SlideShare a Scribd company logo
Securely Enabling Business




Application Security
Challenges
       Today’s businesses rely on applications for their business to grow,
       and due to fast development, sensitive information is at risk.
       As applications become more web-based and critical, exposure
       increases and security becomes more important.


FishNet Security’s Solution
       FishNet Security provides a customized approach and understanding for each organization. Our consultants recognize
       business drivers, goals and tailor solutions to meet the specific initiatives of each organization.

       FishNet Security helps clients take a proactive approach to developing secure applications in the most efficient and
       effective manner.

Offerings
       Application Security Assessment:                                       Secure Code Training:




                                                                                                                                                                            Application Security
         ▪ Analysis of an application’s security posture in a runtime           ▪ Application security training for personnel involved in
                  environment                                                         application development, administration, and information
            ▪ Identify security vulnerabilities, weaknesses, and                      security
                  other bad practices within the application logic and           ▪ Taught by senior consultants that understand and explain
                  supporting infrastructure                                           the theory and technical details of application attacks,
                                                                                      remediation and mitigating controls, secure development
       Secure Code Review:                                                            processes, testing procedures, security tools, and
         ▪ Analysis of an application’s functionality and logic for                   relevant technologies.
                  security issues                                                                                                                                                1
                                                                              Application Threat Modeling:
            ▪ Identify security vulnerabilities and other improper
                  coding issues within the application that could allow         ▪ Guided development of an application’s security posture




                                                                                                                                                                            www.fishnetsecurity.com
                  security-related attacks                                            based on qualification of risks, threats, vulnerabilities,
                                                                                      and weaknesses to the application and the business it
            ▪ Optionally validate potential vulnerabilities in a runtime              supports
                  environment
                                                                                 ▪ Workshop facilitated by senior consultants that understand
       Database Security Review:                                                      and explain the theory and technical details of application
                                                                                      attacks, remediation and mitigating controls, secure
         ▪ Review of the configuration and security posture of a                      development processes, testing procedures, security
                  database instance/server
                                                                                      tools, and relevant technologies
            ▪ Identify technical vulnerabilities and weaknesses
                  within the database instance and server as well             Secure SDLC Review:
                  as operational security issues related to database            ▪ Guided development of an organization’s secure application
                  administration and use                                              development environment
                                                                                 ▪ Implement development practices that enable the
                                                                                      development of secure applications that includes both
                                                                                      proactive controls and reactive validation of those controls

Why FishNet Security?
       FishNet Security is equipped with a dedicated team who understand business and technical needs, as well as a long history of
       building information security programs and architectures for organizations of all sizes and within various industries.

       FishNet can assist organizations in building a new holistic application security program, as well as review various aspects
       of an existing application security program. Our organization has a board base of experience in assessing applications
       for security flaws, including web-based, client/server, rich media, portal/applet based, and thick/thin applications.
       Organizations, with the help of FishNet Security, can also identify true vulnerabilities and the client can focus on proper
       remediation of vulnerabilities instead of specific attacks.

       Our consultants provide a wide array of knowledge and skills in both real-world development and application security,
       which allows secure development of applications and verification that the application remains secure.
                                                                                                                                                                  ID# 09SS0048


Corporate Headquarters 1710 Walnut St. Kansas City, MO 64108 • 888.732.9406                                                       © 2009 FishNet Security. All rights reserved.
Securely Enabling Business




Application Security
Success Stories
       FishNet Security performed in-depth security reviews.
       FishNet Security was contracted by a large retail organization to perform in-
       depth security reviews of three critical applications: a web-based e-commerce
       application, a SOA application with additional web front-end for account
       management, and a fat client (C++) application used by internal personnel
       for system administration. For each application, FishNet Security reviewed
       application and network architectural diagrams, reviewed source code for each
       application, and performed network and application security assessments. In
       conjunction with application threat modeling, FishNet Security provided prioritized,
       actionable recommendations to improve the security posture of each application
       as well as the organization.




                                                                                                                                                         Application Security
       Application security reviews improve organizations development process.
       FishNet Security performed multiple application security reviews for a financial services company in order to
       improve the organization’s application development process. FishNet Security first reviewed application and
       network architectural diagrams and performed an application security assessment of the organization’s primary
       web application. The results of this phase of the assessment were used to deliver custom secure code training to
       the organization’s developers, development managers, and information security personnel. FishNet Security then
                                                                                                                                                              2
       developed a road map to improve the organization’s secure software development process to ensure applications
       were developed securely with the proper security controls in place before going into production.




                                                                                                                                                         www.fishnetsecurity.com
       FishNet Security provides annual application security assessments
       for large healthcare provider.
       FishNet Security has performed annual application security assessments of many
       (40+) web applications for a large healthcare company developed by the organization
       and its subsidiaries for more than three consecutive years. These applications vary
       in functionality, technology, and complexity as well as the targeted user industry. By
       analyzing annual and per-application data, FishNet Security can provide critical application
       security metrics to management in order to help the organization focus on key areas of
       weakness within development groups, subsidiaries, and across the organization.


Contact Information
       FishNet Security, is a leading provider of security services, training and technologies with a respected national presence
       and focused local support.

                                         For more information visit www.fishnetsecurity.com or call 888.732.9406




About FishNet Security
We Focus on the Threat so You can Focus on the Opportunity.
Committed to security excellence, FishNet Security is the #1 provider of information security solutions that combine technology,
services, support, and training. FishNet Security solutions have enabled 3,000 clients to better manage risk, meet compliance
requirements, and reduce cost while maximizing security effectiveness and operational efficiency.
For more information on FishNet Security, Inc., visit www.fishnetsecurity.com.                                              ID# 09SS0048


Corporate Headquarters 1710 Walnut St. Kansas City, MO 64108 • 888.732.9406                                    © 2009 FishNet Security. All rights reserved.

More Related Content

What's hot

Topic11
Topic11Topic11
Topic11
Anne Starr
 
The Cyber Security Landscape: An OurCrowd Briefing for Investors
The Cyber Security Landscape: An OurCrowd Briefing for InvestorsThe Cyber Security Landscape: An OurCrowd Briefing for Investors
The Cyber Security Landscape: An OurCrowd Briefing for Investors
OurCrowd
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
A. Shamel
 
Offensive cyber security engineer updated
Offensive cyber security engineer updatedOffensive cyber security engineer updated
Offensive cyber security engineer updated
InfosecTrain
 
From Business Architecture to Security Architecture
From Business Architecture to Security ArchitectureFrom Business Architecture to Security Architecture
From Business Architecture to Security Architecture
Priyanka Aash
 
Cyber Ethics: Cyber Security Services | VAPT and WAPT
 Cyber Ethics: Cyber Security Services | VAPT and WAPT Cyber Ethics: Cyber Security Services | VAPT and WAPT
Cyber Ethics: Cyber Security Services | VAPT and WAPT
SaeelRelekar
 
To Build Or Not To Build: Can SOC-aaS Bridge Your Security Skills Gap?
To Build Or Not To Build: Can SOC-aaS Bridge Your Security Skills Gap?To Build Or Not To Build: Can SOC-aaS Bridge Your Security Skills Gap?
To Build Or Not To Build: Can SOC-aaS Bridge Your Security Skills Gap?
NetEnrich, Inc.
 
Cyber Security Needs and Challenges
Cyber Security Needs and ChallengesCyber Security Needs and Challenges
Cyber Security Needs and Challenges
Happiest Minds Technologies
 
Cybersecurity Hands-On Training
Cybersecurity Hands-On TrainingCybersecurity Hands-On Training
Cybersecurity Hands-On Training
Tonex
 
Active Directory: Modern Threats, Medieval Protection
Active Directory: Modern Threats, Medieval ProtectionActive Directory: Modern Threats, Medieval Protection
Active Directory: Modern Threats, Medieval Protection
Skyport Systems
 
Threat Modelling And Threat Response
Threat Modelling And Threat ResponseThreat Modelling And Threat Response
Threat Modelling And Threat Response
Vivek Jindaniya
 
What is Cyber Security - Avantika University
What is Cyber Security - Avantika UniversityWhat is Cyber Security - Avantika University
What is Cyber Security - Avantika University
Avantika University
 
CYBERSECURITY - Best Practices,Concepts & Case Study (Mindmap)
CYBERSECURITY - Best Practices,Concepts & Case Study (Mindmap)CYBERSECURITY - Best Practices,Concepts & Case Study (Mindmap)
CYBERSECURITY - Best Practices,Concepts & Case Study (Mindmap)
WAJAHAT IQBAL
 
National Oil Company Conference 2014 - Evolving Cyber Security - A Wake Up Ca...
National Oil Company Conference 2014 - Evolving Cyber Security - A Wake Up Ca...National Oil Company Conference 2014 - Evolving Cyber Security - A Wake Up Ca...
National Oil Company Conference 2014 - Evolving Cyber Security - A Wake Up Ca...
Shah Sheikh
 
Addressing Healthcare Challenges Today
Addressing Healthcare Challenges TodayAddressing Healthcare Challenges Today
Addressing Healthcare Challenges Today
Ivanti
 
Security Automation and Machine Learning
Security Automation and Machine LearningSecurity Automation and Machine Learning
Security Automation and Machine Learning
Siemplify
 
Global Cyber Security Outlook - Deloitte (Hotel_Digital_Security_Seminar_Sept...
Global Cyber Security Outlook - Deloitte (Hotel_Digital_Security_Seminar_Sept...Global Cyber Security Outlook - Deloitte (Hotel_Digital_Security_Seminar_Sept...
Global Cyber Security Outlook - Deloitte (Hotel_Digital_Security_Seminar_Sept...
XEventsHospitality
 
IT Security
IT SecurityIT Security
Symantec Cyber Security Services: Security Simulation
Symantec Cyber Security Services: Security SimulationSymantec Cyber Security Services: Security Simulation
Symantec Cyber Security Services: Security Simulation
Symantec
 

What's hot (19)

Topic11
Topic11Topic11
Topic11
 
The Cyber Security Landscape: An OurCrowd Briefing for Investors
The Cyber Security Landscape: An OurCrowd Briefing for InvestorsThe Cyber Security Landscape: An OurCrowd Briefing for Investors
The Cyber Security Landscape: An OurCrowd Briefing for Investors
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Offensive cyber security engineer updated
Offensive cyber security engineer updatedOffensive cyber security engineer updated
Offensive cyber security engineer updated
 
From Business Architecture to Security Architecture
From Business Architecture to Security ArchitectureFrom Business Architecture to Security Architecture
From Business Architecture to Security Architecture
 
Cyber Ethics: Cyber Security Services | VAPT and WAPT
 Cyber Ethics: Cyber Security Services | VAPT and WAPT Cyber Ethics: Cyber Security Services | VAPT and WAPT
Cyber Ethics: Cyber Security Services | VAPT and WAPT
 
To Build Or Not To Build: Can SOC-aaS Bridge Your Security Skills Gap?
To Build Or Not To Build: Can SOC-aaS Bridge Your Security Skills Gap?To Build Or Not To Build: Can SOC-aaS Bridge Your Security Skills Gap?
To Build Or Not To Build: Can SOC-aaS Bridge Your Security Skills Gap?
 
Cyber Security Needs and Challenges
Cyber Security Needs and ChallengesCyber Security Needs and Challenges
Cyber Security Needs and Challenges
 
Cybersecurity Hands-On Training
Cybersecurity Hands-On TrainingCybersecurity Hands-On Training
Cybersecurity Hands-On Training
 
Active Directory: Modern Threats, Medieval Protection
Active Directory: Modern Threats, Medieval ProtectionActive Directory: Modern Threats, Medieval Protection
Active Directory: Modern Threats, Medieval Protection
 
Threat Modelling And Threat Response
Threat Modelling And Threat ResponseThreat Modelling And Threat Response
Threat Modelling And Threat Response
 
What is Cyber Security - Avantika University
What is Cyber Security - Avantika UniversityWhat is Cyber Security - Avantika University
What is Cyber Security - Avantika University
 
CYBERSECURITY - Best Practices,Concepts & Case Study (Mindmap)
CYBERSECURITY - Best Practices,Concepts & Case Study (Mindmap)CYBERSECURITY - Best Practices,Concepts & Case Study (Mindmap)
CYBERSECURITY - Best Practices,Concepts & Case Study (Mindmap)
 
National Oil Company Conference 2014 - Evolving Cyber Security - A Wake Up Ca...
National Oil Company Conference 2014 - Evolving Cyber Security - A Wake Up Ca...National Oil Company Conference 2014 - Evolving Cyber Security - A Wake Up Ca...
National Oil Company Conference 2014 - Evolving Cyber Security - A Wake Up Ca...
 
Addressing Healthcare Challenges Today
Addressing Healthcare Challenges TodayAddressing Healthcare Challenges Today
Addressing Healthcare Challenges Today
 
Security Automation and Machine Learning
Security Automation and Machine LearningSecurity Automation and Machine Learning
Security Automation and Machine Learning
 
Global Cyber Security Outlook - Deloitte (Hotel_Digital_Security_Seminar_Sept...
Global Cyber Security Outlook - Deloitte (Hotel_Digital_Security_Seminar_Sept...Global Cyber Security Outlook - Deloitte (Hotel_Digital_Security_Seminar_Sept...
Global Cyber Security Outlook - Deloitte (Hotel_Digital_Security_Seminar_Sept...
 
IT Security
IT SecurityIT Security
IT Security
 
Symantec Cyber Security Services: Security Simulation
Symantec Cyber Security Services: Security SimulationSymantec Cyber Security Services: Security Simulation
Symantec Cyber Security Services: Security Simulation
 

Viewers also liked

Presentación2
Presentación2Presentación2
Presentación2
PortafolioFinanzas
 
Apresentação e sale
Apresentação e saleApresentação e sale
Apresentação e sale
esalemkt
 
Redes móviles
Redes móviles Redes móviles
Redes móviles
Karina Bustamante
 
Cuestionario
CuestionarioCuestionario
Cuestionario
Beatriz Lopez
 
Macro picture project
Macro picture projectMacro picture project
Macro picture project
morganjames
 
Tutoriales drivermax, cobian backup y everest
Tutoriales drivermax, cobian backup y everestTutoriales drivermax, cobian backup y everest
Tutoriales drivermax, cobian backup y everest
lljedll
 
Administração de salão de beleza2
Administração de salão de beleza2Administração de salão de beleza2
Administração de salão de beleza2
Marcos Costa
 
Reliability engineering ppt-Internship
Reliability engineering ppt-InternshipReliability engineering ppt-Internship
Reliability engineering ppt-Internship
Turbo Energy Limited(a unit of TVS group)
 

Viewers also liked (9)

Presentación2
Presentación2Presentación2
Presentación2
 
Ema dma-045-14 precálculo
Ema dma-045-14 precálculoEma dma-045-14 precálculo
Ema dma-045-14 precálculo
 
Apresentação e sale
Apresentação e saleApresentação e sale
Apresentação e sale
 
Redes móviles
Redes móviles Redes móviles
Redes móviles
 
Cuestionario
CuestionarioCuestionario
Cuestionario
 
Macro picture project
Macro picture projectMacro picture project
Macro picture project
 
Tutoriales drivermax, cobian backup y everest
Tutoriales drivermax, cobian backup y everestTutoriales drivermax, cobian backup y everest
Tutoriales drivermax, cobian backup y everest
 
Administração de salão de beleza2
Administração de salão de beleza2Administração de salão de beleza2
Administração de salão de beleza2
 
Reliability engineering ppt-Internship
Reliability engineering ppt-InternshipReliability engineering ppt-Internship
Reliability engineering ppt-Internship
 

Similar to Application Security

Ibm app security assessment_ds
Ibm app security assessment_dsIbm app security assessment_ds
Ibm app security assessment_ds
Arun Gopinath
 
Enterprise Mobile Security
Enterprise Mobile SecurityEnterprise Mobile Security
Enterprise Mobile Security
tbeckwith
 
Jump Start Your Application Security Knowledge
Jump Start Your Application Security KnowledgeJump Start Your Application Security Knowledge
Jump Start Your Application Security Knowledge
Denim Group
 
Securing the Digital Frontier - An Analysis of Cybersecurity Landscape and Tr...
Securing the Digital Frontier - An Analysis of Cybersecurity Landscape and Tr...Securing the Digital Frontier - An Analysis of Cybersecurity Landscape and Tr...
Securing the Digital Frontier - An Analysis of Cybersecurity Landscape and Tr...
Draup3
 
Fortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptxFortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptx
YoisRoberthTapiadeLa
 
Fortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptxFortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptx
VictoriaChavesta
 
Top 6 Web Application Security Best Practices.pdf
Top 6 Web Application Security Best Practices.pdfTop 6 Web Application Security Best Practices.pdf
Top 6 Web Application Security Best Practices.pdf
SolviosTechnology
 
EISA Considerations for Web Application Security
EISA Considerations for Web Application SecurityEISA Considerations for Web Application Security
EISA Considerations for Web Application Security
Larry Ball
 
Mini IT Security Assessment
Mini IT Security AssessmentMini IT Security Assessment
Mini IT Security Assessment
GuardEra Access Solutions, Inc.
 
Secure Software Development Life Cycle
Secure Software Development Life CycleSecure Software Development Life Cycle
Secure Software Development Life Cycle
Maurice Dawson
 
Jenkins_ Carlasha 2016 v1
Jenkins_ Carlasha 2016 v1Jenkins_ Carlasha 2016 v1
Jenkins_ Carlasha 2016 v1
Carlasha Jenkins
 
24may 1200 valday eric anklesaria 'secure sdlc – core banking'
24may 1200 valday eric anklesaria 'secure sdlc – core banking'24may 1200 valday eric anklesaria 'secure sdlc – core banking'
24may 1200 valday eric anklesaria 'secure sdlc – core banking'
Positive Hack Days
 
Eric Anklesaria. Secure SDLC - Core Banking
Eric Anklesaria. Secure SDLC - Core BankingEric Anklesaria. Secure SDLC - Core Banking
Eric Anklesaria. Secure SDLC - Core Banking
Positive Hack Days
 
Detect and Respond to Threats Better with IBM Security App Exchange Partners
Detect and Respond to Threats Better with IBM Security App Exchange PartnersDetect and Respond to Threats Better with IBM Security App Exchange Partners
Detect and Respond to Threats Better with IBM Security App Exchange Partners
IBM Security
 
Building a Product Security Practice in a DevOps World
Building a Product Security Practice in a DevOps WorldBuilding a Product Security Practice in a DevOps World
Building a Product Security Practice in a DevOps World
Arun Prabhakar
 
Streamlining AppSec Policy Definition.pptx
Streamlining AppSec Policy Definition.pptxStreamlining AppSec Policy Definition.pptx
Streamlining AppSec Policy Definition.pptx
tmbainjr131
 
Derek J Mezack Resume 2015-AppSec_k
Derek J Mezack Resume 2015-AppSec_kDerek J Mezack Resume 2015-AppSec_k
Derek J Mezack Resume 2015-AppSec_k
Derek Mezack
 
Application Security Testing for Software Engineers: An approach to build sof...
Application Security Testing for Software Engineers: An approach to build sof...Application Security Testing for Software Engineers: An approach to build sof...
Application Security Testing for Software Engineers: An approach to build sof...
Michael Hidalgo
 
ONE Conference: Vulnerabilities in Web Applications
ONE Conference: Vulnerabilities in Web ApplicationsONE Conference: Vulnerabilities in Web Applications
ONE Conference: Vulnerabilities in Web Applications
Netcetera
 
Project Quality-SIPOCSelect a process of your choice and creat.docx
Project Quality-SIPOCSelect a process of your choice and creat.docxProject Quality-SIPOCSelect a process of your choice and creat.docx
Project Quality-SIPOCSelect a process of your choice and creat.docx
wkyra78
 

Similar to Application Security (20)

Ibm app security assessment_ds
Ibm app security assessment_dsIbm app security assessment_ds
Ibm app security assessment_ds
 
Enterprise Mobile Security
Enterprise Mobile SecurityEnterprise Mobile Security
Enterprise Mobile Security
 
Jump Start Your Application Security Knowledge
Jump Start Your Application Security KnowledgeJump Start Your Application Security Knowledge
Jump Start Your Application Security Knowledge
 
Securing the Digital Frontier - An Analysis of Cybersecurity Landscape and Tr...
Securing the Digital Frontier - An Analysis of Cybersecurity Landscape and Tr...Securing the Digital Frontier - An Analysis of Cybersecurity Landscape and Tr...
Securing the Digital Frontier - An Analysis of Cybersecurity Landscape and Tr...
 
Fortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptxFortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptx
 
Fortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptxFortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptx
 
Top 6 Web Application Security Best Practices.pdf
Top 6 Web Application Security Best Practices.pdfTop 6 Web Application Security Best Practices.pdf
Top 6 Web Application Security Best Practices.pdf
 
EISA Considerations for Web Application Security
EISA Considerations for Web Application SecurityEISA Considerations for Web Application Security
EISA Considerations for Web Application Security
 
Mini IT Security Assessment
Mini IT Security AssessmentMini IT Security Assessment
Mini IT Security Assessment
 
Secure Software Development Life Cycle
Secure Software Development Life CycleSecure Software Development Life Cycle
Secure Software Development Life Cycle
 
Jenkins_ Carlasha 2016 v1
Jenkins_ Carlasha 2016 v1Jenkins_ Carlasha 2016 v1
Jenkins_ Carlasha 2016 v1
 
24may 1200 valday eric anklesaria 'secure sdlc – core banking'
24may 1200 valday eric anklesaria 'secure sdlc – core banking'24may 1200 valday eric anklesaria 'secure sdlc – core banking'
24may 1200 valday eric anklesaria 'secure sdlc – core banking'
 
Eric Anklesaria. Secure SDLC - Core Banking
Eric Anklesaria. Secure SDLC - Core BankingEric Anklesaria. Secure SDLC - Core Banking
Eric Anklesaria. Secure SDLC - Core Banking
 
Detect and Respond to Threats Better with IBM Security App Exchange Partners
Detect and Respond to Threats Better with IBM Security App Exchange PartnersDetect and Respond to Threats Better with IBM Security App Exchange Partners
Detect and Respond to Threats Better with IBM Security App Exchange Partners
 
Building a Product Security Practice in a DevOps World
Building a Product Security Practice in a DevOps WorldBuilding a Product Security Practice in a DevOps World
Building a Product Security Practice in a DevOps World
 
Streamlining AppSec Policy Definition.pptx
Streamlining AppSec Policy Definition.pptxStreamlining AppSec Policy Definition.pptx
Streamlining AppSec Policy Definition.pptx
 
Derek J Mezack Resume 2015-AppSec_k
Derek J Mezack Resume 2015-AppSec_kDerek J Mezack Resume 2015-AppSec_k
Derek J Mezack Resume 2015-AppSec_k
 
Application Security Testing for Software Engineers: An approach to build sof...
Application Security Testing for Software Engineers: An approach to build sof...Application Security Testing for Software Engineers: An approach to build sof...
Application Security Testing for Software Engineers: An approach to build sof...
 
ONE Conference: Vulnerabilities in Web Applications
ONE Conference: Vulnerabilities in Web ApplicationsONE Conference: Vulnerabilities in Web Applications
ONE Conference: Vulnerabilities in Web Applications
 
Project Quality-SIPOCSelect a process of your choice and creat.docx
Project Quality-SIPOCSelect a process of your choice and creat.docxProject Quality-SIPOCSelect a process of your choice and creat.docx
Project Quality-SIPOCSelect a process of your choice and creat.docx
 

Application Security

  • 1. Securely Enabling Business Application Security Challenges Today’s businesses rely on applications for their business to grow, and due to fast development, sensitive information is at risk. As applications become more web-based and critical, exposure increases and security becomes more important. FishNet Security’s Solution FishNet Security provides a customized approach and understanding for each organization. Our consultants recognize business drivers, goals and tailor solutions to meet the specific initiatives of each organization. FishNet Security helps clients take a proactive approach to developing secure applications in the most efficient and effective manner. Offerings Application Security Assessment: Secure Code Training: Application Security ▪ Analysis of an application’s security posture in a runtime ▪ Application security training for personnel involved in environment application development, administration, and information ▪ Identify security vulnerabilities, weaknesses, and security other bad practices within the application logic and ▪ Taught by senior consultants that understand and explain supporting infrastructure the theory and technical details of application attacks, remediation and mitigating controls, secure development Secure Code Review: processes, testing procedures, security tools, and ▪ Analysis of an application’s functionality and logic for relevant technologies. security issues 1 Application Threat Modeling: ▪ Identify security vulnerabilities and other improper coding issues within the application that could allow ▪ Guided development of an application’s security posture www.fishnetsecurity.com security-related attacks based on qualification of risks, threats, vulnerabilities, and weaknesses to the application and the business it ▪ Optionally validate potential vulnerabilities in a runtime supports environment ▪ Workshop facilitated by senior consultants that understand Database Security Review: and explain the theory and technical details of application attacks, remediation and mitigating controls, secure ▪ Review of the configuration and security posture of a development processes, testing procedures, security database instance/server tools, and relevant technologies ▪ Identify technical vulnerabilities and weaknesses within the database instance and server as well Secure SDLC Review: as operational security issues related to database ▪ Guided development of an organization’s secure application administration and use development environment ▪ Implement development practices that enable the development of secure applications that includes both proactive controls and reactive validation of those controls Why FishNet Security? FishNet Security is equipped with a dedicated team who understand business and technical needs, as well as a long history of building information security programs and architectures for organizations of all sizes and within various industries. FishNet can assist organizations in building a new holistic application security program, as well as review various aspects of an existing application security program. Our organization has a board base of experience in assessing applications for security flaws, including web-based, client/server, rich media, portal/applet based, and thick/thin applications. Organizations, with the help of FishNet Security, can also identify true vulnerabilities and the client can focus on proper remediation of vulnerabilities instead of specific attacks. Our consultants provide a wide array of knowledge and skills in both real-world development and application security, which allows secure development of applications and verification that the application remains secure. ID# 09SS0048 Corporate Headquarters 1710 Walnut St. Kansas City, MO 64108 • 888.732.9406 © 2009 FishNet Security. All rights reserved.
  • 2. Securely Enabling Business Application Security Success Stories FishNet Security performed in-depth security reviews. FishNet Security was contracted by a large retail organization to perform in- depth security reviews of three critical applications: a web-based e-commerce application, a SOA application with additional web front-end for account management, and a fat client (C++) application used by internal personnel for system administration. For each application, FishNet Security reviewed application and network architectural diagrams, reviewed source code for each application, and performed network and application security assessments. In conjunction with application threat modeling, FishNet Security provided prioritized, actionable recommendations to improve the security posture of each application as well as the organization. Application Security Application security reviews improve organizations development process. FishNet Security performed multiple application security reviews for a financial services company in order to improve the organization’s application development process. FishNet Security first reviewed application and network architectural diagrams and performed an application security assessment of the organization’s primary web application. The results of this phase of the assessment were used to deliver custom secure code training to the organization’s developers, development managers, and information security personnel. FishNet Security then 2 developed a road map to improve the organization’s secure software development process to ensure applications were developed securely with the proper security controls in place before going into production. www.fishnetsecurity.com FishNet Security provides annual application security assessments for large healthcare provider. FishNet Security has performed annual application security assessments of many (40+) web applications for a large healthcare company developed by the organization and its subsidiaries for more than three consecutive years. These applications vary in functionality, technology, and complexity as well as the targeted user industry. By analyzing annual and per-application data, FishNet Security can provide critical application security metrics to management in order to help the organization focus on key areas of weakness within development groups, subsidiaries, and across the organization. Contact Information FishNet Security, is a leading provider of security services, training and technologies with a respected national presence and focused local support. For more information visit www.fishnetsecurity.com or call 888.732.9406 About FishNet Security We Focus on the Threat so You can Focus on the Opportunity. Committed to security excellence, FishNet Security is the #1 provider of information security solutions that combine technology, services, support, and training. FishNet Security solutions have enabled 3,000 clients to better manage risk, meet compliance requirements, and reduce cost while maximizing security effectiveness and operational efficiency. For more information on FishNet Security, Inc., visit www.fishnetsecurity.com. ID# 09SS0048 Corporate Headquarters 1710 Walnut St. Kansas City, MO 64108 • 888.732.9406 © 2009 FishNet Security. All rights reserved.