SlideShare a Scribd company logo
1 of 4
Download to read offline
WHITEHAT SENTINEL SERVICES
WEBSITE RISK MANAGEMENT SOLUTIONS
Prevent website attacks using the most complete Web security solution for
companies of any size. WhiteHat Sentinel, the industry’s leading SaaS application
security testing platform, protects some of the largest companies in the world,
including leading banks, software companies, online retailers, and consumer
products manufacturers.
Unlike traditional website scanning software or consultants, WhiteHat Sentinel is
the only solution to combine an advanced, cloud-based security platform with a
team of security engineers—the WhiteHat Security Threat Research Center (TRC)—
who act as a critical extension of your team.
This combination helps secure sites in the toughest, most regulated industries
across the Web.
WhiteHat Security provides solutions to identify and remediate website
security vulnerabilities in every stage of the SDLC.
HIGHLIGHTS
Continuous Assessment
Always-on risk assessment delivers:
•  Alerts for newly discovered
vulnerabilities
•  Metrics to identify improvement in
security measures over time
•  Automatic detection and assessment
of code changes to web applications
Zero False Positives
Verified, prioritized results eliminate
false positives and streamlines the
remediation process, including:
•  Vulnerabilities are custom prioritized
by risk – pin-points high priority issues
•  Clear actions and notifications for
fixing issues
•  Eliminate triage of false positives and
save valuable developer time and
resources
Threat Research Center
WhiteHat Security Engineers serve
as an extension of your own website
security team, providing:
•  Answers to your vulnerability
questions and guidance on
remediation
•  Active management of your risk
posture
•  Proof of concepts for vulnerability
exploits
Trending Analysis
Tracks real time and historical data to
measure your risk exposure over time.
Trending analysis offers:
•  At-a-glance view of exposure ratings
and progress at closing vulnerabilities
•  Comparison of your company’s
security profile against other
organizations in your industry
Scalability
•  Customers range from start-ups to the
Fortune 500
•  Tens of thousands of simultaneous
assessments
•  Millions of vulnerabilities processed
per week
DATA SHEET
WHITEHAT SENTINEL SECURITY PLATFORM
COVERAGE ACROSS THE SDLC
EXPERTISE: Threat Research Center
INTELLIGENCE: Security Metrics and Real-Time Reporting
ACCESSIBILITY: Anytime / Anywhere via the Internet
Sentinel Source Sentinel PL Sentinel BE/SE/PE
Sentinel Mobile
UNIQUE FEATURES FOR SENTINEL SERVICES
Business Logic Testing
Sentinel Premium Edition subscribers receive special testing to find business logic vulnerabilities. This service entails:
•  Creating a customized testing scheme developed and performed by WhiteHat Security Engineers
•  Mapping out your Web application, users, roles, and custom business workflow
•  Identifying and validating account privileges across roles and between users
•  Prioritizing vulnerabilities based on your business goals and intentions
Scanner Configuration and Continuous Tuning
Sentinel Services includes assessment customization to ensure that Sentinel properly tests all forms, Ajax/Web 2.0 requests,
and Rich Internet Applications, and to maximize scan coverage. This customization is designed to support a production safe
assessment-testing environment, including:
•  Reviewing Web 2.0, rich Internet applications and Ajax requests
•  Monitoring, tuning, and customizing scans to ensure thorough coverage
Sentinel Premium
Edition (PE)
Sentinel Standard
Edition (SE)
Sentinel Baseline
Edition (BE) / BE
Enterprise
Sentinel PreLaunch
(PL)
WhiteHat Sentinel
Premium Edition (PE) is
for permanent websites
that are mission-critical,
with multi-step forms,
and rigorous compliance
requirements. All SE
features and business
logic testing is included.
Sentinel SE is for
websites that are
permanent fixtures, but
not necessarily mission-
critical. SE tests for
and verifies technical
vulnerabilities including
issues involving multi-step
forms and logins.
Sentinel BE is the
foundational solution that
covers all your website
assets and protects
basic, less-critical sites.
BE Enterprise is a
massively scalable “best
value” solution designed
to fit any environment.
Sentinel PL provides fast
and accurate technical
vulnerability assessments
specifically designed for
preproduction websites,
enabling developers to
assess and fix code prior
to production deployment.
WhiteHat Sentinel Service Benefits: Unlimited user accounts and Support Plus Standard is included in all Sentinel subscriptions.
Support Plus Silver, Gold, and Platinum are available for an additional fee.
Verified, prioritized results
eliminate false positives 3 3 3 3
Continuous assessment 3 3 3 3
PCI Compliance 3 3 3 3
Highly scalable across
the enterprise 3 3 3 3
Access to WhiteHat
Security Engineers 3 3 3 3
Production safe 3 3 3
Scanner configuration
and continuous tuning 3 3 3
Business logic testing 3
Proof of concepts for
vulnerabilities 3
Multi-level authentication
testing 3
ACCELERATE REMEDIATION
WhiteHat Sentinel delivers a proven, scalable, and affordable enterprise application security platform, accelerating the
identification and remediation of Web application security vulnerabilities:
•  Sentinel Source directly assesses source code during development to uncover difficult-to-detect vulnerabilities in
production, enabling remediation earlier in the development cycle.
•  Sentinel PL strengthens Web application security at launch by assessing Web applications and providing remediation
guidance in pre-production and staging environments.
•  Every Sentinel service includes full vulnerability verification by the TRC, which verifies the accuracy of all vulnerabilities,
virtually eliminating false positives and dramatically simplifying remediation.
•  Sentinel integration with leading Web application firewalls closes the gap between vulnerability detection and
remediation with highly targeted virtual patching.
Production Safe
As a part of every Sentinel subscription, members of the TRC analyze your Web application inputs, state-changing requests,
and any sensitive functionality to customize testing for safety first, then for depth and coverage. Custom tuning of scans
permits full coverage without performance impact, including:
•  Eliminating any performance degradations—canning payload is equivalent to a single user
•  Assuring data integrity—using benign injections in place of live code
Sentinel Source Sentinel Mobile
WhiteHat Sentinel Source assesses source code
directly, giving developers accurate vulnerability data
and enabling them to fix code continuously throughout
the software development lifecycle (SDLC).
Sentinel Mobile enables enterprises to identify
and remediate security vulnerabilities in any mobile
application across all stages of the Mobile software
development life cycle (SDLC).
WhiteHat Sentinel Service Benefits: Unlimited user accounts and Support Plus Standard is included in all Sentinel subscriptions.
Support Plus Silver, Gold, and Platinum are available for an additional fee.
Verified, prioritized
vulnerability results
eliminate false positives
3 3
Preserves Intellectual
Property 3
Detailed vulnerabilities
reporting 3 3
Early risk remediation 3 3
Highly scalable across the
enterprise 3
Unlimited assessments 3
Ease of use 3 3
Flexible assessment
configuration 3
Broad repository support 3
WhiteHat Security, Inc. | 3970 Freedom Circle | Santa Clara, CA 95054
408.343.8300 | www.whitehatsec.com Copyright © 2013 WhiteHat Security, Inc.
Product names or brands used in this publication are for identification purposes only and may be trademarks of their respective companies.	 031513
WHITEHAT CUSTOMER
SUPPORT
WhiteHat Customer Support Engineers
provide enterprise-class software support.
You can access customer support by email,
phone, or the Customer Support Portal.
WhiteHat Support Plus Standard is
included with all Sentinel subscriptions.
Support Plus Silver, Gold, and Platinum are
available at an additional cost.
WHITEHAT SENTINEL BENEFITS
Unlimited Assessments
•  Verification of every vulnerability
•  Re-test every vulnerability on demand
•  Eliminate trade offs between security and cost with single annual fee
Easy to Manage SaaS-Based Platform
•  No hardware or scanning software to install
•  Eliminate time-intensive configuration and management concerns
•  Assess thousands of websites simultaneously
Open XML API Integration
•  Bug tracking systems
•  Security Information and Event Management (SIEM)
•  Governance Risk and Compliance (GRC)
•  Web Application Firewall (WAF) products
Flexible Reports
•  Run compliance reports (PCI) at any time
•  Communicate your risk profile across the enterprise
•  Customize summaries and risk profiles for specific audiences
•  Identify trends across multiple web applications
PCI Compliance
•  WhiteHat Sentinel PE, SE and BE services exceed requirements 6.3.7b, 6.5 and
6.6 of the PCI DSS by providing ongoing, verified vulnerability assessments for both
internal and public websites
•  WhiteHat Sentinel PE service includes business logic and penetration testing
required by PCI DSS 11.3.2.
•  WhiteHat Sentinel integration with Web application firewalls (WAFs) supports the
creation of virtual patches to fix vulnerabilities while providing the reports needed to
pass auditor inspections.
Asset Identification and Risk Profiling for the Enterprise
•  Rapidly identify all website assets—even sites you didn’t know you had
•  Prioritize Web applications based on business risk to your organization
•  Gain a comprehensive understanding of potential attacks
ABOUT WHITEHAT SECURITY
Founded in 2001, and headquartered in
Santa Clara, California, WhiteHat Security
provides end-to-end solutions for Web
security. The company’s cloud technology
platform and teams of expert security
engineers turn verified security intelligence
into actionable insights for customers.
Through a combination of core products
and strategic partnerships, WhiteHat
Security provides complete Web security
at a scale unmatched in the industry.
WhiteHat Sentinel, the company’s flagship
product line, currently manages thousands
of websites − including sites of leading
companies in the most regulated industries,
such as top e-commerce, finance and
healthcare organizations.

More Related Content

What's hot

The New Assure Security: Complete IBM i Compliance and Security
The New Assure Security: Complete IBM i Compliance and SecurityThe New Assure Security: Complete IBM i Compliance and Security
The New Assure Security: Complete IBM i Compliance and SecurityPrecisely
 
Owasp Proactive Controls for Web developer
Owasp  Proactive Controls for Web developerOwasp  Proactive Controls for Web developer
Owasp Proactive Controls for Web developerSameer Paradia
 
IBM AppScan Enterprise - The total software security solution
IBM AppScan Enterprise - The total software security solutionIBM AppScan Enterprise - The total software security solution
IBM AppScan Enterprise - The total software security solutionhearme limited company
 
Secure by design and secure software development
Secure by design and secure software developmentSecure by design and secure software development
Secure by design and secure software developmentBill Ross
 
Software Development Life Cycle – Managing Risk and Measuring Security
Software Development Life Cycle – Managing Risk and Measuring SecuritySoftware Development Life Cycle – Managing Risk and Measuring Security
Software Development Life Cycle – Managing Risk and Measuring SecurityThomas Malmberg
 
IBM QRadar Security Intelligence Overview
IBM QRadar Security Intelligence OverviewIBM QRadar Security Intelligence Overview
IBM QRadar Security Intelligence OverviewCamilo Fandiño Gómez
 
Tips to Remediate your Vulnerability Management Program
Tips to Remediate your Vulnerability Management ProgramTips to Remediate your Vulnerability Management Program
Tips to Remediate your Vulnerability Management ProgramBeyondTrust
 
Ivanti New Pricing Model
Ivanti New Pricing ModelIvanti New Pricing Model
Ivanti New Pricing ModelIvanti
 
What Good is this Tool? A Guide to Choosing the Right Application Security Te...
What Good is this Tool? A Guide to Choosing the Right Application Security Te...What Good is this Tool? A Guide to Choosing the Right Application Security Te...
What Good is this Tool? A Guide to Choosing the Right Application Security Te...Kevin Fealey
 
IBM QRadar Security Intelligence Overview
IBM QRadar Security Intelligence OverviewIBM QRadar Security Intelligence Overview
IBM QRadar Security Intelligence OverviewCamilo Fandiño Gómez
 
Síla virtuality - virtualizovaná bezpečnost softwarově definovaných datových ...
Síla virtuality - virtualizovaná bezpečnost softwarově definovaných datových ...Síla virtuality - virtualizovaná bezpečnost softwarově definovaných datových ...
Síla virtuality - virtualizovaná bezpečnost softwarově definovaných datových ...MarketingArrowECS_CZ
 
Whitepaper IBM Qradar Security Intelligence
Whitepaper IBM Qradar Security IntelligenceWhitepaper IBM Qradar Security Intelligence
Whitepaper IBM Qradar Security IntelligenceCamilo Fandiño Gómez
 
PT Application Inspector SSDL Edition product brief
PT Application Inspector SSDL Edition product briefPT Application Inspector SSDL Edition product brief
PT Application Inspector SSDL Edition product briefValery Boronin
 
Vmware’s move to a digital workspace
Vmware’s move to a digital workspaceVmware’s move to a digital workspace
Vmware’s move to a digital workspacesporta72
 
AV-Comparatives’ 2017 business software review
AV-Comparatives’ 2017 business software reviewAV-Comparatives’ 2017 business software review
AV-Comparatives’ 2017 business software reviewJermund Ottermo
 
Secure SDLC Framework
Secure SDLC FrameworkSecure SDLC Framework
Secure SDLC FrameworkRishi Kant
 
Pactera - App Security Assessment - Mobile, Web App, IoT - v2
Pactera - App Security Assessment - Mobile, Web App, IoT - v2Pactera - App Security Assessment - Mobile, Web App, IoT - v2
Pactera - App Security Assessment - Mobile, Web App, IoT - v2Kyle Lai
 
OpsMgr 2012 end-to-end monitoring
OpsMgr 2012 end-to-end monitoringOpsMgr 2012 end-to-end monitoring
OpsMgr 2012 end-to-end monitoringwwwally
 

What's hot (20)

The New Assure Security: Complete IBM i Compliance and Security
The New Assure Security: Complete IBM i Compliance and SecurityThe New Assure Security: Complete IBM i Compliance and Security
The New Assure Security: Complete IBM i Compliance and Security
 
IKare Vulnerability Scanner - Datasheet EN
IKare Vulnerability Scanner - Datasheet ENIKare Vulnerability Scanner - Datasheet EN
IKare Vulnerability Scanner - Datasheet EN
 
Owasp Proactive Controls for Web developer
Owasp  Proactive Controls for Web developerOwasp  Proactive Controls for Web developer
Owasp Proactive Controls for Web developer
 
IBM AppScan Enterprise - The total software security solution
IBM AppScan Enterprise - The total software security solutionIBM AppScan Enterprise - The total software security solution
IBM AppScan Enterprise - The total software security solution
 
Secure by design and secure software development
Secure by design and secure software developmentSecure by design and secure software development
Secure by design and secure software development
 
Software Development Life Cycle – Managing Risk and Measuring Security
Software Development Life Cycle – Managing Risk and Measuring SecuritySoftware Development Life Cycle – Managing Risk and Measuring Security
Software Development Life Cycle – Managing Risk and Measuring Security
 
IBM QRadar Security Intelligence Overview
IBM QRadar Security Intelligence OverviewIBM QRadar Security Intelligence Overview
IBM QRadar Security Intelligence Overview
 
Tips to Remediate your Vulnerability Management Program
Tips to Remediate your Vulnerability Management ProgramTips to Remediate your Vulnerability Management Program
Tips to Remediate your Vulnerability Management Program
 
Ivanti New Pricing Model
Ivanti New Pricing ModelIvanti New Pricing Model
Ivanti New Pricing Model
 
What Good is this Tool? A Guide to Choosing the Right Application Security Te...
What Good is this Tool? A Guide to Choosing the Right Application Security Te...What Good is this Tool? A Guide to Choosing the Right Application Security Te...
What Good is this Tool? A Guide to Choosing the Right Application Security Te...
 
VMware Workspace One
VMware Workspace OneVMware Workspace One
VMware Workspace One
 
IBM QRadar Security Intelligence Overview
IBM QRadar Security Intelligence OverviewIBM QRadar Security Intelligence Overview
IBM QRadar Security Intelligence Overview
 
Síla virtuality - virtualizovaná bezpečnost softwarově definovaných datových ...
Síla virtuality - virtualizovaná bezpečnost softwarově definovaných datových ...Síla virtuality - virtualizovaná bezpečnost softwarově definovaných datových ...
Síla virtuality - virtualizovaná bezpečnost softwarově definovaných datových ...
 
Whitepaper IBM Qradar Security Intelligence
Whitepaper IBM Qradar Security IntelligenceWhitepaper IBM Qradar Security Intelligence
Whitepaper IBM Qradar Security Intelligence
 
PT Application Inspector SSDL Edition product brief
PT Application Inspector SSDL Edition product briefPT Application Inspector SSDL Edition product brief
PT Application Inspector SSDL Edition product brief
 
Vmware’s move to a digital workspace
Vmware’s move to a digital workspaceVmware’s move to a digital workspace
Vmware’s move to a digital workspace
 
AV-Comparatives’ 2017 business software review
AV-Comparatives’ 2017 business software reviewAV-Comparatives’ 2017 business software review
AV-Comparatives’ 2017 business software review
 
Secure SDLC Framework
Secure SDLC FrameworkSecure SDLC Framework
Secure SDLC Framework
 
Pactera - App Security Assessment - Mobile, Web App, IoT - v2
Pactera - App Security Assessment - Mobile, Web App, IoT - v2Pactera - App Security Assessment - Mobile, Web App, IoT - v2
Pactera - App Security Assessment - Mobile, Web App, IoT - v2
 
OpsMgr 2012 end-to-end monitoring
OpsMgr 2012 end-to-end monitoringOpsMgr 2012 end-to-end monitoring
OpsMgr 2012 end-to-end monitoring
 

Viewers also liked

Eport
EportEport
Eportin2it
 
Amen ma's sura.vol.2.doc
Amen ma's sura.vol.2.docAmen ma's sura.vol.2.doc
Amen ma's sura.vol.2.docMurad Wysinger
 
Sales associate job interview questions and answers
Sales associate job interview questions and answersSales associate job interview questions and answers
Sales associate job interview questions and answershmmu20
 
EUROSEARCH INDIA
EUROSEARCH INDIAEUROSEARCH INDIA
EUROSEARCH INDIAAnita Singh
 
Estrategias de busqueda
Estrategias de busquedaEstrategias de busqueda
Estrategias de busquedasbs0228
 
ชุดกิจกรรมการเรียนรู้ที่ 1 เรื่องการเกิดฯและชนิดฯเผยแพร่
ชุดกิจกรรมการเรียนรู้ที่ 1 เรื่องการเกิดฯและชนิดฯเผยแพร่ชุดกิจกรรมการเรียนรู้ที่ 1 เรื่องการเกิดฯและชนิดฯเผยแพร่
ชุดกิจกรรมการเรียนรู้ที่ 1 เรื่องการเกิดฯและชนิดฯเผยแพร่กันธิชา เพชรดี
 
ชุดกิจกรรมการเรียนรู้ที่ 1
ชุดกิจกรรมการเรียนรู้ที่ 1ชุดกิจกรรมการเรียนรู้ที่ 1
ชุดกิจกรรมการเรียนรู้ที่ 1กันธิชา เพชรดี
 
กำหนดการพิธีบรรพชาอุปสมบทถวายเป็นพระราชกุศลแด่พระบาทสมเด็จพระปรมินทรมหาภูมิพล...
กำหนดการพิธีบรรพชาอุปสมบทถวายเป็นพระราชกุศลแด่พระบาทสมเด็จพระปรมินทรมหาภูมิพล...กำหนดการพิธีบรรพชาอุปสมบทถวายเป็นพระราชกุศลแด่พระบาทสมเด็จพระปรมินทรมหาภูมิพล...
กำหนดการพิธีบรรพชาอุปสมบทถวายเป็นพระราชกุศลแด่พระบาทสมเด็จพระปรมินทรมหาภูมิพล...Totsaporn Inthanin
 
Emprendimiento
EmprendimientoEmprendimiento
EmprendimientoJCornejo93
 
คู่มือการเขียนรายงาน การอ้างอิง การประกวดโครงงานวิทยาศาสตร์ สมาคมวิทยาศาสตร์ ...
คู่มือการเขียนรายงาน การอ้างอิง การประกวดโครงงานวิทยาศาสตร์ สมาคมวิทยาศาสตร์ ...คู่มือการเขียนรายงาน การอ้างอิง การประกวดโครงงานวิทยาศาสตร์ สมาคมวิทยาศาสตร์ ...
คู่มือการเขียนรายงาน การอ้างอิง การประกวดโครงงานวิทยาศาสตร์ สมาคมวิทยาศาสตร์ ...Totsaporn Inthanin
 
4.เล่มที่ 2
4.เล่มที่ 24.เล่มที่ 2
4.เล่มที่ 2kai kk
 
2.a1 บทคัดย่อ
2.a1 บทคัดย่อ2.a1 บทคัดย่อ
2.a1 บทคัดย่อkai kk
 
18ข้อสอบสสวท 56
18ข้อสอบสสวท 5618ข้อสอบสสวท 56
18ข้อสอบสสวท 56Wichai Likitponrak
 
เฉลยแนวสอบIjsoชีววิทยาม.ต้น
เฉลยแนวสอบIjsoชีววิทยาม.ต้นเฉลยแนวสอบIjsoชีววิทยาม.ต้น
เฉลยแนวสอบIjsoชีววิทยาม.ต้นWichai Likitponrak
 
Advanced Wireless Report_Styles
Advanced Wireless Report_StylesAdvanced Wireless Report_Styles
Advanced Wireless Report_StylesMalcolm Lenore
 

Viewers also liked (16)

Eport
EportEport
Eport
 
Amen ma's sura.vol.2.doc
Amen ma's sura.vol.2.docAmen ma's sura.vol.2.doc
Amen ma's sura.vol.2.doc
 
Sales associate job interview questions and answers
Sales associate job interview questions and answersSales associate job interview questions and answers
Sales associate job interview questions and answers
 
EUROSEARCH INDIA
EUROSEARCH INDIAEUROSEARCH INDIA
EUROSEARCH INDIA
 
Sotware libre contaduria
Sotware libre contaduriaSotware libre contaduria
Sotware libre contaduria
 
Estrategias de busqueda
Estrategias de busquedaEstrategias de busqueda
Estrategias de busqueda
 
ชุดกิจกรรมการเรียนรู้ที่ 1 เรื่องการเกิดฯและชนิดฯเผยแพร่
ชุดกิจกรรมการเรียนรู้ที่ 1 เรื่องการเกิดฯและชนิดฯเผยแพร่ชุดกิจกรรมการเรียนรู้ที่ 1 เรื่องการเกิดฯและชนิดฯเผยแพร่
ชุดกิจกรรมการเรียนรู้ที่ 1 เรื่องการเกิดฯและชนิดฯเผยแพร่
 
ชุดกิจกรรมการเรียนรู้ที่ 1
ชุดกิจกรรมการเรียนรู้ที่ 1ชุดกิจกรรมการเรียนรู้ที่ 1
ชุดกิจกรรมการเรียนรู้ที่ 1
 
กำหนดการพิธีบรรพชาอุปสมบทถวายเป็นพระราชกุศลแด่พระบาทสมเด็จพระปรมินทรมหาภูมิพล...
กำหนดการพิธีบรรพชาอุปสมบทถวายเป็นพระราชกุศลแด่พระบาทสมเด็จพระปรมินทรมหาภูมิพล...กำหนดการพิธีบรรพชาอุปสมบทถวายเป็นพระราชกุศลแด่พระบาทสมเด็จพระปรมินทรมหาภูมิพล...
กำหนดการพิธีบรรพชาอุปสมบทถวายเป็นพระราชกุศลแด่พระบาทสมเด็จพระปรมินทรมหาภูมิพล...
 
Emprendimiento
EmprendimientoEmprendimiento
Emprendimiento
 
คู่มือการเขียนรายงาน การอ้างอิง การประกวดโครงงานวิทยาศาสตร์ สมาคมวิทยาศาสตร์ ...
คู่มือการเขียนรายงาน การอ้างอิง การประกวดโครงงานวิทยาศาสตร์ สมาคมวิทยาศาสตร์ ...คู่มือการเขียนรายงาน การอ้างอิง การประกวดโครงงานวิทยาศาสตร์ สมาคมวิทยาศาสตร์ ...
คู่มือการเขียนรายงาน การอ้างอิง การประกวดโครงงานวิทยาศาสตร์ สมาคมวิทยาศาสตร์ ...
 
4.เล่มที่ 2
4.เล่มที่ 24.เล่มที่ 2
4.เล่มที่ 2
 
2.a1 บทคัดย่อ
2.a1 บทคัดย่อ2.a1 บทคัดย่อ
2.a1 บทคัดย่อ
 
18ข้อสอบสสวท 56
18ข้อสอบสสวท 5618ข้อสอบสสวท 56
18ข้อสอบสสวท 56
 
เฉลยแนวสอบIjsoชีววิทยาม.ต้น
เฉลยแนวสอบIjsoชีววิทยาม.ต้นเฉลยแนวสอบIjsoชีววิทยาม.ต้น
เฉลยแนวสอบIjsoชีววิทยาม.ต้น
 
Advanced Wireless Report_Styles
Advanced Wireless Report_StylesAdvanced Wireless Report_Styles
Advanced Wireless Report_Styles
 

Similar to DS_Sentinel_4pg_031513

NEWSentinel_services15
NEWSentinel_services15NEWSentinel_services15
NEWSentinel_services15Bilha Diaz
 
Scalar Security Roadshow: Toronto Presentation - April 15, 2015
Scalar Security Roadshow: Toronto Presentation - April 15, 2015Scalar Security Roadshow: Toronto Presentation - April 15, 2015
Scalar Security Roadshow: Toronto Presentation - April 15, 2015Scalar Decisions
 
Scalar Security Roadshow April 2015
Scalar Security Roadshow April 2015Scalar Security Roadshow April 2015
Scalar Security Roadshow April 2015Scalar Decisions
 
productsheet_csi70_brief
productsheet_csi70_briefproductsheet_csi70_brief
productsheet_csi70_briefSagren Naidoo
 
Secure Code review - Veracode SaaS Platform - Saudi Green Method
Secure Code review - Veracode SaaS Platform - Saudi Green MethodSecure Code review - Veracode SaaS Platform - Saudi Green Method
Secure Code review - Veracode SaaS Platform - Saudi Green MethodSalil Kumar Subramony
 
Maintaining Continuous Compliance with HCL BigFix
Maintaining Continuous Compliance with HCL BigFixMaintaining Continuous Compliance with HCL BigFix
Maintaining Continuous Compliance with HCL BigFixHCLSoftware
 
Cigniti Independent Software Testing Services
Cigniti Independent Software Testing ServicesCigniti Independent Software Testing Services
Cigniti Independent Software Testing ServicesCigniti Technologies Ltd
 
Acunetix Training and ScanAssist
Acunetix Training and ScanAssistAcunetix Training and ScanAssist
Acunetix Training and ScanAssistBryan Ferrario
 
Software Testing Services | Best software testing consulting companies
Software Testing Services | Best software testing consulting companiesSoftware Testing Services | Best software testing consulting companies
Software Testing Services | Best software testing consulting companiesgnareshsem
 
The quality assurance checklist for progressive testing
The quality assurance checklist for progressive testingThe quality assurance checklist for progressive testing
The quality assurance checklist for progressive testingMaitrikpaida
 
The Quality Assurance Checklist for Progressive Testing
The Quality Assurance Checklist for Progressive TestingThe Quality Assurance Checklist for Progressive Testing
The Quality Assurance Checklist for Progressive TestingCygnet Infotech
 
IT_Security_Service Delivery_Consultant
IT_Security_Service Delivery_Consultant IT_Security_Service Delivery_Consultant
IT_Security_Service Delivery_Consultant Saravanan Purushothaman
 
Aricent Highly Automated Vulnerability Assessment Orchestration Containers (H...
Aricent Highly Automated Vulnerability Assessment Orchestration Containers (H...Aricent Highly Automated Vulnerability Assessment Orchestration Containers (H...
Aricent Highly Automated Vulnerability Assessment Orchestration Containers (H...Aricent
 
Applied Systems Ltd. Industrial Software
Applied Systems Ltd. Industrial SoftwareApplied Systems Ltd. Industrial Software
Applied Systems Ltd. Industrial SoftwareApplied Systems Ltd.
 
Applied Systems Ltd. Industrial Software
Applied Systems Ltd. Industrial SoftwareApplied Systems Ltd. Industrial Software
Applied Systems Ltd. Industrial SoftwareApplied Systems Ltd.
 
Demand for Penetration Testing Services.docx
Demand for Penetration Testing Services.docxDemand for Penetration Testing Services.docx
Demand for Penetration Testing Services.docxAardwolf Security
 
(SEC310) Keeping Developers and Auditors Happy in the Cloud
(SEC310) Keeping Developers and Auditors Happy in the Cloud(SEC310) Keeping Developers and Auditors Happy in the Cloud
(SEC310) Keeping Developers and Auditors Happy in the CloudAmazon Web Services
 
Mobile Enterprise Application Platform
Mobile Enterprise Application PlatformMobile Enterprise Application Platform
Mobile Enterprise Application PlatformNugroho Gito
 
Introduction to Symantec Endpoint Management75.pptx
Introduction to Symantec Endpoint Management75.pptxIntroduction to Symantec Endpoint Management75.pptx
Introduction to Symantec Endpoint Management75.pptxArrow ECS UK
 
Guardian analytics vs. actimize 2016
Guardian analytics vs. actimize 2016Guardian analytics vs. actimize 2016
Guardian analytics vs. actimize 2016Laurent Pacalin
 

Similar to DS_Sentinel_4pg_031513 (20)

NEWSentinel_services15
NEWSentinel_services15NEWSentinel_services15
NEWSentinel_services15
 
Scalar Security Roadshow: Toronto Presentation - April 15, 2015
Scalar Security Roadshow: Toronto Presentation - April 15, 2015Scalar Security Roadshow: Toronto Presentation - April 15, 2015
Scalar Security Roadshow: Toronto Presentation - April 15, 2015
 
Scalar Security Roadshow April 2015
Scalar Security Roadshow April 2015Scalar Security Roadshow April 2015
Scalar Security Roadshow April 2015
 
productsheet_csi70_brief
productsheet_csi70_briefproductsheet_csi70_brief
productsheet_csi70_brief
 
Secure Code review - Veracode SaaS Platform - Saudi Green Method
Secure Code review - Veracode SaaS Platform - Saudi Green MethodSecure Code review - Veracode SaaS Platform - Saudi Green Method
Secure Code review - Veracode SaaS Platform - Saudi Green Method
 
Maintaining Continuous Compliance with HCL BigFix
Maintaining Continuous Compliance with HCL BigFixMaintaining Continuous Compliance with HCL BigFix
Maintaining Continuous Compliance with HCL BigFix
 
Cigniti Independent Software Testing Services
Cigniti Independent Software Testing ServicesCigniti Independent Software Testing Services
Cigniti Independent Software Testing Services
 
Acunetix Training and ScanAssist
Acunetix Training and ScanAssistAcunetix Training and ScanAssist
Acunetix Training and ScanAssist
 
Software Testing Services | Best software testing consulting companies
Software Testing Services | Best software testing consulting companiesSoftware Testing Services | Best software testing consulting companies
Software Testing Services | Best software testing consulting companies
 
The quality assurance checklist for progressive testing
The quality assurance checklist for progressive testingThe quality assurance checklist for progressive testing
The quality assurance checklist for progressive testing
 
The Quality Assurance Checklist for Progressive Testing
The Quality Assurance Checklist for Progressive TestingThe Quality Assurance Checklist for Progressive Testing
The Quality Assurance Checklist for Progressive Testing
 
IT_Security_Service Delivery_Consultant
IT_Security_Service Delivery_Consultant IT_Security_Service Delivery_Consultant
IT_Security_Service Delivery_Consultant
 
Aricent Highly Automated Vulnerability Assessment Orchestration Containers (H...
Aricent Highly Automated Vulnerability Assessment Orchestration Containers (H...Aricent Highly Automated Vulnerability Assessment Orchestration Containers (H...
Aricent Highly Automated Vulnerability Assessment Orchestration Containers (H...
 
Applied Systems Ltd. Industrial Software
Applied Systems Ltd. Industrial SoftwareApplied Systems Ltd. Industrial Software
Applied Systems Ltd. Industrial Software
 
Applied Systems Ltd. Industrial Software
Applied Systems Ltd. Industrial SoftwareApplied Systems Ltd. Industrial Software
Applied Systems Ltd. Industrial Software
 
Demand for Penetration Testing Services.docx
Demand for Penetration Testing Services.docxDemand for Penetration Testing Services.docx
Demand for Penetration Testing Services.docx
 
(SEC310) Keeping Developers and Auditors Happy in the Cloud
(SEC310) Keeping Developers and Auditors Happy in the Cloud(SEC310) Keeping Developers and Auditors Happy in the Cloud
(SEC310) Keeping Developers and Auditors Happy in the Cloud
 
Mobile Enterprise Application Platform
Mobile Enterprise Application PlatformMobile Enterprise Application Platform
Mobile Enterprise Application Platform
 
Introduction to Symantec Endpoint Management75.pptx
Introduction to Symantec Endpoint Management75.pptxIntroduction to Symantec Endpoint Management75.pptx
Introduction to Symantec Endpoint Management75.pptx
 
Guardian analytics vs. actimize 2016
Guardian analytics vs. actimize 2016Guardian analytics vs. actimize 2016
Guardian analytics vs. actimize 2016
 

DS_Sentinel_4pg_031513

  • 1. WHITEHAT SENTINEL SERVICES WEBSITE RISK MANAGEMENT SOLUTIONS Prevent website attacks using the most complete Web security solution for companies of any size. WhiteHat Sentinel, the industry’s leading SaaS application security testing platform, protects some of the largest companies in the world, including leading banks, software companies, online retailers, and consumer products manufacturers. Unlike traditional website scanning software or consultants, WhiteHat Sentinel is the only solution to combine an advanced, cloud-based security platform with a team of security engineers—the WhiteHat Security Threat Research Center (TRC)— who act as a critical extension of your team. This combination helps secure sites in the toughest, most regulated industries across the Web. WhiteHat Security provides solutions to identify and remediate website security vulnerabilities in every stage of the SDLC. HIGHLIGHTS Continuous Assessment Always-on risk assessment delivers: •  Alerts for newly discovered vulnerabilities •  Metrics to identify improvement in security measures over time •  Automatic detection and assessment of code changes to web applications Zero False Positives Verified, prioritized results eliminate false positives and streamlines the remediation process, including: •  Vulnerabilities are custom prioritized by risk – pin-points high priority issues •  Clear actions and notifications for fixing issues •  Eliminate triage of false positives and save valuable developer time and resources Threat Research Center WhiteHat Security Engineers serve as an extension of your own website security team, providing: •  Answers to your vulnerability questions and guidance on remediation •  Active management of your risk posture •  Proof of concepts for vulnerability exploits Trending Analysis Tracks real time and historical data to measure your risk exposure over time. Trending analysis offers: •  At-a-glance view of exposure ratings and progress at closing vulnerabilities •  Comparison of your company’s security profile against other organizations in your industry Scalability •  Customers range from start-ups to the Fortune 500 •  Tens of thousands of simultaneous assessments •  Millions of vulnerabilities processed per week DATA SHEET WHITEHAT SENTINEL SECURITY PLATFORM COVERAGE ACROSS THE SDLC EXPERTISE: Threat Research Center INTELLIGENCE: Security Metrics and Real-Time Reporting ACCESSIBILITY: Anytime / Anywhere via the Internet Sentinel Source Sentinel PL Sentinel BE/SE/PE Sentinel Mobile
  • 2. UNIQUE FEATURES FOR SENTINEL SERVICES Business Logic Testing Sentinel Premium Edition subscribers receive special testing to find business logic vulnerabilities. This service entails: •  Creating a customized testing scheme developed and performed by WhiteHat Security Engineers •  Mapping out your Web application, users, roles, and custom business workflow •  Identifying and validating account privileges across roles and between users •  Prioritizing vulnerabilities based on your business goals and intentions Scanner Configuration and Continuous Tuning Sentinel Services includes assessment customization to ensure that Sentinel properly tests all forms, Ajax/Web 2.0 requests, and Rich Internet Applications, and to maximize scan coverage. This customization is designed to support a production safe assessment-testing environment, including: •  Reviewing Web 2.0, rich Internet applications and Ajax requests •  Monitoring, tuning, and customizing scans to ensure thorough coverage Sentinel Premium Edition (PE) Sentinel Standard Edition (SE) Sentinel Baseline Edition (BE) / BE Enterprise Sentinel PreLaunch (PL) WhiteHat Sentinel Premium Edition (PE) is for permanent websites that are mission-critical, with multi-step forms, and rigorous compliance requirements. All SE features and business logic testing is included. Sentinel SE is for websites that are permanent fixtures, but not necessarily mission- critical. SE tests for and verifies technical vulnerabilities including issues involving multi-step forms and logins. Sentinel BE is the foundational solution that covers all your website assets and protects basic, less-critical sites. BE Enterprise is a massively scalable “best value” solution designed to fit any environment. Sentinel PL provides fast and accurate technical vulnerability assessments specifically designed for preproduction websites, enabling developers to assess and fix code prior to production deployment. WhiteHat Sentinel Service Benefits: Unlimited user accounts and Support Plus Standard is included in all Sentinel subscriptions. Support Plus Silver, Gold, and Platinum are available for an additional fee. Verified, prioritized results eliminate false positives 3 3 3 3 Continuous assessment 3 3 3 3 PCI Compliance 3 3 3 3 Highly scalable across the enterprise 3 3 3 3 Access to WhiteHat Security Engineers 3 3 3 3 Production safe 3 3 3 Scanner configuration and continuous tuning 3 3 3 Business logic testing 3 Proof of concepts for vulnerabilities 3 Multi-level authentication testing 3
  • 3. ACCELERATE REMEDIATION WhiteHat Sentinel delivers a proven, scalable, and affordable enterprise application security platform, accelerating the identification and remediation of Web application security vulnerabilities: •  Sentinel Source directly assesses source code during development to uncover difficult-to-detect vulnerabilities in production, enabling remediation earlier in the development cycle. •  Sentinel PL strengthens Web application security at launch by assessing Web applications and providing remediation guidance in pre-production and staging environments. •  Every Sentinel service includes full vulnerability verification by the TRC, which verifies the accuracy of all vulnerabilities, virtually eliminating false positives and dramatically simplifying remediation. •  Sentinel integration with leading Web application firewalls closes the gap between vulnerability detection and remediation with highly targeted virtual patching. Production Safe As a part of every Sentinel subscription, members of the TRC analyze your Web application inputs, state-changing requests, and any sensitive functionality to customize testing for safety first, then for depth and coverage. Custom tuning of scans permits full coverage without performance impact, including: •  Eliminating any performance degradations—canning payload is equivalent to a single user •  Assuring data integrity—using benign injections in place of live code Sentinel Source Sentinel Mobile WhiteHat Sentinel Source assesses source code directly, giving developers accurate vulnerability data and enabling them to fix code continuously throughout the software development lifecycle (SDLC). Sentinel Mobile enables enterprises to identify and remediate security vulnerabilities in any mobile application across all stages of the Mobile software development life cycle (SDLC). WhiteHat Sentinel Service Benefits: Unlimited user accounts and Support Plus Standard is included in all Sentinel subscriptions. Support Plus Silver, Gold, and Platinum are available for an additional fee. Verified, prioritized vulnerability results eliminate false positives 3 3 Preserves Intellectual Property 3 Detailed vulnerabilities reporting 3 3 Early risk remediation 3 3 Highly scalable across the enterprise 3 Unlimited assessments 3 Ease of use 3 3 Flexible assessment configuration 3 Broad repository support 3
  • 4. WhiteHat Security, Inc. | 3970 Freedom Circle | Santa Clara, CA 95054 408.343.8300 | www.whitehatsec.com Copyright © 2013 WhiteHat Security, Inc. Product names or brands used in this publication are for identification purposes only and may be trademarks of their respective companies. 031513 WHITEHAT CUSTOMER SUPPORT WhiteHat Customer Support Engineers provide enterprise-class software support. You can access customer support by email, phone, or the Customer Support Portal. WhiteHat Support Plus Standard is included with all Sentinel subscriptions. Support Plus Silver, Gold, and Platinum are available at an additional cost. WHITEHAT SENTINEL BENEFITS Unlimited Assessments •  Verification of every vulnerability •  Re-test every vulnerability on demand •  Eliminate trade offs between security and cost with single annual fee Easy to Manage SaaS-Based Platform •  No hardware or scanning software to install •  Eliminate time-intensive configuration and management concerns •  Assess thousands of websites simultaneously Open XML API Integration •  Bug tracking systems •  Security Information and Event Management (SIEM) •  Governance Risk and Compliance (GRC) •  Web Application Firewall (WAF) products Flexible Reports •  Run compliance reports (PCI) at any time •  Communicate your risk profile across the enterprise •  Customize summaries and risk profiles for specific audiences •  Identify trends across multiple web applications PCI Compliance •  WhiteHat Sentinel PE, SE and BE services exceed requirements 6.3.7b, 6.5 and 6.6 of the PCI DSS by providing ongoing, verified vulnerability assessments for both internal and public websites •  WhiteHat Sentinel PE service includes business logic and penetration testing required by PCI DSS 11.3.2. •  WhiteHat Sentinel integration with Web application firewalls (WAFs) supports the creation of virtual patches to fix vulnerabilities while providing the reports needed to pass auditor inspections. Asset Identification and Risk Profiling for the Enterprise •  Rapidly identify all website assets—even sites you didn’t know you had •  Prioritize Web applications based on business risk to your organization •  Gain a comprehensive understanding of potential attacks ABOUT WHITEHAT SECURITY Founded in 2001, and headquartered in Santa Clara, California, WhiteHat Security provides end-to-end solutions for Web security. The company’s cloud technology platform and teams of expert security engineers turn verified security intelligence into actionable insights for customers. Through a combination of core products and strategic partnerships, WhiteHat Security provides complete Web security at a scale unmatched in the industry. WhiteHat Sentinel, the company’s flagship product line, currently manages thousands of websites − including sites of leading companies in the most regulated industries, such as top e-commerce, finance and healthcare organizations.