Private Hosting Services
Checkmarx Private Hosting Services
Elevate your software security testing to the cloud.
Software Security, Data Privacy, and Business Resilience
To get the most out of your application security testing tools, you need to make sure they’re fully available and accessible to your development and security teams. You also need to know that your sensitive data and intellectual property are fully protected with the proper software and network security safeguards and standards in place. Organizations around the world trust our certified experts and our Private Hosting Services to meet or exceed all availability and security requirements by managing and maintaining the infrastructure and environments that power their Checkmarx application security programs.
Reduce the burden on your internal technical teams and increase the security and reliability of your AppSec solutions by hosting any of our industry-leading application security testing technologies on secure, dedicated, single-tenant servers in the Amazon Cloud ecosystem.
Simplify Management and Maintenance
We streamline the entire process of maintaining a highly-available, resilient application security testing program for you. When performing regular maintenance to hosted Checkmarx environments, we’ll coordinate planned downtime with our customers at least seven days in advance, targeting off-peak hours, and requiring explicit approval before performing any maintenance.
We perform regular keep-alive monitoring of application servers, Checkmarx services, disk space and web services availability, with automatic failure notification and response per our agreed-upon SLAs.
Increase Incident Management Efficiency
Checkmarx is ISO 27001 certified. As part of our internal ISO policy, Checkmarx communicates details of security events and weaknesses associated with information systems directly to our customers, ensuring that corrective actions are taken as quickly as possible.
Applicable security events include virus attacks, hacking attempts, Denial of Service attacks, unauthorized copying/modification/disclosure of information, tampering, operating system alteration, wire-tapping, and more. Such violations are recorded, monitored, investigated (including collection of evidence), and used to improve future measures and strengthen overall customer security.