SlideShare a Scribd company logo
1 of 2
Download to read offline
PT AI SSDL™
— product brief
PT APPLICATION INSPECTOR SSDL EDITION™
:
BUILDING THE PROCESS OF SECURE DEVELOPMENT
Every field of industry — from financial and manufacturing enterprises to telecoms, IT companies,
media, and government institutions — is increasingly reliant on applications for automation of
daily operations. Official websites, e-commerce and e-banking platforms, workflow and reporting
systems, and many other applications besides are designed to engage with customers, reduce the
effort involved in routine tasks, and jump start efficiency.
However, increased functionality brings additional application complexity, making it harder to fix
critical errors in the software. According to studies by Positive Technologies, as many as 70% of ap-
plications contain high severity vulnerabilities, and 100% are affected by medium severity flaws. Us-
ing the same techniques as hostile hackers, our white-hat experts have demonstrated how these
flaws can be exploited to gain access to corporate networks and confidential user data.
The main culprits behind these high levels of software flaws are insufficiently mature information
security processes, lack of security awareness, and the absence of convenient tools for developers
and IS services. These failings mean security audits happen rarely (if at all), and are typically left until
the applications are ready to launch. But patching flaws at this stage is far more expensive than
resolving them during the design and development phases.
PT Application Inspector SSDL Edition™
(PT AI SSDL™
) is an advanced Application Security Testing
solution that addresses the needs of the whole enterprise to resolve these problems. With transpar-
ent integration into existing development processes and tools, plus business intelligence features
for management reporting and data analytics, PT AI SSDL™
fosters an AppSec-aware culture and
supports high quality code testing at all stages of the application lifecycle.
BUSINESS BENEFITS
­­ Enhance software quality
levels. The secure software
development lifecycle (SSDL)
supports the creation of high
quality and sustainable ap-
plications. PT AI SSDL™
helps
organizations to implement
SSDL in both workflows and
corporate culture.
­­ Reduce development costs.
Automated vulnerability de-
tection and elimination saves
human resources, time, and
most importantly reduces
costs.
­­ Mitigate risk and damage.
Detecting and eliminating
vulnerabilities at every stage
of development dramatically
reduces the amount of errors
and the costs of patching.
This lowers risk and improves
usability which, in turn, en-
courages user loyalty.
­­ Drive operational effi-
ciency. PT AI SSDL™
helps
developers to develop more
secure software without be-
ing security experts, reducing
the need for narrow profile
specialists and encouraging
teamwork with smooth busi-
ness processes.
­­ Manage compliance with
regulatory requirements.
Many standards bodies now
require app developers to
detect and fix vulnerabilities
before they can achieve
certification. PT AI SSDL™
manages compliance with
the requirements of PA DSS,
PCI DSS and many other
leading standards.
HOW IT WORKS
At the heart of PT AI SSDL™
lies an advanced testing approach that combines the advantages of stat-
ic (SAST), dynamic (DAST), and interactive code analysis (IAST), and which has proven its efficiency
in PT AI Desktop Edition™
. The use of multiple testing technologies means application security can
remain a priority throughout all development stages — from the very first line of code to applica-
tion go-live.
The distinguishing feature of PT AI SSDL™
is its flexible integration with corporate IT infrastructure
and development and security tools such as Version Control Systems (VCS), Bug Trackers, Integrat-
ed Development Environments (IDE) and Continuous Integration (CI)/Build systems. Control panels
that are adjustable to a specific process, and graphic interfaces especially designed for separate
user roles support the implementation of SSDL processes from the ground up.
Positive Technologies experts are ready to provide methodological and practical assistance if
needed.
Developer: Java, C#, PHP
IS specialist: web console
Auditor: report
PT AI SSDL™
— product brief
PT-AI-SSDL_PB_A4.ENG.0001.02
INFORMTION SECURITY
BENEFITS
­­ Wide coverage and in-
depth analysis. PT AI SSDL™
has an embedded database
of software vulnerabilities
and third-party libraries.
Configuration verification
capabilities also ensure web
server settings are safe.
­­ Automated vulnerability
assessment. PT AI SSDL™
automatically generates
“exploits”— the most secure
test queries that demon-
strate exactly how hackers
could use each vulnerability
to attack an application.
These requests help in con-
firming vulnerabilities, creat-
ing tasks to fix the code and
following them up.
­­ Continuous protection.
Many large-scale compa-
nies employ PT Application
Inspector™
alongside
PT Application Firewall™
.
Exploits generated by PT AI™
allow the firewall to create
virtual patches and quickly
protect applications while
vulnerabilities are being
fixed.
­­ Simplified code acceptance.
PT AI SSDL™
is suitable for
rapid analysis of third party
or modified code. This dras-
tically reduces application
security testing expenses, as
there is no need for manual
operations.
DEVELOPMENT BENEFITS
The best interface is no interface. Developers interact with PT AI SSDL™
via fine-tuned develop-
ment tools and the source code itself. Seamless integration with version control systems allows
developers to transfer finished code for further analysis and view the results without leaving their
familiar IDE and bug tracking systems. This enables continuous integration and delivery. Devel-
opers don’t have to learn or access additional consoles or become distracted by outside systems.
All detected problems and remediation recommendations can be found as an annotation to the
source code.
PT AI SSDL™
: A SOLUTION FOR THE ENTIRE TEAM
­­ Role-based access control (RBAC). Each group of users (developers, security managers, au-
ditors, and administrators) is granted a suitable level of access to data and interacts with PT AI
SSDL™
via an interface that is relevant to their particular role.
­­ Analytics and business intelligence. Using PT AI SSDL™
, analysts can perform both qualita-
tive and quantitative code security assessments, discover trends, check theories, and perform
benchmarking between several projects. For their part, security managers and auditors are
able to measure the KPIs of the development process and control team efficiency.
­­ Flexible reporting and notifications. Every team member receives notifications and reports
that are tailored to their role. This functionality is powered by the PT AI SSDL™
query builder
that retrieves data based on a query, a schedule, or as a response to a certain event. Reports
are displayed in the control panel or sent by email.
­­ Manufacturer independence. PT AI SSDL™
adapts to the unique requirements of each or-
ganization or project without any need to submit frequent feature or change requests to the
vendor. New releases of PT AI SSDL™
will retain custom changes and ensure backward com-
patibility.
Microsoft Visual Studio IDE and code annotation with a detected vulnerability
info@ptsecurity.com ptsecurity.com
About Positive Technologies
Positive Technologies is a leading global provider of enterprise security solutions for vulnerability and
compliance management, incident and threat analysis, and application protection. Commitment to clients
and research has earned Positive Technologies a reputation as one of the foremost authorities on Industrial
Control System, Banking, Telecom, Web Application, and ERP security, supported by recognition from the
analyst community. Learn more about Positive Technologies at ptsecurity.com.
© 2016 Positive Technologies. Positive Technologies and the Positive Technologies logo are trademarks or registered trademarks of Positive
Technologies. All other trademarks mentioned herein are the property of their respective owners.

More Related Content

What's hot

Validy netinc nsa_ops1_ops2_executive summary
Validy netinc nsa_ops1_ops2_executive summaryValidy netinc nsa_ops1_ops2_executive summary
Validy netinc nsa_ops1_ops2_executive summary
Gilles Sgro
 
Building an AppSec Team Extended Cut
Building an AppSec Team Extended CutBuilding an AppSec Team Extended Cut
Building an AppSec Team Extended Cut
Mike Spaulding
 
六合彩香港-六合彩
六合彩香港-六合彩六合彩香港-六合彩
六合彩香港-六合彩
baoyin
 
24may 1200 valday eric anklesaria 'secure sdlc – core banking'
24may 1200 valday eric anklesaria 'secure sdlc – core banking'24may 1200 valday eric anklesaria 'secure sdlc – core banking'
24may 1200 valday eric anklesaria 'secure sdlc – core banking'
Positive Hack Days
 

What's hot (20)

Secure Software Development Life Cycle
Secure Software Development Life CycleSecure Software Development Life Cycle
Secure Software Development Life Cycle
 
Veritas Resiliency Platform
Veritas Resiliency PlatformVeritas Resiliency Platform
Veritas Resiliency Platform
 
Security Development Lifecycle Tools
Security Development Lifecycle ToolsSecurity Development Lifecycle Tools
Security Development Lifecycle Tools
 
Validy netinc nsa_ops1_ops2_executive summary
Validy netinc nsa_ops1_ops2_executive summaryValidy netinc nsa_ops1_ops2_executive summary
Validy netinc nsa_ops1_ops2_executive summary
 
Secure Code review - Veracode SaaS Platform - Saudi Green Method
Secure Code review - Veracode SaaS Platform - Saudi Green MethodSecure Code review - Veracode SaaS Platform - Saudi Green Method
Secure Code review - Veracode SaaS Platform - Saudi Green Method
 
Building an AppSec Team Extended Cut
Building an AppSec Team Extended CutBuilding an AppSec Team Extended Cut
Building an AppSec Team Extended Cut
 
六合彩香港-六合彩
六合彩香港-六合彩六合彩香港-六合彩
六合彩香港-六合彩
 
OWASP - Building Secure Web Applications
OWASP - Building Secure Web ApplicationsOWASP - Building Secure Web Applications
OWASP - Building Secure Web Applications
 
What’s making way for secure sdlc
What’s making way for secure sdlcWhat’s making way for secure sdlc
What’s making way for secure sdlc
 
24may 1200 valday eric anklesaria 'secure sdlc – core banking'
24may 1200 valday eric anklesaria 'secure sdlc – core banking'24may 1200 valday eric anklesaria 'secure sdlc – core banking'
24may 1200 valday eric anklesaria 'secure sdlc – core banking'
 
CompTIA PenTest+: Everything you need to know about the exam
CompTIA PenTest+: Everything you need to know about the examCompTIA PenTest+: Everything you need to know about the exam
CompTIA PenTest+: Everything you need to know about the exam
 
Application Security Management with ThreadFix
Application Security Management with ThreadFixApplication Security Management with ThreadFix
Application Security Management with ThreadFix
 
Arved sandstrom - the rotwithin - atlseccon2011
Arved sandstrom - the rotwithin - atlseccon2011Arved sandstrom - the rotwithin - atlseccon2011
Arved sandstrom - the rotwithin - atlseccon2011
 
Information Security and the SDLC
Information Security and the SDLCInformation Security and the SDLC
Information Security and the SDLC
 
A successful application security program - Envision build and scale
A successful application security program - Envision build and scaleA successful application security program - Envision build and scale
A successful application security program - Envision build and scale
 
CSSLP & OWASP & WebGoat
CSSLP & OWASP & WebGoatCSSLP & OWASP & WebGoat
CSSLP & OWASP & WebGoat
 
Thinking of choosing Trend Micro?
Thinking of choosing Trend Micro?Thinking of choosing Trend Micro?
Thinking of choosing Trend Micro?
 
The Web AppSec How-To: The Defender's Toolbox
The Web AppSec How-To: The Defender's ToolboxThe Web AppSec How-To: The Defender's Toolbox
The Web AppSec How-To: The Defender's Toolbox
 
Software risk management
Software risk managementSoftware risk management
Software risk management
 
Sumeet Mandloi: Robust Security Testing Framework
Sumeet Mandloi: Robust Security Testing FrameworkSumeet Mandloi: Robust Security Testing Framework
Sumeet Mandloi: Robust Security Testing Framework
 

Viewers also liked

Текстовый контент интернет-магазинов: примеры и рекомендации
Текстовый контент интернет-магазинов: примеры и рекомендацииТекстовый контент интернет-магазинов: примеры и рекомендации
Текстовый контент интернет-магазинов: примеры и рекомендации
UTLab
 
Ilitia Gallo Resume
Ilitia Gallo ResumeIlitia Gallo Resume
Ilitia Gallo Resume
Lee Gallo
 
La tierra nuestro hogar
La tierra nuestro hogarLa tierra nuestro hogar
La tierra nuestro hogar
Gira ......
 
AWS Customer Presentation-MyTaxi
AWS Customer Presentation-MyTaxiAWS Customer Presentation-MyTaxi
AWS Customer Presentation-MyTaxi
Amazon Web Services
 
Trabajo pràctico nº 1(agos y mari)
Trabajo pràctico nº 1(agos y mari)Trabajo pràctico nº 1(agos y mari)
Trabajo pràctico nº 1(agos y mari)
Maga Albornoz
 
Особенности продвижения интернет-магазинов
Особенности продвижения интернет-магазиновОсобенности продвижения интернет-магазинов
Особенности продвижения интернет-магазинов
UTLab
 
Ivanova s biznesna100_motivaciya_na_100_a_gde_j
Ivanova s biznesna100_motivaciya_na_100_a_gde_jIvanova s biznesna100_motivaciya_na_100_a_gde_j
Ivanova s biznesna100_motivaciya_na_100_a_gde_j
Татьяна Матвиенко
 

Viewers also liked (19)

PT Application Inspector SSDL Edition листовка
PT Application Inspector SSDL Edition листовкаPT Application Inspector SSDL Edition листовка
PT Application Inspector SSDL Edition листовка
 
Base wars roblox highest gamers
Base wars roblox highest gamersBase wars roblox highest gamers
Base wars roblox highest gamers
 
Текстовый контент интернет-магазинов: примеры и рекомендации
Текстовый контент интернет-магазинов: примеры и рекомендацииТекстовый контент интернет-магазинов: примеры и рекомендации
Текстовый контент интернет-магазинов: примеры и рекомендации
 
Ilitia Gallo Resume
Ilitia Gallo ResumeIlitia Gallo Resume
Ilitia Gallo Resume
 
La tierra nuestro hogar
La tierra nuestro hogarLa tierra nuestro hogar
La tierra nuestro hogar
 
Dubai Family Tour Package 2012-13
Dubai Family Tour Package 2012-13Dubai Family Tour Package 2012-13
Dubai Family Tour Package 2012-13
 
AWS Customer Presentation-MyTaxi
AWS Customer Presentation-MyTaxiAWS Customer Presentation-MyTaxi
AWS Customer Presentation-MyTaxi
 
raktim hazarika resume
raktim  hazarika resumeraktim  hazarika resume
raktim hazarika resume
 
Virus
VirusVirus
Virus
 
Cuadro comparativo
Cuadro comparativoCuadro comparativo
Cuadro comparativo
 
Actividades de Aprendizaje 8
Actividades de Aprendizaje 8Actividades de Aprendizaje 8
Actividades de Aprendizaje 8
 
Trabajo pràctico nº 1(agos y mari)
Trabajo pràctico nº 1(agos y mari)Trabajo pràctico nº 1(agos y mari)
Trabajo pràctico nº 1(agos y mari)
 
Determine quanto do seu código é testado com Code Coverage
Determine quanto do seu código é testado com Code CoverageDetermine quanto do seu código é testado com Code Coverage
Determine quanto do seu código é testado com Code Coverage
 
Особенности продвижения интернет-магазинов
Особенности продвижения интернет-магазиновОсобенности продвижения интернет-магазинов
Особенности продвижения интернет-магазинов
 
Acompañanos
AcompañanosAcompañanos
Acompañanos
 
REG Child Health Working Group Meeting 26/09/15
REG Child Health Working Group Meeting 26/09/15REG Child Health Working Group Meeting 26/09/15
REG Child Health Working Group Meeting 26/09/15
 
Global Economics Update - December 2015
Global Economics Update - December 2015Global Economics Update - December 2015
Global Economics Update - December 2015
 
Ivanova s biznesna100_motivaciya_na_100_a_gde_j
Ivanova s biznesna100_motivaciya_na_100_a_gde_jIvanova s biznesna100_motivaciya_na_100_a_gde_j
Ivanova s biznesna100_motivaciya_na_100_a_gde_j
 
RDSDataSource: App Thinning
RDSDataSource: App ThinningRDSDataSource: App Thinning
RDSDataSource: App Thinning
 

Similar to PT Application Inspector SSDL Edition product brief

DS_Sentinel_4pg_031513
DS_Sentinel_4pg_031513DS_Sentinel_4pg_031513
DS_Sentinel_4pg_031513
Tiffeny Price
 
IndySoft Leaflet
IndySoft LeafletIndySoft Leaflet
IndySoft Leaflet
Jake Bishop
 
Ajith H N-Profile
Ajith H N-ProfileAjith H N-Profile
Ajith H N-Profile
Ajith H N
 
Fortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptxFortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptx
VictoriaChavesta
 

Similar to PT Application Inspector SSDL Edition product brief (20)

Rhea corporate presentation v2
Rhea corporate presentation v2Rhea corporate presentation v2
Rhea corporate presentation v2
 
DS_Sentinel_4pg_031513
DS_Sentinel_4pg_031513DS_Sentinel_4pg_031513
DS_Sentinel_4pg_031513
 
Enhancing Testing Workflows The Role of Regression Automation.pdf
Enhancing Testing Workflows The Role of Regression Automation.pdfEnhancing Testing Workflows The Role of Regression Automation.pdf
Enhancing Testing Workflows The Role of Regression Automation.pdf
 
Security is our duty and we shall deliver it - White Paper
Security is our duty and we shall deliver it - White PaperSecurity is our duty and we shall deliver it - White Paper
Security is our duty and we shall deliver it - White Paper
 
Core.co.enterprise.deck.06.16.10
Core.co.enterprise.deck.06.16.10Core.co.enterprise.deck.06.16.10
Core.co.enterprise.deck.06.16.10
 
Introduction to CAST HIGHLIGHT - Rapid Application Portfolio Analysis
Introduction to CAST HIGHLIGHT - Rapid Application Portfolio AnalysisIntroduction to CAST HIGHLIGHT - Rapid Application Portfolio Analysis
Introduction to CAST HIGHLIGHT - Rapid Application Portfolio Analysis
 
CAST for Vendor Monitoring and Control
CAST for Vendor Monitoring and ControlCAST for Vendor Monitoring and Control
CAST for Vendor Monitoring and Control
 
Selecting an App Security Testing Partner: An eGuide
Selecting an App Security Testing Partner: An eGuideSelecting an App Security Testing Partner: An eGuide
Selecting an App Security Testing Partner: An eGuide
 
Procuring an Application Security Testing Partner
Procuring an Application Security Testing PartnerProcuring an Application Security Testing Partner
Procuring an Application Security Testing Partner
 
Expert Compliance Solutions by Ispectra Technologies.pptx
Expert Compliance Solutions by Ispectra Technologies.pptxExpert Compliance Solutions by Ispectra Technologies.pptx
Expert Compliance Solutions by Ispectra Technologies.pptx
 
Accelerite Sentient Executive Briefing
Accelerite Sentient Executive BriefingAccelerite Sentient Executive Briefing
Accelerite Sentient Executive Briefing
 
IndySoft Leaflet
IndySoft LeafletIndySoft Leaflet
IndySoft Leaflet
 
The Significance of Regression Testing in Software Development.pdf
The Significance of Regression Testing in Software Development.pdfThe Significance of Regression Testing in Software Development.pdf
The Significance of Regression Testing in Software Development.pdf
 
Ajith H N-Profile
Ajith H N-ProfileAjith H N-Profile
Ajith H N-Profile
 
Fortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptxFortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptx
 
Fortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptxFortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptx
 
Managing Compliance
Managing ComplianceManaging Compliance
Managing Compliance
 
HMI/SCADA 리스크 감소
HMI/SCADA 리스크 감소HMI/SCADA 리스크 감소
HMI/SCADA 리스크 감소
 
10 things to get right for successful dev secops
10 things to get right for successful dev secops10 things to get right for successful dev secops
10 things to get right for successful dev secops
 
Level Up Web App Security: Start Your Free Trial of HCL AppScan Source
Level Up Web App Security: Start Your Free Trial of HCL AppScan SourceLevel Up Web App Security: Start Your Free Trial of HCL AppScan Source
Level Up Web App Security: Start Your Free Trial of HCL AppScan Source
 

More from Valery Boronin

Построение процесса безопасной разработки - Стачка 2016
Построение процесса безопасной разработки - Стачка 2016Построение процесса безопасной разработки - Стачка 2016
Построение процесса безопасной разработки - Стачка 2016
Valery Boronin
 

More from Valery Boronin (9)

Тренды кибербезопасности, угрозы и вызовы в 2018 году
Тренды кибербезопасности, угрозы и вызовы в 2018 годуТренды кибербезопасности, угрозы и вызовы в 2018 году
Тренды кибербезопасности, угрозы и вызовы в 2018 году
 
SecDevOps. Разработка, DevOps и безопасность.
SecDevOps. Разработка, DevOps и безопасность.SecDevOps. Разработка, DevOps и безопасность.
SecDevOps. Разработка, DevOps и безопасность.
 
Практика оформления проекта и презентаций
Практика оформления проекта и презентацийПрактика оформления проекта и презентаций
Практика оформления проекта и презентаций
 
SDL/SSDL для руководителей
SDL/SSDL для руководителейSDL/SSDL для руководителей
SDL/SSDL для руководителей
 
Application Inspector SSDL Edition product
Application Inspector SSDL Edition productApplication Inspector SSDL Edition product
Application Inspector SSDL Edition product
 
Построение процесса безопасной разработки - Стачка 2016
Построение процесса безопасной разработки - Стачка 2016Построение процесса безопасной разработки - Стачка 2016
Построение процесса безопасной разработки - Стачка 2016
 
Valery Boronin on DLP Russia 2010
Valery Boronin on DLP Russia 2010Valery Boronin on DLP Russia 2010
Valery Boronin on DLP Russia 2010
 
Humans Are The Weakest Link – How DLP Can Help
Humans Are The Weakest Link – How DLP Can HelpHumans Are The Weakest Link – How DLP Can Help
Humans Are The Weakest Link – How DLP Can Help
 
Data Luxury Protection - защита данных с удовольствием!
Data Luxury Protection - защита данных с удовольствием!Data Luxury Protection - защита данных с удовольствием!
Data Luxury Protection - защита данных с удовольствием!
 

Recently uploaded

AI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
AI Mastery 201: Elevating Your Workflow with Advanced LLM TechniquesAI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
AI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
VictorSzoltysek
 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service provider
mohitmore19
 
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
masabamasaba
 
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICECHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 

Recently uploaded (20)

Chinsurah Escorts ☎️8617697112 Starting From 5K to 15K High Profile Escorts ...
Chinsurah Escorts ☎️8617697112  Starting From 5K to 15K High Profile Escorts ...Chinsurah Escorts ☎️8617697112  Starting From 5K to 15K High Profile Escorts ...
Chinsurah Escorts ☎️8617697112 Starting From 5K to 15K High Profile Escorts ...
 
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
 
AI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
AI Mastery 201: Elevating Your Workflow with Advanced LLM TechniquesAI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
AI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
 
AI & Machine Learning Presentation Template
AI & Machine Learning Presentation TemplateAI & Machine Learning Presentation Template
AI & Machine Learning Presentation Template
 
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service provider
 
%in Harare+277-882-255-28 abortion pills for sale in Harare
%in Harare+277-882-255-28 abortion pills for sale in Harare%in Harare+277-882-255-28 abortion pills for sale in Harare
%in Harare+277-882-255-28 abortion pills for sale in Harare
 
Exploring the Best Video Editing App.pdf
Exploring the Best Video Editing App.pdfExploring the Best Video Editing App.pdf
Exploring the Best Video Editing App.pdf
 
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
 
Generic or specific? Making sensible software design decisions
Generic or specific? Making sensible software design decisionsGeneric or specific? Making sensible software design decisions
Generic or specific? Making sensible software design decisions
 
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
 
10 Trends Likely to Shape Enterprise Technology in 2024
10 Trends Likely to Shape Enterprise Technology in 202410 Trends Likely to Shape Enterprise Technology in 2024
10 Trends Likely to Shape Enterprise Technology in 2024
 
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
 
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
 
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICECHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
 
Announcing Codolex 2.0 from GDK Software
Announcing Codolex 2.0 from GDK SoftwareAnnouncing Codolex 2.0 from GDK Software
Announcing Codolex 2.0 from GDK Software
 
%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview
%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview
%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview
 
%in ivory park+277-882-255-28 abortion pills for sale in ivory park
%in ivory park+277-882-255-28 abortion pills for sale in ivory park %in ivory park+277-882-255-28 abortion pills for sale in ivory park
%in ivory park+277-882-255-28 abortion pills for sale in ivory park
 
%in kempton park+277-882-255-28 abortion pills for sale in kempton park
%in kempton park+277-882-255-28 abortion pills for sale in kempton park %in kempton park+277-882-255-28 abortion pills for sale in kempton park
%in kempton park+277-882-255-28 abortion pills for sale in kempton park
 
Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Models
 

PT Application Inspector SSDL Edition product brief

  • 1. PT AI SSDL™ — product brief PT APPLICATION INSPECTOR SSDL EDITION™ : BUILDING THE PROCESS OF SECURE DEVELOPMENT Every field of industry — from financial and manufacturing enterprises to telecoms, IT companies, media, and government institutions — is increasingly reliant on applications for automation of daily operations. Official websites, e-commerce and e-banking platforms, workflow and reporting systems, and many other applications besides are designed to engage with customers, reduce the effort involved in routine tasks, and jump start efficiency. However, increased functionality brings additional application complexity, making it harder to fix critical errors in the software. According to studies by Positive Technologies, as many as 70% of ap- plications contain high severity vulnerabilities, and 100% are affected by medium severity flaws. Us- ing the same techniques as hostile hackers, our white-hat experts have demonstrated how these flaws can be exploited to gain access to corporate networks and confidential user data. The main culprits behind these high levels of software flaws are insufficiently mature information security processes, lack of security awareness, and the absence of convenient tools for developers and IS services. These failings mean security audits happen rarely (if at all), and are typically left until the applications are ready to launch. But patching flaws at this stage is far more expensive than resolving them during the design and development phases. PT Application Inspector SSDL Edition™ (PT AI SSDL™ ) is an advanced Application Security Testing solution that addresses the needs of the whole enterprise to resolve these problems. With transpar- ent integration into existing development processes and tools, plus business intelligence features for management reporting and data analytics, PT AI SSDL™ fosters an AppSec-aware culture and supports high quality code testing at all stages of the application lifecycle. BUSINESS BENEFITS ­­ Enhance software quality levels. The secure software development lifecycle (SSDL) supports the creation of high quality and sustainable ap- plications. PT AI SSDL™ helps organizations to implement SSDL in both workflows and corporate culture. ­­ Reduce development costs. Automated vulnerability de- tection and elimination saves human resources, time, and most importantly reduces costs. ­­ Mitigate risk and damage. Detecting and eliminating vulnerabilities at every stage of development dramatically reduces the amount of errors and the costs of patching. This lowers risk and improves usability which, in turn, en- courages user loyalty. ­­ Drive operational effi- ciency. PT AI SSDL™ helps developers to develop more secure software without be- ing security experts, reducing the need for narrow profile specialists and encouraging teamwork with smooth busi- ness processes. ­­ Manage compliance with regulatory requirements. Many standards bodies now require app developers to detect and fix vulnerabilities before they can achieve certification. PT AI SSDL™ manages compliance with the requirements of PA DSS, PCI DSS and many other leading standards. HOW IT WORKS At the heart of PT AI SSDL™ lies an advanced testing approach that combines the advantages of stat- ic (SAST), dynamic (DAST), and interactive code analysis (IAST), and which has proven its efficiency in PT AI Desktop Edition™ . The use of multiple testing technologies means application security can remain a priority throughout all development stages — from the very first line of code to applica- tion go-live. The distinguishing feature of PT AI SSDL™ is its flexible integration with corporate IT infrastructure and development and security tools such as Version Control Systems (VCS), Bug Trackers, Integrat- ed Development Environments (IDE) and Continuous Integration (CI)/Build systems. Control panels that are adjustable to a specific process, and graphic interfaces especially designed for separate user roles support the implementation of SSDL processes from the ground up. Positive Technologies experts are ready to provide methodological and practical assistance if needed. Developer: Java, C#, PHP IS specialist: web console Auditor: report
  • 2. PT AI SSDL™ — product brief PT-AI-SSDL_PB_A4.ENG.0001.02 INFORMTION SECURITY BENEFITS ­­ Wide coverage and in- depth analysis. PT AI SSDL™ has an embedded database of software vulnerabilities and third-party libraries. Configuration verification capabilities also ensure web server settings are safe. ­­ Automated vulnerability assessment. PT AI SSDL™ automatically generates “exploits”— the most secure test queries that demon- strate exactly how hackers could use each vulnerability to attack an application. These requests help in con- firming vulnerabilities, creat- ing tasks to fix the code and following them up. ­­ Continuous protection. Many large-scale compa- nies employ PT Application Inspector™ alongside PT Application Firewall™ . Exploits generated by PT AI™ allow the firewall to create virtual patches and quickly protect applications while vulnerabilities are being fixed. ­­ Simplified code acceptance. PT AI SSDL™ is suitable for rapid analysis of third party or modified code. This dras- tically reduces application security testing expenses, as there is no need for manual operations. DEVELOPMENT BENEFITS The best interface is no interface. Developers interact with PT AI SSDL™ via fine-tuned develop- ment tools and the source code itself. Seamless integration with version control systems allows developers to transfer finished code for further analysis and view the results without leaving their familiar IDE and bug tracking systems. This enables continuous integration and delivery. Devel- opers don’t have to learn or access additional consoles or become distracted by outside systems. All detected problems and remediation recommendations can be found as an annotation to the source code. PT AI SSDL™ : A SOLUTION FOR THE ENTIRE TEAM ­­ Role-based access control (RBAC). Each group of users (developers, security managers, au- ditors, and administrators) is granted a suitable level of access to data and interacts with PT AI SSDL™ via an interface that is relevant to their particular role. ­­ Analytics and business intelligence. Using PT AI SSDL™ , analysts can perform both qualita- tive and quantitative code security assessments, discover trends, check theories, and perform benchmarking between several projects. For their part, security managers and auditors are able to measure the KPIs of the development process and control team efficiency. ­­ Flexible reporting and notifications. Every team member receives notifications and reports that are tailored to their role. This functionality is powered by the PT AI SSDL™ query builder that retrieves data based on a query, a schedule, or as a response to a certain event. Reports are displayed in the control panel or sent by email. ­­ Manufacturer independence. PT AI SSDL™ adapts to the unique requirements of each or- ganization or project without any need to submit frequent feature or change requests to the vendor. New releases of PT AI SSDL™ will retain custom changes and ensure backward com- patibility. Microsoft Visual Studio IDE and code annotation with a detected vulnerability info@ptsecurity.com ptsecurity.com About Positive Technologies Positive Technologies is a leading global provider of enterprise security solutions for vulnerability and compliance management, incident and threat analysis, and application protection. Commitment to clients and research has earned Positive Technologies a reputation as one of the foremost authorities on Industrial Control System, Banking, Telecom, Web Application, and ERP security, supported by recognition from the analyst community. Learn more about Positive Technologies at ptsecurity.com. © 2016 Positive Technologies. Positive Technologies and the Positive Technologies logo are trademarks or registered trademarks of Positive Technologies. All other trademarks mentioned herein are the property of their respective owners.