Skip to main content
TrustRadius
Veracode

Veracode

Overview

What is Veracode?

Veracode is an application security platform that performs five types of analysis; static analysis, dynamic analysis, software composition analysis, interactive application security testing, and penetration testing. Veracode offers on-demand expertise and aims to help companies fix security defects.

Read more
Recent Reviews

Best in Security

10 out of 10
March 03, 2024
Incentivized
It's being used across whole organization, multiple engineering teams are using it for third-party libraries scan i.e. software …
Continue reading

Veracode to the Rescue!

10 out of 10
February 27, 2024
Veracode DAST is used on app applications in the portfolio. SAST/SCA scans and DAST scans are run monthly for all Critical application in …
Continue reading
Read all reviews

Awards

Products that are considered exceptional by their customers based on a variety of criteria win TrustRadius awards. Learn more about the types of TrustRadius awards to make the best purchase decision. More about TrustRadius Awards

Reviewer Pros & Cons

View all pros & cons

Video Reviews

1 video

Veracode Review: Provides Helpful Support When Troubleshooting Security Needs
02:38
Return to navigation

Pricing

View all pricing
N/A
Unavailable

What is Veracode?

Veracode is an application security platform that performs five types of analysis; static analysis, dynamic analysis, software composition analysis, interactive application security testing, and penetration testing. Veracode offers on-demand expertise and aims to help companies fix security defects.

Entry-level set up fee?

  • No setup fee

Offerings

  • Free Trial
  • Free/Freemium Version
  • Premium Consulting/Integration Services

Would you like us to let the vendor know that you want pricing?

942 people also want pricing

Alternatives Pricing

What is SonarQube?

SonarQube is a code quality and vulnerability solution for development teams that integrates with CI/CD pipelines to ensure the software you produce is secure, reliable, and maintainable.

What is Indusface WAS?

Indusface Web Application Scanner provides an application security audit to detect a range of high-risk Vulnerabilities, Malware, and Critical CVEs.

Return to navigation

Product Details

What is Veracode?

The Veracode platform is a software security solution that aims to be pervasive but not invasive, embedded into the environments that developers work in, with recommended fix and in-context learning. Security teams can use Veracode to manage policy, gain a comprehensive view of an organization's security posture though analytics and reporting, mitigate risks, and produce the evidence necessary to meet regulatory requirements.

It is presented as an always-on, continuous orchestration of secure development that gives organizations the confidence that the software being built is secure and meets compliance requirements.

Veracode Features

  • Supported: Continuous Scanning to reduce risks at every phase of development - Veracode Static Analysis, Dynamic Analysis, Software Composition Analysis, and Manual Penetration Test throughout SDLC.
  • Supported: Developer Experience - Finds and fixes laws in line with security integration into where developers work, automated remediation guidance, and in-context learning.
  • Supported: Comprehensive Platform Experience - Streamlined governance, risk and compliance processes through flexible policy management, unified reporting and analytics, and peer benchmarking to mitigate risks fast and deliver a successful DevSecOpsprogram.
  • Supported: Market Expansion - To meet data residency needs in EU with cloud-native instance built in Frankfurt, Germany on AWS.
  • Supported: Contextual Platform Data - Fine-tuned with nearly 2 decades of scanning and customer learning. Predicts future vulnerabilities with self-healing capabilities through applying machine learning and artificial intelligence to the data.
  • Supported: Cloud-native SaaS Architecture - Provides elastic scalability, high performance, and lower costs with cloud-native SaaS architecture.

Veracode Screenshots

Screenshot of The Veracode Platform HomepageScreenshot of Static Analysis ScansScreenshot of Findings Status and History DashboardScreenshot of The Veracode Platform

Veracode Videos

Veracode Static Analysis Demo
Veracode Software Composition Analysis Demo
Veracode Dynamic Analysis Demo

Watch The Veracode Platform

Veracode Technical Details

Deployment TypesSoftware as a Service (SaaS), Cloud, or Web-Based
Operating SystemsUnspecified
Mobile ApplicationNo
Supported CountriesNorth America, EMEA, APAC, LATAM
Supported LanguagesJava, .NET, PHP, Android, iOS, JavaScript, Python

Frequently Asked Questions

Veracode is an application security platform that performs five types of analysis; static analysis, dynamic analysis, software composition analysis, interactive application security testing, and penetration testing. Veracode offers on-demand expertise and aims to help companies fix security defects.

Checkmarx, Snyk, and SonarQube are common alternatives for Veracode.

Reviewers rate Support Rating highest, with a score of 8.

The most common users of Veracode are from Enterprises (1,001+ employees).

Veracode Customer Size Distribution

Consumers0%
Small Businesses (1-50 employees)18%
Mid-Size Companies (51-500 employees)65%
Enterprises (more than 500 employees)17%
Return to navigation

Comparisons

View all alternatives
Return to navigation

Reviews and Ratings

(197)

Attribute Ratings

Reviews

(1-22 of 22)
Companies can't remove reviews or game the system. Here's why
Score 10 out of 10
Vetted Review
Verified User
Incentivized
We use Veracode in all stages of development, from the time a project is envisioned and first created to the maintenance life stage of an application. Through automation and integration with our development tooling we can continue to perform scans through this entire lifecycle, and continue to monitor the application after it has been released.
Veracode has had a very positive impact to our development process, both through detecting and helping to mitigate flaws if they are written as well as promoting a continuous improvement in the knowledge of our developers to prevent flaws from being created in the first place.
Score 7 out of 10
Vetted Review
Verified User
Incentivized
We are using Veracode Static analysis, during the development and UAT phase. By UAT stage we make sure that all vulnerabilities (excluding the cases where client can not move to the newer version e.g. client still on Java 8) are resolved.
Veracode is the essential tool/product that my organization uses to produce the secure software. We take the security of our product very seriously and we relay on Veracode to find potential vulnerabilities in our code. If found, we do not spare resources to eliminate the vulnerabilities.
March 03, 2024

Best in Security

Score 10 out of 10
Vetted Review
Verified User
Incentivized
We use Veracode at almost all stages of SSDLC , In planning and development stage to assess security considerations and requirements which helps in establishing security architecture and controls.
Coding stage to perform static analysis while code is being written,
Building Stage, during CI and CD pipelines, to identify vulnerabilities.
And finally post-deployment stage, to monitor emerging new threats or vulnerabilities,
It has been immensely helpful by proactively identifying and addressing vulnerabilities throughout the lifecycle.
Teresa Kosinski | TrustRadius Reviewer
Score 10 out of 10
Vetted Review
Verified User
Incentivized
Ideally, Veracode is used throughout the software development lifecycle. It helps to establish a baseline and, if possible, eliminate any found issues prior to any piece of software being released.

For established applications, it is also useful. Even if an app has been flawless, new issues may arise if someone discovers a new way to exploit the current software. It is very important to keep up.
It has been very useful in helping to ensure applications are as secure as possible.
February 27, 2024

Veracode SAST review

Score 8 out of 10
Vetted Review
Verified User
Incentivized
We have integrated Veracode into all our pipelines.
Each time a commit is pushed to a pull-request, an analysis is triggered and returns the quality gate status, as well as a commentary detailing the discoveries (pipeline scans).

When a PR is merged on a stable branch, a new compliance analysis is triggered.
This time, the results are available in the interface (sandbox / policy scans).

We do not impose to developers, the use of scans in the code editor, but the solution is available on VSC for example (greenlight scans).
Our security development process hasn't changed much.
It's the results that have changed, and the distribution of the workload among the tech leads.

Tech leads have more time, because the analysis is shared between team members.
This also help discuss and share knowledge on specific part of the code and best practices.

Regarding the results, they are more relevant and there are fewer false positives than with other solutions we've tested.
February 27, 2024

Veracode to the Rescue!

Score 10 out of 10
Vetted Review
Verified User
From the beginning of coding through post-deployment Veracode works seamlessly
So far, Veracode is being built-in to become a natural part of the process. People are encouraged to begin using Veracode from the first set of code with IDE-based scans to sandbox scans and finally to gated or policy scans.
Score 10 out of 10
Vetted Review
Verified User
Incentivized
We use the product to scan both staging and production environments to ensure issues found in a lower environment aren't promoted to production machines.
No change in the impact to our security program as we obtained the software to consolidate other tools used by our organization.
Score 8 out of 10
Vetted Review
Verified User
Incentivized
I use Veracode in all part for software development lifecycles for ensuring software being built is secure and meets compliance requirements. The part that now a important also for CI/CD is security testing on pull requests, but that require the right balance between time consumption and details in the results.
We established several process for managing the security flaws arise from Veracode security testing. Every type from SAST, DAST and SCA has a different queue to process and implement the solution as fast as possible and with a dedicated team that can also specialized on the field.
Score 10 out of 10
Vetted Review
Verified User
Incentivized
We run Veracode scans against our latest code base, in some cases with every build, in others at least quarterly. It's safe to say we use Veracode across our entire application development process. We're working to automate more of our products to upload builds for scanning on a more consistent and frequent basis.
We are made aware of vulnerabilities in our products as soon as they are detected, and are able to resolve them much quicker than we were previously. Veracode also notifies you if/when the severity of a vulnerability has changed from the initial finding so we can raise priority accordingly.
Score 8 out of 10
Vetted Review
Verified User
Incentivized
As stated earlier in this survey, we have incorporated Vericode to be part of our Teamcity automated build and deploy process. We perform scan on our software during our build cycles and then review the results to accept or reject the latest checkin of code changes. We have our build cycle then email the developers responsible for the vulnerability that was found.
When we performed our initial scans with the toolset it was an eye opening experience for us. Third party libraries had been ignored for years and the results had us scurrying to find alternatives and upgrades for fixes of these findings. This renewed focus on security had us also pursuing other areas that we could add security improvements within our applications like adding MFA abilities.
Christine Canassa | TrustRadius Reviewer
Score 9 out of 10
Vetted Review
Verified User
Incentivized
The security policies that are developed by this team have positive impact on overall production growth. The customer support team ensures that we meet the set standards for the secure operation environment. The vendor team provides reliable assessment in each development stage to rectify where there are hitches and give effective directions for better performance.
Score 8 out of 10
Vetted Review
Verified User
We use Veracode during the Validation and Verification process of the product. We included the static scanning in our build pipelines so that every time a project is built, the scan is run allowing us to see issues right away.
It allowed us to resolve certain gaps that we were not aware of and allow us to address those issues before release to production.
January 10, 2023

Veracode For your Code

Score 10 out of 10
Vetted Review
Verified User
Incentivized
Veracode can be used in any stage of the application. Unit scanning can be done with any particular piece of code. Extension of Veracode can be found in infamous IDE like Visual Studio Code.
For finding the flaws even before deploying the code definitely benefits the organization.
Mike Clarkson | TrustRadius Reviewer
Score 9 out of 10
Vetted Review
Verified User
Currently, we use it in our development branch
It's turned me more security focused in my development. Once our other developers start getting tickets to fix the security flaws, I'm sure they'll start thinking that way too!
Score 9 out of 10
Vetted Review
Verified User
Incentivized
Veracode can be used at any stage of the application. Either from the unit phase or the integrated phase. Extension of Veracode is available in different ides, such as Visual Code Studio. You can also zip the entire code folder and upload to the Veracode to get the combined score of the application.
Score 9 out of 10
Vetted Review
Verified User
Incentivized
I use it for the dev stage so that we can be sure that the security weaknesses are not present in the above stages, like UAT and PROD.
I pay more attention to the security aspect - I understand potential weaknesses earlier than in the past.
Score 8 out of 10
Vetted Review
Verified User
Incentivized
We use Veracode continuously during our implementation process. Therefore we have it integrated into our CI/CD pipeline. Whenever we publish new code, it is a security gate in our Pull Request policy that the Veracode scan runs on success. Therefore it is super easy when the security department needs a current scan; we can just publish a Sandbox scan and are good to go!
Yes indeed. As new packages being used are directly scanned before they are committed to our code base.
Score 9 out of 10
Vetted Review
ResellerIncentivized
Our clients use Veracode in each phase of the SDLC, integrating the IDE Scan to analyze the code from the first steps of the development, executing static and dynamic analysis in the pipeline including the analysis of third-party libraries, the integrations are in different systems like GitHub, bitbucket, Azure DevOps
Using Veracode in the first steps of the development helps to reduce the possible flaws that could be introduced in the early stages, this is complemented by the security labs that enable the developers to create secure code, also the capability of Sandbox allows the developers to evaluate the code against the security standard, all this helps to deliver a secure applications
Return to navigation