SlideShare a Scribd company logo
PT AI SSDL™
— product brief
PT APPLICATION INSPECTOR SSDL EDITION™
:
BUILDING THE PROCESS OF SECURE DEVELOPMENT
Every field of industry — from financial and manufacturing enterprises to telecoms, IT companies,
media, and government institutions — is increasingly reliant on applications for automation of
daily operations. Official websites, e-commerce and e-banking platforms, workflow and reporting
systems, and many other applications besides are designed to engage with customers, reduce the
effort involved in routine tasks, and jump start efficiency.
However, increased functionality brings additional application complexity, making it harder to fix
critical errors in the software. According to studies by Positive Technologies, as many as 70% of ap-
plications contain high severity vulnerabilities, and 100% are affected by medium severity flaws. Us-
ing the same techniques as hostile hackers, our white-hat experts have demonstrated how these
flaws can be exploited to gain access to corporate networks and confidential user data.
The main culprits behind these high levels of software flaws are insufficiently mature information
security processes, lack of security awareness, and the absence of convenient tools for developers
and IS services. These failings mean security audits happen rarely (if at all), and are typically left until
the applications are ready to launch. But patching flaws at this stage is far more expensive than
resolving them during the design and development phases.
PT Application Inspector SSDL Edition™
(PT AI SSDL™
) is an advanced Application Security Testing
solution that addresses the needs of the whole enterprise to resolve these problems. With transpar-
ent integration into existing development processes and tools, plus business intelligence features
for management reporting and data analytics, PT AI SSDL™
fosters an AppSec-aware culture and
supports high quality code testing at all stages of the application lifecycle.
BUSINESS BENEFITS
­­ Enhance software quality
levels. The secure software
development lifecycle (SSDL)
supports the creation of high
quality and sustainable ap-
plications. PT AI SSDL™
helps
organizations to implement
SSDL in both workflows and
corporate culture.
­­ Reduce development costs.
Automated vulnerability de-
tection and elimination saves
human resources, time, and
most importantly reduces
costs.
­­ Mitigate risk and damage.
Detecting and eliminating
vulnerabilities at every stage
of development dramatically
reduces the amount of errors
and the costs of patching.
This lowers risk and improves
usability which, in turn, en-
courages user loyalty.
­­ Drive operational effi-
ciency. PT AI SSDL™
helps
developers to develop more
secure software without be-
ing security experts, reducing
the need for narrow profile
specialists and encouraging
teamwork with smooth busi-
ness processes.
­­ Manage compliance with
regulatory requirements.
Many standards bodies now
require app developers to
detect and fix vulnerabilities
before they can achieve
certification. PT AI SSDL™
manages compliance with
the requirements of PA DSS,
PCI DSS and many other
leading standards.
HOW IT WORKS
At the heart of PT AI SSDL™
lies an advanced testing approach that combines the advantages of stat-
ic (SAST), dynamic (DAST), and interactive code analysis (IAST), and which has proven its efficiency
in PT AI Desktop Edition™
. The use of multiple testing technologies means application security can
remain a priority throughout all development stages — from the very first line of code to applica-
tion go-live.
The distinguishing feature of PT AI SSDL™
is its flexible integration with corporate IT infrastructure
and development and security tools such as Version Control Systems (VCS), Bug Trackers, Integrat-
ed Development Environments (IDE) and Continuous Integration (CI)/Build systems. Control panels
that are adjustable to a specific process, and graphic interfaces especially designed for separate
user roles support the implementation of SSDL processes from the ground up.
Positive Technologies experts are ready to provide methodological and practical assistance if
needed.
Developer: Java, C#, PHP
IS specialist: web console
Auditor: report
PT AI SSDL™
— product brief
PT-AI-SSDL_PB_A4.ENG.0001.02
INFORMTION SECURITY
BENEFITS
­­ Wide coverage and in-
depth analysis. PT AI SSDL™
has an embedded database
of software vulnerabilities
and third-party libraries.
Configuration verification
capabilities also ensure web
server settings are safe.
­­ Automated vulnerability
assessment. PT AI SSDL™
automatically generates
“exploits”— the most secure
test queries that demon-
strate exactly how hackers
could use each vulnerability
to attack an application.
These requests help in con-
firming vulnerabilities, creat-
ing tasks to fix the code and
following them up.
­­ Continuous protection.
Many large-scale compa-
nies employ PT Application
Inspector™
alongside
PT Application Firewall™
.
Exploits generated by PT AI™
allow the firewall to create
virtual patches and quickly
protect applications while
vulnerabilities are being
fixed.
­­ Simplified code acceptance.
PT AI SSDL™
is suitable for
rapid analysis of third party
or modified code. This dras-
tically reduces application
security testing expenses, as
there is no need for manual
operations.
DEVELOPMENT BENEFITS
The best interface is no interface. Developers interact with PT AI SSDL™
via fine-tuned develop-
ment tools and the source code itself. Seamless integration with version control systems allows
developers to transfer finished code for further analysis and view the results without leaving their
familiar IDE and bug tracking systems. This enables continuous integration and delivery. Devel-
opers don’t have to learn or access additional consoles or become distracted by outside systems.
All detected problems and remediation recommendations can be found as an annotation to the
source code.
PT AI SSDL™
: A SOLUTION FOR THE ENTIRE TEAM
­­ Role-based access control (RBAC). Each group of users (developers, security managers, au-
ditors, and administrators) is granted a suitable level of access to data and interacts with PT AI
SSDL™
via an interface that is relevant to their particular role.
­­ Analytics and business intelligence. Using PT AI SSDL™
, analysts can perform both qualita-
tive and quantitative code security assessments, discover trends, check theories, and perform
benchmarking between several projects. For their part, security managers and auditors are
able to measure the KPIs of the development process and control team efficiency.
­­ Flexible reporting and notifications. Every team member receives notifications and reports
that are tailored to their role. This functionality is powered by the PT AI SSDL™
query builder
that retrieves data based on a query, a schedule, or as a response to a certain event. Reports
are displayed in the control panel or sent by email.
­­ Manufacturer independence. PT AI SSDL™
adapts to the unique requirements of each or-
ganization or project without any need to submit frequent feature or change requests to the
vendor. New releases of PT AI SSDL™
will retain custom changes and ensure backward com-
patibility.
Microsoft Visual Studio IDE and code annotation with a detected vulnerability
info@ptsecurity.com ptsecurity.com
About Positive Technologies
Positive Technologies is a leading global provider of enterprise security solutions for vulnerability and
compliance management, incident and threat analysis, and application protection. Commitment to clients
and research has earned Positive Technologies a reputation as one of the foremost authorities on Industrial
Control System, Banking, Telecom, Web Application, and ERP security, supported by recognition from the
analyst community. Learn more about Positive Technologies at ptsecurity.com.
© 2016 Positive Technologies. Positive Technologies and the Positive Technologies logo are trademarks or registered trademarks of Positive
Technologies. All other trademarks mentioned herein are the property of their respective owners.

More Related Content

What's hot

Secure Software Development Life Cycle
Secure Software Development Life CycleSecure Software Development Life Cycle
Secure Software Development Life Cycle
Maurice Dawson
 
Veritas Resiliency Platform
Veritas Resiliency PlatformVeritas Resiliency Platform
Veritas Resiliency Platform
Symantec
 
Security Development Lifecycle Tools
Security Development Lifecycle ToolsSecurity Development Lifecycle Tools
Security Development Lifecycle Tools
n|u - The Open Security Community
 
Validy netinc nsa_ops1_ops2_executive summary
Validy netinc nsa_ops1_ops2_executive summaryValidy netinc nsa_ops1_ops2_executive summary
Validy netinc nsa_ops1_ops2_executive summaryGilles Sgro
 
Secure Code review - Veracode SaaS Platform - Saudi Green Method
Secure Code review - Veracode SaaS Platform - Saudi Green MethodSecure Code review - Veracode SaaS Platform - Saudi Green Method
Secure Code review - Veracode SaaS Platform - Saudi Green Method
Salil Kumar Subramony
 
Building an AppSec Team Extended Cut
Building an AppSec Team Extended CutBuilding an AppSec Team Extended Cut
Building an AppSec Team Extended CutMike Spaulding
 
六合彩香港-六合彩
六合彩香港-六合彩六合彩香港-六合彩
六合彩香港-六合彩
baoyin
 
OWASP - Building Secure Web Applications
OWASP - Building Secure Web ApplicationsOWASP - Building Secure Web Applications
OWASP - Building Secure Web Applications
alexbe
 
What’s making way for secure sdlc
What’s making way for secure sdlcWhat’s making way for secure sdlc
What’s making way for secure sdlc
Avancercorp
 
24may 1200 valday eric anklesaria 'secure sdlc – core banking'
24may 1200 valday eric anklesaria 'secure sdlc – core banking'24may 1200 valday eric anklesaria 'secure sdlc – core banking'
24may 1200 valday eric anklesaria 'secure sdlc – core banking'Positive Hack Days
 
CompTIA PenTest+: Everything you need to know about the exam
CompTIA PenTest+: Everything you need to know about the examCompTIA PenTest+: Everything you need to know about the exam
CompTIA PenTest+: Everything you need to know about the exam
Infosec
 
Application Security Management with ThreadFix
Application Security Management with ThreadFixApplication Security Management with ThreadFix
Application Security Management with ThreadFix
Virtual Forge
 
Arved sandstrom - the rotwithin - atlseccon2011
Arved sandstrom - the rotwithin - atlseccon2011Arved sandstrom - the rotwithin - atlseccon2011
Arved sandstrom - the rotwithin - atlseccon2011
Atlantic Security Conference
 
Information Security and the SDLC
Information Security and the SDLCInformation Security and the SDLC
A successful application security program - Envision build and scale
A successful application security program - Envision build and scaleA successful application security program - Envision build and scale
A successful application security program - Envision build and scale
Priyanka Aash
 
CSSLP & OWASP & WebGoat
CSSLP & OWASP & WebGoatCSSLP & OWASP & WebGoat
CSSLP & OWASP & WebGoat
Surachai Chatchalermpun
 
Thinking of choosing Trend Micro?
Thinking of choosing Trend Micro?Thinking of choosing Trend Micro?
Thinking of choosing Trend Micro?
Symantec
 
The Web AppSec How-To: The Defender's Toolbox
The Web AppSec How-To: The Defender's ToolboxThe Web AppSec How-To: The Defender's Toolbox
The Web AppSec How-To: The Defender's Toolbox
Checkmarx
 
Software risk management
Software risk managementSoftware risk management
Software risk management
Jose Javier M
 
Sumeet Mandloi: Robust Security Testing Framework
Sumeet Mandloi: Robust Security Testing FrameworkSumeet Mandloi: Robust Security Testing Framework
Sumeet Mandloi: Robust Security Testing Framework
Anna Royzman
 

What's hot (20)

Secure Software Development Life Cycle
Secure Software Development Life CycleSecure Software Development Life Cycle
Secure Software Development Life Cycle
 
Veritas Resiliency Platform
Veritas Resiliency PlatformVeritas Resiliency Platform
Veritas Resiliency Platform
 
Security Development Lifecycle Tools
Security Development Lifecycle ToolsSecurity Development Lifecycle Tools
Security Development Lifecycle Tools
 
Validy netinc nsa_ops1_ops2_executive summary
Validy netinc nsa_ops1_ops2_executive summaryValidy netinc nsa_ops1_ops2_executive summary
Validy netinc nsa_ops1_ops2_executive summary
 
Secure Code review - Veracode SaaS Platform - Saudi Green Method
Secure Code review - Veracode SaaS Platform - Saudi Green MethodSecure Code review - Veracode SaaS Platform - Saudi Green Method
Secure Code review - Veracode SaaS Platform - Saudi Green Method
 
Building an AppSec Team Extended Cut
Building an AppSec Team Extended CutBuilding an AppSec Team Extended Cut
Building an AppSec Team Extended Cut
 
六合彩香港-六合彩
六合彩香港-六合彩六合彩香港-六合彩
六合彩香港-六合彩
 
OWASP - Building Secure Web Applications
OWASP - Building Secure Web ApplicationsOWASP - Building Secure Web Applications
OWASP - Building Secure Web Applications
 
What’s making way for secure sdlc
What’s making way for secure sdlcWhat’s making way for secure sdlc
What’s making way for secure sdlc
 
24may 1200 valday eric anklesaria 'secure sdlc – core banking'
24may 1200 valday eric anklesaria 'secure sdlc – core banking'24may 1200 valday eric anklesaria 'secure sdlc – core banking'
24may 1200 valday eric anklesaria 'secure sdlc – core banking'
 
CompTIA PenTest+: Everything you need to know about the exam
CompTIA PenTest+: Everything you need to know about the examCompTIA PenTest+: Everything you need to know about the exam
CompTIA PenTest+: Everything you need to know about the exam
 
Application Security Management with ThreadFix
Application Security Management with ThreadFixApplication Security Management with ThreadFix
Application Security Management with ThreadFix
 
Arved sandstrom - the rotwithin - atlseccon2011
Arved sandstrom - the rotwithin - atlseccon2011Arved sandstrom - the rotwithin - atlseccon2011
Arved sandstrom - the rotwithin - atlseccon2011
 
Information Security and the SDLC
Information Security and the SDLCInformation Security and the SDLC
Information Security and the SDLC
 
A successful application security program - Envision build and scale
A successful application security program - Envision build and scaleA successful application security program - Envision build and scale
A successful application security program - Envision build and scale
 
CSSLP & OWASP & WebGoat
CSSLP & OWASP & WebGoatCSSLP & OWASP & WebGoat
CSSLP & OWASP & WebGoat
 
Thinking of choosing Trend Micro?
Thinking of choosing Trend Micro?Thinking of choosing Trend Micro?
Thinking of choosing Trend Micro?
 
The Web AppSec How-To: The Defender's Toolbox
The Web AppSec How-To: The Defender's ToolboxThe Web AppSec How-To: The Defender's Toolbox
The Web AppSec How-To: The Defender's Toolbox
 
Software risk management
Software risk managementSoftware risk management
Software risk management
 
Sumeet Mandloi: Robust Security Testing Framework
Sumeet Mandloi: Robust Security Testing FrameworkSumeet Mandloi: Robust Security Testing Framework
Sumeet Mandloi: Robust Security Testing Framework
 

Viewers also liked

PT Application Inspector SSDL Edition листовка
PT Application Inspector SSDL Edition листовкаPT Application Inspector SSDL Edition листовка
PT Application Inspector SSDL Edition листовка
Valery Boronin
 
Base wars roblox highest gamers
Base wars roblox highest gamersBase wars roblox highest gamers
Base wars roblox highest gamers
imatrooper123
 
Текстовый контент интернет-магазинов: примеры и рекомендации
Текстовый контент интернет-магазинов: примеры и рекомендацииТекстовый контент интернет-магазинов: примеры и рекомендации
Текстовый контент интернет-магазинов: примеры и рекомендацииUTLab
 
Ilitia Gallo Resume
Ilitia Gallo ResumeIlitia Gallo Resume
Ilitia Gallo ResumeLee Gallo
 
La tierra nuestro hogar
La tierra nuestro hogarLa tierra nuestro hogar
La tierra nuestro hogarGira ......
 
Dubai Family Tour Package 2012-13
Dubai Family Tour Package 2012-13Dubai Family Tour Package 2012-13
Dubai Family Tour Package 2012-13
Shahrukh Hussain
 
AWS Customer Presentation-MyTaxi
AWS Customer Presentation-MyTaxiAWS Customer Presentation-MyTaxi
AWS Customer Presentation-MyTaxiAmazon Web Services
 
Virus
VirusVirus
Actividades de Aprendizaje 8
Actividades de Aprendizaje 8Actividades de Aprendizaje 8
Actividades de Aprendizaje 8
Kimberly Berrocal Condor
 
Trabajo pràctico nº 1(agos y mari)
Trabajo pràctico nº 1(agos y mari)Trabajo pràctico nº 1(agos y mari)
Trabajo pràctico nº 1(agos y mari)Maga Albornoz
 
Determine quanto do seu código é testado com Code Coverage
Determine quanto do seu código é testado com Code CoverageDetermine quanto do seu código é testado com Code Coverage
Determine quanto do seu código é testado com Code Coverage
Thiago Meuser
 
Особенности продвижения интернет-магазинов
Особенности продвижения интернет-магазиновОсобенности продвижения интернет-магазинов
Особенности продвижения интернет-магазиновUTLab
 
REG Child Health Working Group Meeting 26/09/15
REG Child Health Working Group Meeting 26/09/15REG Child Health Working Group Meeting 26/09/15
REG Child Health Working Group Meeting 26/09/15
Zoe Mitchell
 
Global Economics Update - December 2015
Global Economics Update - December 2015Global Economics Update - December 2015
Global Economics Update - December 2015
Jim Laird, CFA, CPA, CMA
 
Ivanova s biznesna100_motivaciya_na_100_a_gde_j
Ivanova s biznesna100_motivaciya_na_100_a_gde_jIvanova s biznesna100_motivaciya_na_100_a_gde_j
Ivanova s biznesna100_motivaciya_na_100_a_gde_j
Татьяна Матвиенко
 
RDSDataSource: App Thinning
RDSDataSource: App ThinningRDSDataSource: App Thinning
RDSDataSource: App Thinning
RAMBLER&Co
 

Viewers also liked (19)

PT Application Inspector SSDL Edition листовка
PT Application Inspector SSDL Edition листовкаPT Application Inspector SSDL Edition листовка
PT Application Inspector SSDL Edition листовка
 
Base wars roblox highest gamers
Base wars roblox highest gamersBase wars roblox highest gamers
Base wars roblox highest gamers
 
Текстовый контент интернет-магазинов: примеры и рекомендации
Текстовый контент интернет-магазинов: примеры и рекомендацииТекстовый контент интернет-магазинов: примеры и рекомендации
Текстовый контент интернет-магазинов: примеры и рекомендации
 
Ilitia Gallo Resume
Ilitia Gallo ResumeIlitia Gallo Resume
Ilitia Gallo Resume
 
La tierra nuestro hogar
La tierra nuestro hogarLa tierra nuestro hogar
La tierra nuestro hogar
 
Dubai Family Tour Package 2012-13
Dubai Family Tour Package 2012-13Dubai Family Tour Package 2012-13
Dubai Family Tour Package 2012-13
 
AWS Customer Presentation-MyTaxi
AWS Customer Presentation-MyTaxiAWS Customer Presentation-MyTaxi
AWS Customer Presentation-MyTaxi
 
raktim hazarika resume
raktim  hazarika resumeraktim  hazarika resume
raktim hazarika resume
 
Virus
VirusVirus
Virus
 
Cuadro comparativo
Cuadro comparativoCuadro comparativo
Cuadro comparativo
 
Actividades de Aprendizaje 8
Actividades de Aprendizaje 8Actividades de Aprendizaje 8
Actividades de Aprendizaje 8
 
Trabajo pràctico nº 1(agos y mari)
Trabajo pràctico nº 1(agos y mari)Trabajo pràctico nº 1(agos y mari)
Trabajo pràctico nº 1(agos y mari)
 
Determine quanto do seu código é testado com Code Coverage
Determine quanto do seu código é testado com Code CoverageDetermine quanto do seu código é testado com Code Coverage
Determine quanto do seu código é testado com Code Coverage
 
Особенности продвижения интернет-магазинов
Особенности продвижения интернет-магазиновОсобенности продвижения интернет-магазинов
Особенности продвижения интернет-магазинов
 
Acompañanos
AcompañanosAcompañanos
Acompañanos
 
REG Child Health Working Group Meeting 26/09/15
REG Child Health Working Group Meeting 26/09/15REG Child Health Working Group Meeting 26/09/15
REG Child Health Working Group Meeting 26/09/15
 
Global Economics Update - December 2015
Global Economics Update - December 2015Global Economics Update - December 2015
Global Economics Update - December 2015
 
Ivanova s biznesna100_motivaciya_na_100_a_gde_j
Ivanova s biznesna100_motivaciya_na_100_a_gde_jIvanova s biznesna100_motivaciya_na_100_a_gde_j
Ivanova s biznesna100_motivaciya_na_100_a_gde_j
 
RDSDataSource: App Thinning
RDSDataSource: App ThinningRDSDataSource: App Thinning
RDSDataSource: App Thinning
 

Similar to PT Application Inspector SSDL Edition product brief

Rhea corporate presentation v2
Rhea corporate presentation v2Rhea corporate presentation v2
Rhea corporate presentation v2
Mark Adam
 
DS_Sentinel_4pg_031513
DS_Sentinel_4pg_031513DS_Sentinel_4pg_031513
DS_Sentinel_4pg_031513Tiffeny Price
 
Enhancing Testing Workflows The Role of Regression Automation.pdf
Enhancing Testing Workflows The Role of Regression Automation.pdfEnhancing Testing Workflows The Role of Regression Automation.pdf
Enhancing Testing Workflows The Role of Regression Automation.pdf
RohitBhandari66
 
Security is our duty and we shall deliver it - White Paper
Security is our duty and we shall deliver it - White PaperSecurity is our duty and we shall deliver it - White Paper
Security is our duty and we shall deliver it - White Paper
Mohd Anwar Jamal Faiz
 
Core.co.enterprise.deck.06.16.10
Core.co.enterprise.deck.06.16.10Core.co.enterprise.deck.06.16.10
Core.co.enterprise.deck.06.16.10
Core Security Technologies
 
Introduction to CAST HIGHLIGHT - Rapid Application Portfolio Analysis
Introduction to CAST HIGHLIGHT - Rapid Application Portfolio AnalysisIntroduction to CAST HIGHLIGHT - Rapid Application Portfolio Analysis
Introduction to CAST HIGHLIGHT - Rapid Application Portfolio Analysis
CAST
 
CAST for Vendor Monitoring and Control
CAST for Vendor Monitoring and ControlCAST for Vendor Monitoring and Control
CAST for Vendor Monitoring and Control
CAST
 
Selecting an App Security Testing Partner: An eGuide
Selecting an App Security Testing Partner: An eGuideSelecting an App Security Testing Partner: An eGuide
Selecting an App Security Testing Partner: An eGuide
HCLSoftware
 
Procuring an Application Security Testing Partner
Procuring an Application Security Testing PartnerProcuring an Application Security Testing Partner
Procuring an Application Security Testing Partner
HCLSoftware
 
Expert Compliance Solutions by Ispectra Technologies.pptx
Expert Compliance Solutions by Ispectra Technologies.pptxExpert Compliance Solutions by Ispectra Technologies.pptx
Expert Compliance Solutions by Ispectra Technologies.pptx
kathyzink87
 
Accelerite Sentient Executive Briefing
Accelerite Sentient Executive BriefingAccelerite Sentient Executive Briefing
Accelerite Sentient Executive Briefing
Accelerite
 
IndySoft Leaflet
IndySoft LeafletIndySoft Leaflet
IndySoft LeafletJake Bishop
 
The Significance of Regression Testing in Software Development.pdf
The Significance of Regression Testing in Software Development.pdfThe Significance of Regression Testing in Software Development.pdf
The Significance of Regression Testing in Software Development.pdf
RohitBhandari66
 
Ajith H N-Profile
Ajith H N-ProfileAjith H N-Profile
Ajith H N-ProfileAjith H N
 
Fortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptxFortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptx
YoisRoberthTapiadeLa
 
Fortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptxFortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptx
VictoriaChavesta
 
Managing Compliance
Managing ComplianceManaging Compliance
Managing Compliance
SecPod Technologies
 
HMI/SCADA 리스크 감소
HMI/SCADA 리스크 감소HMI/SCADA 리스크 감소
HMI/SCADA 리스크 감소
GE코리아
 
10 things to get right for successful dev secops
10 things to get right for successful dev secops10 things to get right for successful dev secops
10 things to get right for successful dev secops
Mohammed Ahmed
 
Level Up Web App Security: Start Your Free Trial of HCL AppScan Source
Level Up Web App Security: Start Your Free Trial of HCL AppScan SourceLevel Up Web App Security: Start Your Free Trial of HCL AppScan Source
Level Up Web App Security: Start Your Free Trial of HCL AppScan Source
HCLSoftware
 

Similar to PT Application Inspector SSDL Edition product brief (20)

Rhea corporate presentation v2
Rhea corporate presentation v2Rhea corporate presentation v2
Rhea corporate presentation v2
 
DS_Sentinel_4pg_031513
DS_Sentinel_4pg_031513DS_Sentinel_4pg_031513
DS_Sentinel_4pg_031513
 
Enhancing Testing Workflows The Role of Regression Automation.pdf
Enhancing Testing Workflows The Role of Regression Automation.pdfEnhancing Testing Workflows The Role of Regression Automation.pdf
Enhancing Testing Workflows The Role of Regression Automation.pdf
 
Security is our duty and we shall deliver it - White Paper
Security is our duty and we shall deliver it - White PaperSecurity is our duty and we shall deliver it - White Paper
Security is our duty and we shall deliver it - White Paper
 
Core.co.enterprise.deck.06.16.10
Core.co.enterprise.deck.06.16.10Core.co.enterprise.deck.06.16.10
Core.co.enterprise.deck.06.16.10
 
Introduction to CAST HIGHLIGHT - Rapid Application Portfolio Analysis
Introduction to CAST HIGHLIGHT - Rapid Application Portfolio AnalysisIntroduction to CAST HIGHLIGHT - Rapid Application Portfolio Analysis
Introduction to CAST HIGHLIGHT - Rapid Application Portfolio Analysis
 
CAST for Vendor Monitoring and Control
CAST for Vendor Monitoring and ControlCAST for Vendor Monitoring and Control
CAST for Vendor Monitoring and Control
 
Selecting an App Security Testing Partner: An eGuide
Selecting an App Security Testing Partner: An eGuideSelecting an App Security Testing Partner: An eGuide
Selecting an App Security Testing Partner: An eGuide
 
Procuring an Application Security Testing Partner
Procuring an Application Security Testing PartnerProcuring an Application Security Testing Partner
Procuring an Application Security Testing Partner
 
Expert Compliance Solutions by Ispectra Technologies.pptx
Expert Compliance Solutions by Ispectra Technologies.pptxExpert Compliance Solutions by Ispectra Technologies.pptx
Expert Compliance Solutions by Ispectra Technologies.pptx
 
Accelerite Sentient Executive Briefing
Accelerite Sentient Executive BriefingAccelerite Sentient Executive Briefing
Accelerite Sentient Executive Briefing
 
IndySoft Leaflet
IndySoft LeafletIndySoft Leaflet
IndySoft Leaflet
 
The Significance of Regression Testing in Software Development.pdf
The Significance of Regression Testing in Software Development.pdfThe Significance of Regression Testing in Software Development.pdf
The Significance of Regression Testing in Software Development.pdf
 
Ajith H N-Profile
Ajith H N-ProfileAjith H N-Profile
Ajith H N-Profile
 
Fortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptxFortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptx
 
Fortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptxFortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptx
 
Managing Compliance
Managing ComplianceManaging Compliance
Managing Compliance
 
HMI/SCADA 리스크 감소
HMI/SCADA 리스크 감소HMI/SCADA 리스크 감소
HMI/SCADA 리스크 감소
 
10 things to get right for successful dev secops
10 things to get right for successful dev secops10 things to get right for successful dev secops
10 things to get right for successful dev secops
 
Level Up Web App Security: Start Your Free Trial of HCL AppScan Source
Level Up Web App Security: Start Your Free Trial of HCL AppScan SourceLevel Up Web App Security: Start Your Free Trial of HCL AppScan Source
Level Up Web App Security: Start Your Free Trial of HCL AppScan Source
 

More from Valery Boronin

Тренды кибербезопасности, угрозы и вызовы в 2018 году
Тренды кибербезопасности, угрозы и вызовы в 2018 годуТренды кибербезопасности, угрозы и вызовы в 2018 году
Тренды кибербезопасности, угрозы и вызовы в 2018 году
Valery Boronin
 
SecDevOps. Разработка, DevOps и безопасность.
SecDevOps. Разработка, DevOps и безопасность.SecDevOps. Разработка, DevOps и безопасность.
SecDevOps. Разработка, DevOps и безопасность.
Valery Boronin
 
Практика оформления проекта и презентаций
Практика оформления проекта и презентацийПрактика оформления проекта и презентаций
Практика оформления проекта и презентаций
Valery Boronin
 
SDL/SSDL для руководителей
SDL/SSDL для руководителейSDL/SSDL для руководителей
SDL/SSDL для руководителей
Valery Boronin
 
Application Inspector SSDL Edition product
Application Inspector SSDL Edition productApplication Inspector SSDL Edition product
Application Inspector SSDL Edition product
Valery Boronin
 
Построение процесса безопасной разработки - Стачка 2016
Построение процесса безопасной разработки - Стачка 2016Построение процесса безопасной разработки - Стачка 2016
Построение процесса безопасной разработки - Стачка 2016
Valery Boronin
 
Valery Boronin on DLP Russia 2010
Valery Boronin on DLP Russia 2010Valery Boronin on DLP Russia 2010
Valery Boronin on DLP Russia 2010
Valery Boronin
 
Humans Are The Weakest Link – How DLP Can Help
Humans Are The Weakest Link – How DLP Can HelpHumans Are The Weakest Link – How DLP Can Help
Humans Are The Weakest Link – How DLP Can Help
Valery Boronin
 
Data Luxury Protection - защита данных с удовольствием!
Data Luxury Protection - защита данных с удовольствием!Data Luxury Protection - защита данных с удовольствием!
Data Luxury Protection - защита данных с удовольствием!
Valery Boronin
 

More from Valery Boronin (9)

Тренды кибербезопасности, угрозы и вызовы в 2018 году
Тренды кибербезопасности, угрозы и вызовы в 2018 годуТренды кибербезопасности, угрозы и вызовы в 2018 году
Тренды кибербезопасности, угрозы и вызовы в 2018 году
 
SecDevOps. Разработка, DevOps и безопасность.
SecDevOps. Разработка, DevOps и безопасность.SecDevOps. Разработка, DevOps и безопасность.
SecDevOps. Разработка, DevOps и безопасность.
 
Практика оформления проекта и презентаций
Практика оформления проекта и презентацийПрактика оформления проекта и презентаций
Практика оформления проекта и презентаций
 
SDL/SSDL для руководителей
SDL/SSDL для руководителейSDL/SSDL для руководителей
SDL/SSDL для руководителей
 
Application Inspector SSDL Edition product
Application Inspector SSDL Edition productApplication Inspector SSDL Edition product
Application Inspector SSDL Edition product
 
Построение процесса безопасной разработки - Стачка 2016
Построение процесса безопасной разработки - Стачка 2016Построение процесса безопасной разработки - Стачка 2016
Построение процесса безопасной разработки - Стачка 2016
 
Valery Boronin on DLP Russia 2010
Valery Boronin on DLP Russia 2010Valery Boronin on DLP Russia 2010
Valery Boronin on DLP Russia 2010
 
Humans Are The Weakest Link – How DLP Can Help
Humans Are The Weakest Link – How DLP Can HelpHumans Are The Weakest Link – How DLP Can Help
Humans Are The Weakest Link – How DLP Can Help
 
Data Luxury Protection - защита данных с удовольствием!
Data Luxury Protection - защита данных с удовольствием!Data Luxury Protection - защита данных с удовольствием!
Data Luxury Protection - защита данных с удовольствием!
 

Recently uploaded

BoxLang: Review our Visionary Licenses of 2024
BoxLang: Review our Visionary Licenses of 2024BoxLang: Review our Visionary Licenses of 2024
BoxLang: Review our Visionary Licenses of 2024
Ortus Solutions, Corp
 
First Steps with Globus Compute Multi-User Endpoints
First Steps with Globus Compute Multi-User EndpointsFirst Steps with Globus Compute Multi-User Endpoints
First Steps with Globus Compute Multi-User Endpoints
Globus
 
Understanding Globus Data Transfers with NetSage
Understanding Globus Data Transfers with NetSageUnderstanding Globus Data Transfers with NetSage
Understanding Globus Data Transfers with NetSage
Globus
 
Dominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdf
Dominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdfDominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdf
Dominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdf
AMB-Review
 
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...
Globus
 
Lecture 1 Introduction to games development
Lecture 1 Introduction to games developmentLecture 1 Introduction to games development
Lecture 1 Introduction to games development
abdulrafaychaudhry
 
Into the Box 2024 - Keynote Day 2 Slides.pdf
Into the Box 2024 - Keynote Day 2 Slides.pdfInto the Box 2024 - Keynote Day 2 Slides.pdf
Into the Box 2024 - Keynote Day 2 Slides.pdf
Ortus Solutions, Corp
 
How Does XfilesPro Ensure Security While Sharing Documents in Salesforce?
How Does XfilesPro Ensure Security While Sharing Documents in Salesforce?How Does XfilesPro Ensure Security While Sharing Documents in Salesforce?
How Does XfilesPro Ensure Security While Sharing Documents in Salesforce?
XfilesPro
 
Enhancing Research Orchestration Capabilities at ORNL.pdf
Enhancing Research Orchestration Capabilities at ORNL.pdfEnhancing Research Orchestration Capabilities at ORNL.pdf
Enhancing Research Orchestration Capabilities at ORNL.pdf
Globus
 
How Recreation Management Software Can Streamline Your Operations.pptx
How Recreation Management Software Can Streamline Your Operations.pptxHow Recreation Management Software Can Streamline Your Operations.pptx
How Recreation Management Software Can Streamline Your Operations.pptx
wottaspaceseo
 
top nidhi software solution freedownload
top nidhi software solution freedownloadtop nidhi software solution freedownload
top nidhi software solution freedownload
vrstrong314
 
How to Position Your Globus Data Portal for Success Ten Good Practices
How to Position Your Globus Data Portal for Success Ten Good PracticesHow to Position Your Globus Data Portal for Success Ten Good Practices
How to Position Your Globus Data Portal for Success Ten Good Practices
Globus
 
Globus Compute Introduction - GlobusWorld 2024
Globus Compute Introduction - GlobusWorld 2024Globus Compute Introduction - GlobusWorld 2024
Globus Compute Introduction - GlobusWorld 2024
Globus
 
Developing Distributed High-performance Computing Capabilities of an Open Sci...
Developing Distributed High-performance Computing Capabilities of an Open Sci...Developing Distributed High-performance Computing Capabilities of an Open Sci...
Developing Distributed High-performance Computing Capabilities of an Open Sci...
Globus
 
Exploring Innovations in Data Repository Solutions - Insights from the U.S. G...
Exploring Innovations in Data Repository Solutions - Insights from the U.S. G...Exploring Innovations in Data Repository Solutions - Insights from the U.S. G...
Exploring Innovations in Data Repository Solutions - Insights from the U.S. G...
Globus
 
GlobusWorld 2024 Opening Keynote session
GlobusWorld 2024 Opening Keynote sessionGlobusWorld 2024 Opening Keynote session
GlobusWorld 2024 Opening Keynote session
Globus
 
2024 RoOUG Security model for the cloud.pptx
2024 RoOUG Security model for the cloud.pptx2024 RoOUG Security model for the cloud.pptx
2024 RoOUG Security model for the cloud.pptx
Georgi Kodinov
 
Providing Globus Services to Users of JASMIN for Environmental Data Analysis
Providing Globus Services to Users of JASMIN for Environmental Data AnalysisProviding Globus Services to Users of JASMIN for Environmental Data Analysis
Providing Globus Services to Users of JASMIN for Environmental Data Analysis
Globus
 
Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...
Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...
Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...
Globus
 
Large Language Models and the End of Programming
Large Language Models and the End of ProgrammingLarge Language Models and the End of Programming
Large Language Models and the End of Programming
Matt Welsh
 

Recently uploaded (20)

BoxLang: Review our Visionary Licenses of 2024
BoxLang: Review our Visionary Licenses of 2024BoxLang: Review our Visionary Licenses of 2024
BoxLang: Review our Visionary Licenses of 2024
 
First Steps with Globus Compute Multi-User Endpoints
First Steps with Globus Compute Multi-User EndpointsFirst Steps with Globus Compute Multi-User Endpoints
First Steps with Globus Compute Multi-User Endpoints
 
Understanding Globus Data Transfers with NetSage
Understanding Globus Data Transfers with NetSageUnderstanding Globus Data Transfers with NetSage
Understanding Globus Data Transfers with NetSage
 
Dominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdf
Dominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdfDominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdf
Dominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdf
 
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...
 
Lecture 1 Introduction to games development
Lecture 1 Introduction to games developmentLecture 1 Introduction to games development
Lecture 1 Introduction to games development
 
Into the Box 2024 - Keynote Day 2 Slides.pdf
Into the Box 2024 - Keynote Day 2 Slides.pdfInto the Box 2024 - Keynote Day 2 Slides.pdf
Into the Box 2024 - Keynote Day 2 Slides.pdf
 
How Does XfilesPro Ensure Security While Sharing Documents in Salesforce?
How Does XfilesPro Ensure Security While Sharing Documents in Salesforce?How Does XfilesPro Ensure Security While Sharing Documents in Salesforce?
How Does XfilesPro Ensure Security While Sharing Documents in Salesforce?
 
Enhancing Research Orchestration Capabilities at ORNL.pdf
Enhancing Research Orchestration Capabilities at ORNL.pdfEnhancing Research Orchestration Capabilities at ORNL.pdf
Enhancing Research Orchestration Capabilities at ORNL.pdf
 
How Recreation Management Software Can Streamline Your Operations.pptx
How Recreation Management Software Can Streamline Your Operations.pptxHow Recreation Management Software Can Streamline Your Operations.pptx
How Recreation Management Software Can Streamline Your Operations.pptx
 
top nidhi software solution freedownload
top nidhi software solution freedownloadtop nidhi software solution freedownload
top nidhi software solution freedownload
 
How to Position Your Globus Data Portal for Success Ten Good Practices
How to Position Your Globus Data Portal for Success Ten Good PracticesHow to Position Your Globus Data Portal for Success Ten Good Practices
How to Position Your Globus Data Portal for Success Ten Good Practices
 
Globus Compute Introduction - GlobusWorld 2024
Globus Compute Introduction - GlobusWorld 2024Globus Compute Introduction - GlobusWorld 2024
Globus Compute Introduction - GlobusWorld 2024
 
Developing Distributed High-performance Computing Capabilities of an Open Sci...
Developing Distributed High-performance Computing Capabilities of an Open Sci...Developing Distributed High-performance Computing Capabilities of an Open Sci...
Developing Distributed High-performance Computing Capabilities of an Open Sci...
 
Exploring Innovations in Data Repository Solutions - Insights from the U.S. G...
Exploring Innovations in Data Repository Solutions - Insights from the U.S. G...Exploring Innovations in Data Repository Solutions - Insights from the U.S. G...
Exploring Innovations in Data Repository Solutions - Insights from the U.S. G...
 
GlobusWorld 2024 Opening Keynote session
GlobusWorld 2024 Opening Keynote sessionGlobusWorld 2024 Opening Keynote session
GlobusWorld 2024 Opening Keynote session
 
2024 RoOUG Security model for the cloud.pptx
2024 RoOUG Security model for the cloud.pptx2024 RoOUG Security model for the cloud.pptx
2024 RoOUG Security model for the cloud.pptx
 
Providing Globus Services to Users of JASMIN for Environmental Data Analysis
Providing Globus Services to Users of JASMIN for Environmental Data AnalysisProviding Globus Services to Users of JASMIN for Environmental Data Analysis
Providing Globus Services to Users of JASMIN for Environmental Data Analysis
 
Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...
Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...
Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...
 
Large Language Models and the End of Programming
Large Language Models and the End of ProgrammingLarge Language Models and the End of Programming
Large Language Models and the End of Programming
 

PT Application Inspector SSDL Edition product brief

  • 1. PT AI SSDL™ — product brief PT APPLICATION INSPECTOR SSDL EDITION™ : BUILDING THE PROCESS OF SECURE DEVELOPMENT Every field of industry — from financial and manufacturing enterprises to telecoms, IT companies, media, and government institutions — is increasingly reliant on applications for automation of daily operations. Official websites, e-commerce and e-banking platforms, workflow and reporting systems, and many other applications besides are designed to engage with customers, reduce the effort involved in routine tasks, and jump start efficiency. However, increased functionality brings additional application complexity, making it harder to fix critical errors in the software. According to studies by Positive Technologies, as many as 70% of ap- plications contain high severity vulnerabilities, and 100% are affected by medium severity flaws. Us- ing the same techniques as hostile hackers, our white-hat experts have demonstrated how these flaws can be exploited to gain access to corporate networks and confidential user data. The main culprits behind these high levels of software flaws are insufficiently mature information security processes, lack of security awareness, and the absence of convenient tools for developers and IS services. These failings mean security audits happen rarely (if at all), and are typically left until the applications are ready to launch. But patching flaws at this stage is far more expensive than resolving them during the design and development phases. PT Application Inspector SSDL Edition™ (PT AI SSDL™ ) is an advanced Application Security Testing solution that addresses the needs of the whole enterprise to resolve these problems. With transpar- ent integration into existing development processes and tools, plus business intelligence features for management reporting and data analytics, PT AI SSDL™ fosters an AppSec-aware culture and supports high quality code testing at all stages of the application lifecycle. BUSINESS BENEFITS ­­ Enhance software quality levels. The secure software development lifecycle (SSDL) supports the creation of high quality and sustainable ap- plications. PT AI SSDL™ helps organizations to implement SSDL in both workflows and corporate culture. ­­ Reduce development costs. Automated vulnerability de- tection and elimination saves human resources, time, and most importantly reduces costs. ­­ Mitigate risk and damage. Detecting and eliminating vulnerabilities at every stage of development dramatically reduces the amount of errors and the costs of patching. This lowers risk and improves usability which, in turn, en- courages user loyalty. ­­ Drive operational effi- ciency. PT AI SSDL™ helps developers to develop more secure software without be- ing security experts, reducing the need for narrow profile specialists and encouraging teamwork with smooth busi- ness processes. ­­ Manage compliance with regulatory requirements. Many standards bodies now require app developers to detect and fix vulnerabilities before they can achieve certification. PT AI SSDL™ manages compliance with the requirements of PA DSS, PCI DSS and many other leading standards. HOW IT WORKS At the heart of PT AI SSDL™ lies an advanced testing approach that combines the advantages of stat- ic (SAST), dynamic (DAST), and interactive code analysis (IAST), and which has proven its efficiency in PT AI Desktop Edition™ . The use of multiple testing technologies means application security can remain a priority throughout all development stages — from the very first line of code to applica- tion go-live. The distinguishing feature of PT AI SSDL™ is its flexible integration with corporate IT infrastructure and development and security tools such as Version Control Systems (VCS), Bug Trackers, Integrat- ed Development Environments (IDE) and Continuous Integration (CI)/Build systems. Control panels that are adjustable to a specific process, and graphic interfaces especially designed for separate user roles support the implementation of SSDL processes from the ground up. Positive Technologies experts are ready to provide methodological and practical assistance if needed. Developer: Java, C#, PHP IS specialist: web console Auditor: report
  • 2. PT AI SSDL™ — product brief PT-AI-SSDL_PB_A4.ENG.0001.02 INFORMTION SECURITY BENEFITS ­­ Wide coverage and in- depth analysis. PT AI SSDL™ has an embedded database of software vulnerabilities and third-party libraries. Configuration verification capabilities also ensure web server settings are safe. ­­ Automated vulnerability assessment. PT AI SSDL™ automatically generates “exploits”— the most secure test queries that demon- strate exactly how hackers could use each vulnerability to attack an application. These requests help in con- firming vulnerabilities, creat- ing tasks to fix the code and following them up. ­­ Continuous protection. Many large-scale compa- nies employ PT Application Inspector™ alongside PT Application Firewall™ . Exploits generated by PT AI™ allow the firewall to create virtual patches and quickly protect applications while vulnerabilities are being fixed. ­­ Simplified code acceptance. PT AI SSDL™ is suitable for rapid analysis of third party or modified code. This dras- tically reduces application security testing expenses, as there is no need for manual operations. DEVELOPMENT BENEFITS The best interface is no interface. Developers interact with PT AI SSDL™ via fine-tuned develop- ment tools and the source code itself. Seamless integration with version control systems allows developers to transfer finished code for further analysis and view the results without leaving their familiar IDE and bug tracking systems. This enables continuous integration and delivery. Devel- opers don’t have to learn or access additional consoles or become distracted by outside systems. All detected problems and remediation recommendations can be found as an annotation to the source code. PT AI SSDL™ : A SOLUTION FOR THE ENTIRE TEAM ­­ Role-based access control (RBAC). Each group of users (developers, security managers, au- ditors, and administrators) is granted a suitable level of access to data and interacts with PT AI SSDL™ via an interface that is relevant to their particular role. ­­ Analytics and business intelligence. Using PT AI SSDL™ , analysts can perform both qualita- tive and quantitative code security assessments, discover trends, check theories, and perform benchmarking between several projects. For their part, security managers and auditors are able to measure the KPIs of the development process and control team efficiency. ­­ Flexible reporting and notifications. Every team member receives notifications and reports that are tailored to their role. This functionality is powered by the PT AI SSDL™ query builder that retrieves data based on a query, a schedule, or as a response to a certain event. Reports are displayed in the control panel or sent by email. ­­ Manufacturer independence. PT AI SSDL™ adapts to the unique requirements of each or- ganization or project without any need to submit frequent feature or change requests to the vendor. New releases of PT AI SSDL™ will retain custom changes and ensure backward com- patibility. Microsoft Visual Studio IDE and code annotation with a detected vulnerability info@ptsecurity.com ptsecurity.com About Positive Technologies Positive Technologies is a leading global provider of enterprise security solutions for vulnerability and compliance management, incident and threat analysis, and application protection. Commitment to clients and research has earned Positive Technologies a reputation as one of the foremost authorities on Industrial Control System, Banking, Telecom, Web Application, and ERP security, supported by recognition from the analyst community. Learn more about Positive Technologies at ptsecurity.com. © 2016 Positive Technologies. Positive Technologies and the Positive Technologies logo are trademarks or registered trademarks of Positive Technologies. All other trademarks mentioned herein are the property of their respective owners.