robust reporting and dashboard features for security insights.
  • Significant improvement in application security posture and ROI.
  • Limited integration and API flexibility.
  • Outdated user interface and web experience.
  • Need for enhanced reporting and analytics capabilities.
What positive or negative impact (i.e. Return on Investment or ROI) has Veracode had on your overall business objectives?

From 6 reviews

Veracode has demonstrated a positive impact on the business objectives of its users, primarily by significantly enhancing their security posture. Five of six reviewers noted a marked improvement in application security, citing high effectiveness in detecting insecure code and preventing critical vulnerabilities from reaching production environments. This enhanced security contributes to broader operational efficiencies, with 3 of 6 reviewers reporting direct cost and time savings by consolidating security tools and reducing efforts. Furthermore, the platform aids in streamlining development processes, as observed by 2 of 6 reviewers, who highlighted its role in accelerating release cycles and establishing security controls within deployments. The integration of security earlier in the development lifecycle also contributes to developer education and efficiency, which 3 of 6 reviewers identified as a key benefit.

Improved Security Posture

No critical or high vulnerabilities get to production

Developer Efficiency and Education

Better communication with Development teams

Cost and Time Savings

Really saved our effort.

Besides Veracode, what other software do you regularly use? How likely would you be to recommend it to a friend or colleague?

From 6 reviews

Reviewers frequently utilize a diverse array of security tools in addition to Veracode, with a notable emphasis on solutions for static analysis and security monitoring. A significant majority of reviewers, 4 of 6, cited various static analysis tools, indicating a common practice of integrating multiple solutions for code quality and vulnerability detection. These tools often complement each other, covering different aspects of the software development lifecycle. Beyond code-level analysis, a smaller segment of reviewers, 2 of 6, also highlighted their use of security monitoring platforms. The landscape of tools mentioned suggests that organizations are employing a layered security approach, leveraging specialized software across different domains to enhance their overall security posture. While specific recommendations were not explicitly detailed for each tool, the breadth of products listed implies a search for comprehensive coverage rather than reliance on a single vendor for all security needs.

Static Analysis Tools

Appdome, OneTrust Third-Party Management, HackEDU

Security Monitoring

IntSights Cyber Intelligence, from Rapid7, Netskope CASB

Describe how you use Veracode in your organization. What are the business problems the product addresses and what is the scope of your use case?

From 6 reviews

Organizations primarily leverage Veracode to bolster their application security and integrate security practices earlier into the development lifecycle. A significant majority of reviewers, 5 out of 6, reported utilizing Veracode for its core capabilities in Static Application Security Testing (SAST) and Software Composition Analysis (SCA) to scan various components, including code, repositories, and CI/CD pipelines. This widespread application across the software development process helps in the identification of vulnerabilities and the management of technical debt. Furthermore, half of the reviewers, 3 out of 6, highlighted Veracode's effectiveness in enabling a "shift left" security approach, empowering developers to detect and remediate code issues earlier in their workflows. This proactive strategy aims to prevent new security flaws from reaching production environments, thereby enhancing overall development efficiency and streamlining vulnerability management processes.

SAST and SCA usage

We use Veracode to perform Static Application Security Testing (SAST) and Software Composition Analysis (SCA) scans against our code, repositories, and CI/CD pipelines for code deployments.

Shifting security left

We use Veracode to identify and help remediate high risk technical debt, as well as shift left for our developers so that they are fully equipped to prevent new flaws from making it to production code.

Please provide some detailed examples of areas where Veracode has room for improvement.

From 6 reviews

Reviewers of Veracode consistently identified several areas for potential improvement, with three key themes emerging from the feedback. Concerns regarding integration and API flexibility were noted by 3 of 6 reviewers, who expressed a desire for more robust and adaptable connectivity options. Similarly, the user interface and overall web experience were cited by 3 of 6 reviewers as needing modernization and more intuitive navigation. The third significant area for enhancement, also mentioned by 3 of 6 reviewers, revolved around reporting and analytics capabilities. These observations collectively suggest that while the core functionality may be present, refining the user interaction, external connectivity, and data presentation layers could significantly enhance the overall product experience for users.

Integration and API flexibility

While Veracode integrates with a decent number of tools, we’ve found it a bit rigid compared to some newer players in the space. Some more API or webhook integrations should be there

User Interface and Web Experience

The web interface needs some getting used to

Reporting and Analytics

Authorization model for reports and dashboard

Please provide some detailed examples of things that Veracode does particularly well.

From 6 reviews

Veracode is consistently highlighted by reviewers for its comprehensive capabilities in application security, particularly its integration into development workflows and robust reporting. Three of six reviewers specifically praised its ability to integrate with Integrated Development Environments (IDEs) and Continuous Integration/Continuous Delivery (CI/CD) pipelines, enabling security scanning early in the development lifecycle. This integration is seen as a key factor in reducing code vulnerabilities. Concurrently, 3 of 6 reviewers noted the effectiveness of its scanning capabilities, particularly for compiled code, which provides critical security metrics. Furthermore, the platform's reporting and dashboard features were frequently mentioned by half of the reviewers, providing valuable insights for product owners and security teams. These features collectively contribute to a streamlined approach to identifying, analyzing, and managing security issues throughout the software development process.

IDE and CI/CD Integration

CI/CD integration

Scanning Capabilities

Scanning the code security issues on compiled code makes it very initutive about all metrics that matters

Reporting and Dashboards

Reporting

How important are the reporting and analytic features of a solution for your use case? How are you using Veracode’s reporting and analytics?

From 7 reviews

Reviewers consistently emphasize the critical role of reporting and analytic features within Veracode, with 5 of 7 reviewers highlighting their importance for various stakeholders. The sentiment regarding these features is mixed, indicating both strong foundational capabilities and specific areas for enhancement. Many users find these features essential for evaluating overall security posture and program maturity, particularly when communicating with executives and non-technical management. The ability to measure security maturity across different development teams is a key benefit derived from the existing reporting capabilities. However, while internal reporting within the tool is generally well-regarded, some reviewers suggest that reports intended for external stakeholders, such as developers, could be improved. The need for greater customization in reporting to meet specific organizational requirements, especially for C-suite level metrics, also emerged as an area for development, though one reviewer noted success in achieving this with Veracode support. The data indicates that while Veracode provides valuable insights, opportunities exist to refine the output for diverse audiences and specific analytical needs.

Reporting for stakeholders

Reporting and analytics are must have features for any tool, not just Veracode, especially when security is something we have to deal with.

Veracode promotes secure software development lifecycles by ensuring software being built is secure and meets compliance requirements. At what stages of your application development process do you use Veracode?

From 7 reviews

Reviewers indicate that Veracode is primarily utilized across multiple stages of the software development lifecycle, with a strong emphasis on integrating security checks early and continuously. A significant portion of the feedback, cited by 3 of 7 reviewers, highlights the product's application from the initial coding phase through to deployment, enabling the detection of vulnerabilities at the earliest possible point. This early stage scanning is complemented by integration into developer environments, with 2 of 7 reviewers specifically mentioning the use of IDE integration to scan code as it is being developed. Furthermore, the platform's ability to integrate into CI/CD pipelines is also a key use case, noted by 2 of 7 reviewers, facilitating automated security checks during pull requests and code merges. This comprehensive approach suggests Veracode is valued for its capacity to embed security directly into the development workflow rather than as a post-development audit. The consistent positive sentiment across all mentioned integration points underscores its perceived effectiveness in promoting secure software development practices.

IDE Integration

We use the IDE integration to scan code as it is being developed

CI/CD Pipeline Integration

At Development IDE, at CI/CD pipelines, post deployment as well.

Early Stage Scanning

Veracode we use in the stage when devs are writting the test cases, then going forward, analysing the code coverages, code smells and security hotspots on all the LOC. We get insights very early to detect potential vulnerabilities in the code.

Given your security program needs, do you prefer to consolidate your solutions to one vendor or diversify your solutions through multiple vendors?

From 6 reviews

Reviewers expressed divided opinions regarding the optimal strategy for security program solutions, with an equal number favoring either consolidation with a single vendor or diversification across multiple vendors. Half of the reviewers (3 of 6) indicated a preference for diversifying solutions, often highlighting that no single vendor can realistically cover all security needs, particularly in specialized areas like application security. Conversely, the other half of reviewers (3 of 6) advocated for consolidating solutions with one primary vendor, though some suggested augmenting this approach with supporting or channel vendors for specific functionalities. This suggests that while consolidation offers perceived benefits, the limitations of a single vendor's comprehensive capabilities, noted by 2 of 6 reviewers, often drive the consideration for a multi-vendor strategy. The decision appears to hinge on specific project needs and the recognition that even broad-spectrum vendors may not achieve excellence across their entire product portfolio.

Diversify solutions multiple vendors

I would say to diversify the solutions through multiple vendors, depending on the project needs.

Consolidate solutions one vendor

My preference is to consolidate when possible.

Vendor specialization limitations

It's not realistic to expect a single vendor to cover all the bases, especially when it comes to application security.

Loading Reviews List....

Video reviews