The Sonatype Story for Application Security: Go Fast & Be Secure


Published on

A true story of how Development and Security came together to fix the risk in open source.

Published in: Technology
  • Be the first to comment

  • Be the first to like this

No Downloads
Total views
On SlideShare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide

The Sonatype Story for Application Security: Go Fast & Be Secure

  1. 1. Once upon a time... There was a great battle between SPEED and SECURITY.
  2. 2. Development wanted to GO FAST. But, Security wanted to slow down and BE SAFE.
  3. 3. For years... they endured the pain of late testing, false positives... and the added costs of getting the bad stuff out. There HAD to be a better way!
  4. 4. And then... there came... THE REVOLUTION! The COMPONENT revolution. Code became like Legos® applications easily assembled from thousands of freely available parts, Developers ran even FASTER, and Security found it even harder to SECURE.
  5. 5. Together, they pondered... "How can we keep SAFE at this even FASTER speed of development?" "How can we SECURE this new Lego® 'software supply chain'?"
  6. 6. After much self - reflection... the ANSWER revealed itself: Bring SECURITY and SPEED together by building component intelligence and governance in from the START... using all the tools developers love to use today!
  7. 7. And so it was. The birth of a new way to secure the software supply chain... where developers went FAST and applications were SAFE. And this REVOLUTIONARY, yet SIMPLE approach came to be called...
  8. 8. A new way to... AUTOMATE and enforce GOVERNANCE in the tools you use today. Policy, security and licensing information guides developers to select the best components in their development environment.
  9. 9. A new way to... REMEDIATE RISK early in the process to reduce risk and cost. Optimal components can be selected and application flaws can be remediated with a single click.
  10. 10. A new way to... CENTRALIZE POLICIES that ensure license and security risks are managed throughout the software lifecycle. Security, licensing and architecture policies are easily defined and enforced throughout the software lifecycle.
  11. 11. A new way to... PRECISELY IDENTIFY and track all components used in your organization, from consumption to production. Accurate and comprehensive component inventory provides visibility across the software lifecycle.
  12. 12. A new way to... TRULY ACHIEVE defense-in-depth with enforcement points throughout the software lifecycle. The CLM model for component governance automates policy management and approvals throughout the software lifecycle with enforcement points in the repository, IDE and CI Server.
  13. 13. A new way to... PROTECT your production applications with proactive alerts for newly discovered vulnerabilities. Newly discovered threats are continuously reported ensuring trust from design through production.
  14. 14. A new way to... ASSESS ENTERPRISE RISK and support your compliance and regulatory initiatives. Dashboards and reports provide a complete view of global risk supporting regulatory and compliance initiatives.
  15. 15. And so it came be to... the people of the kingdom ushered in a NEW ERA of application security and lived in HARMONY ever more.
  16. 16. The end. Revolutionize your approach to software security! Start with a FREE snapshot of your current application vulnerabilities: Or learn more at:
  17. 17. 12501 Prosperity Drive, Suite 350 · Silver Spring, MD 20904 · 1.877.866.2836 ·