What's the Cost?
How does it work?
Need more Info?

Automate the detection of run-time vulnerabilities during functional testing

Checkmarx Interactive Application Security Testing fills the critical software security gap by leveraging existing functional testing activities to automate the detection of vulnerabilities on running applications. It is the industry’s first IAST solution that fully integrates with a Static Application Security Testing solution and offers customization of queries, leading to greater vulnerability coverage and more accurate results.

DATASHEET

Checkmarx Interactive Application Security Testing (CxIAST)

DOWNLOAD NOW

Checkmarx Interactive Application
Security Testing

HOW TO BUY
(888) 864-1641 For pricing or technical questions, please contact us!

Email Our Team
OPTIMIZE YOUR REMEDIATION EFFORTS AT SCALE
The only IAST product in the market that is fully integrated with a best-of-breed SAST solution, enabling cross-product correlations that accelerate time-to-remediation. The code-level insight produced by static analysis, combined with the run-time knowledge coming from IAST, provides developers with a better understanding of where to fix the problem.
AUTOMATE SECURITY TESTING USING YOUR EXISTING PROCESSES
Checkmarx IAST relieves organizations from having to carry out dedicated security testing on running applications. A non-intrusive agent transparently integrates into the testing environment, continuously monitoring application activity to provide real-time feedback. Once functional testing is over, the security “scan” is also completed.
DELIVER SECURITY AS FAST AS APPLICATIONS CHANGE
Checkmarx IAST is built for DevOps, seamlessly fitting QA automation or CI/CD pipelines. The detection of vulnerabilities on running applications is automated to support application portfolios of virtually any size.



COMPLETE YOUR SOFTWARE SECURITY TESTING PORTFOLIO
Checkmarx IAST extends Checkmarx’s offering to fill a critical layer in your software security portfolio. While static analysis and software composition analysis ensure that you have scanned all home-grown code and third-party open source libraries, there are still certain flaws that can only be detected on a running application. Checkmarx IAST seals your SDLC with a security “stamp” without interrupting your existing DevOps and CI/CD workflows.

Application Security Training for Major Programming Languages and Frameworks

Supported Vulnerabilities

  • SQL Injection
  • XXS Injection
  • OS Command Injection
  • PAth Traversal
  • XPath Injection
  • Parameter Tampering
  • Open Redirect
  • Trust Boundary Violation
  • Cross-Site Request Forgery
  • Sensitive Data Leakage
  • And More…
30-Minute Free Consultation

Due to our numerous partnerships, we can provide unbiased opinions on the best solution for your environment.

Unbeatable Prices

Our partnership levels give us the highest product discounts which we pass on as savings to our customers.

Professional Services

Finish your IT projects on-time and under budget with our nation-wide team of senior level engineers.

24×7 Tech Support

Rest assured knowing that our U.S. based IT support team is here for you on nights, weekends and when you need us most.

If you would like more information on Checkmarx, contact us today!