SlideShare a Scribd company logo
a. Seric Systems Ltd, Studio 2004, Abbey Mill Business Centre, Mile End Building, 12 Seedhill Road, Paisley, PA1 1JS.
t. 0141 561 1161 e. info@seric.co.uk w. seric.co.uk tw. @sericsystems
CASE STUDY
PREDICTIVE
ANALYTICS
STORAGE AND
INTEGRATED
SYSTEMS
SOCIAL
BUSINESS AND
COLLABORATION
IT
SECURITY
TRESPASS
Security Vulnerability Scanning
BRIEF
Trespass required a solution which
could scan their website for security
vulnerabilities and ensure that they
were fully compliant with the latest
PCI security standards.
SOLUTION
The Seric solution was IBM Rational
AppScan Standard Edition. AppScan’s
ability to scan a wide range of
applications for security vulnerabilities
with high levels of accuracy,
accompanied by intuitive fix
recommendations, meant that any
security vulnerabilities were resolved
in a timely fashion.
AppScan’s regulatory compliance
reporting templates and console gives
Trespass an enterprise wide visibility
into risks and continuous updates on
remediation progress ensuring
compliance would no longer be
an issue.
OUTCOME
“This solution has dramatically
improved our ability to identify and
correct vulnerabilities on our
e-commerce platforms” Stuart
Melville IT Manager Trespass
“The varying levels of reporting can provide a concise
management view and can easily drill down to a technical
level, which has proved very useful in helping our
developers find the most appropriate response.”
Stuart Melville, IT Manager, Trespass

More Related Content

What's hot

Deploying Secure Modern Apps in Evolving Infrastructures
Deploying Secure Modern Apps in Evolving InfrastructuresDeploying Secure Modern Apps in Evolving Infrastructures
Deploying Secure Modern Apps in Evolving Infrastructures
SBWebinars
 
Operationalize with alerting, custom dashboards, and timelines
Operationalize with alerting, custom dashboards, and timelinesOperationalize with alerting, custom dashboards, and timelines
Operationalize with alerting, custom dashboards, and timelines
Elasticsearch
 
Best practices for automating cloud security processes with Evident.io and AWS
Best practices for automating cloud security processes with Evident.io and AWSBest practices for automating cloud security processes with Evident.io and AWS
Best practices for automating cloud security processes with Evident.io and AWS
Amazon Web Services
 
CyberSecTeam Business Services
CyberSecTeam Business Services CyberSecTeam Business Services
CyberSecTeam Business Services
Ettore Galluccio
 
The DevSecOps Showdown: How to Bridge the Gap Between Security and Developers
The DevSecOps Showdown: How to Bridge the Gap Between Security and DevelopersThe DevSecOps Showdown: How to Bridge the Gap Between Security and Developers
The DevSecOps Showdown: How to Bridge the Gap Between Security and Developers
DevOps.com
 
Palestra de abertura: Evolução e visão do Elastic Security
Palestra de abertura: Evolução e visão do Elastic SecurityPalestra de abertura: Evolução e visão do Elastic Security
Palestra de abertura: Evolução e visão do Elastic Security
Elasticsearch
 
SplunkLive! Customer Presentation--ServiceNow
SplunkLive! Customer Presentation--ServiceNowSplunkLive! Customer Presentation--ServiceNow
SplunkLive! Customer Presentation--ServiceNow
Splunk
 
Splunk Discovery Day Düsseldorf 2016 - Splunk für IT Operations
Splunk Discovery Day Düsseldorf 2016 - Splunk für IT OperationsSplunk Discovery Day Düsseldorf 2016 - Splunk für IT Operations
Splunk Discovery Day Düsseldorf 2016 - Splunk für IT Operations
Splunk
 
Building Elastic into security operations
Building Elastic into security operationsBuilding Elastic into security operations
Building Elastic into security operations
Elasticsearch
 
Application Security Webcast
Application Security WebcastApplication Security Webcast
Application Security Webcast
Vlad Styran
 
SCS DevSecOps Seminar - State of DevSecOps
SCS DevSecOps Seminar - State of DevSecOpsSCS DevSecOps Seminar - State of DevSecOps
SCS DevSecOps Seminar - State of DevSecOps
Stefan Streichsbier
 
Splunk Discovery Day Düsseldorf 2016
Splunk Discovery Day Düsseldorf 2016Splunk Discovery Day Düsseldorf 2016
Splunk Discovery Day Düsseldorf 2016
Splunk
 
A journey from dev ops to devsecops
A journey from dev ops to devsecopsA journey from dev ops to devsecops
A journey from dev ops to devsecops
Veritis Group, Inc
 
Splunk for Monitoring and Diagnostics Breakout Session
Splunk for Monitoring and Diagnostics Breakout SessionSplunk for Monitoring and Diagnostics Breakout Session
Splunk for Monitoring and Diagnostics Breakout Session
Splunk
 
SplunkLive! London 2017 - Building an Analytics Driven Security Operation Cen...
SplunkLive! London 2017 - Building an Analytics Driven Security Operation Cen...SplunkLive! London 2017 - Building an Analytics Driven Security Operation Cen...
SplunkLive! London 2017 - Building an Analytics Driven Security Operation Cen...
Splunk
 
Waratek presentation for RANT November 2016
Waratek presentation for RANT November 2016Waratek presentation for RANT November 2016
Waratek presentation for RANT November 2016
Waratek Ltd
 
Splunk Discovery Day Düsseldorf 2016 - Splunk für Security
Splunk Discovery Day Düsseldorf 2016 - Splunk für SecuritySplunk Discovery Day Düsseldorf 2016 - Splunk für Security
Splunk Discovery Day Düsseldorf 2016 - Splunk für Security
Splunk
 
The State of Automation in Security
The State of Automation in SecurityThe State of Automation in Security
The State of Automation in Security
AlgoSec
 
Waratek Securing Red Hat JBoss from the Inside Out
Waratek Securing Red Hat JBoss from the Inside OutWaratek Securing Red Hat JBoss from the Inside Out
Waratek Securing Red Hat JBoss from the Inside Out
Waratek Ltd
 
How to transform developers into security people
How to transform developers into security peopleHow to transform developers into security people
How to transform developers into security people
Priyanka Aash
 

What's hot (20)

Deploying Secure Modern Apps in Evolving Infrastructures
Deploying Secure Modern Apps in Evolving InfrastructuresDeploying Secure Modern Apps in Evolving Infrastructures
Deploying Secure Modern Apps in Evolving Infrastructures
 
Operationalize with alerting, custom dashboards, and timelines
Operationalize with alerting, custom dashboards, and timelinesOperationalize with alerting, custom dashboards, and timelines
Operationalize with alerting, custom dashboards, and timelines
 
Best practices for automating cloud security processes with Evident.io and AWS
Best practices for automating cloud security processes with Evident.io and AWSBest practices for automating cloud security processes with Evident.io and AWS
Best practices for automating cloud security processes with Evident.io and AWS
 
CyberSecTeam Business Services
CyberSecTeam Business Services CyberSecTeam Business Services
CyberSecTeam Business Services
 
The DevSecOps Showdown: How to Bridge the Gap Between Security and Developers
The DevSecOps Showdown: How to Bridge the Gap Between Security and DevelopersThe DevSecOps Showdown: How to Bridge the Gap Between Security and Developers
The DevSecOps Showdown: How to Bridge the Gap Between Security and Developers
 
Palestra de abertura: Evolução e visão do Elastic Security
Palestra de abertura: Evolução e visão do Elastic SecurityPalestra de abertura: Evolução e visão do Elastic Security
Palestra de abertura: Evolução e visão do Elastic Security
 
SplunkLive! Customer Presentation--ServiceNow
SplunkLive! Customer Presentation--ServiceNowSplunkLive! Customer Presentation--ServiceNow
SplunkLive! Customer Presentation--ServiceNow
 
Splunk Discovery Day Düsseldorf 2016 - Splunk für IT Operations
Splunk Discovery Day Düsseldorf 2016 - Splunk für IT OperationsSplunk Discovery Day Düsseldorf 2016 - Splunk für IT Operations
Splunk Discovery Day Düsseldorf 2016 - Splunk für IT Operations
 
Building Elastic into security operations
Building Elastic into security operationsBuilding Elastic into security operations
Building Elastic into security operations
 
Application Security Webcast
Application Security WebcastApplication Security Webcast
Application Security Webcast
 
SCS DevSecOps Seminar - State of DevSecOps
SCS DevSecOps Seminar - State of DevSecOpsSCS DevSecOps Seminar - State of DevSecOps
SCS DevSecOps Seminar - State of DevSecOps
 
Splunk Discovery Day Düsseldorf 2016
Splunk Discovery Day Düsseldorf 2016Splunk Discovery Day Düsseldorf 2016
Splunk Discovery Day Düsseldorf 2016
 
A journey from dev ops to devsecops
A journey from dev ops to devsecopsA journey from dev ops to devsecops
A journey from dev ops to devsecops
 
Splunk for Monitoring and Diagnostics Breakout Session
Splunk for Monitoring and Diagnostics Breakout SessionSplunk for Monitoring and Diagnostics Breakout Session
Splunk for Monitoring and Diagnostics Breakout Session
 
SplunkLive! London 2017 - Building an Analytics Driven Security Operation Cen...
SplunkLive! London 2017 - Building an Analytics Driven Security Operation Cen...SplunkLive! London 2017 - Building an Analytics Driven Security Operation Cen...
SplunkLive! London 2017 - Building an Analytics Driven Security Operation Cen...
 
Waratek presentation for RANT November 2016
Waratek presentation for RANT November 2016Waratek presentation for RANT November 2016
Waratek presentation for RANT November 2016
 
Splunk Discovery Day Düsseldorf 2016 - Splunk für Security
Splunk Discovery Day Düsseldorf 2016 - Splunk für SecuritySplunk Discovery Day Düsseldorf 2016 - Splunk für Security
Splunk Discovery Day Düsseldorf 2016 - Splunk für Security
 
The State of Automation in Security
The State of Automation in SecurityThe State of Automation in Security
The State of Automation in Security
 
Waratek Securing Red Hat JBoss from the Inside Out
Waratek Securing Red Hat JBoss from the Inside OutWaratek Securing Red Hat JBoss from the Inside Out
Waratek Securing Red Hat JBoss from the Inside Out
 
How to transform developers into security people
How to transform developers into security peopleHow to transform developers into security people
How to transform developers into security people
 

Viewers also liked

The penal code 1860, Presentation
The penal code 1860, PresentationThe penal code 1860, Presentation
The penal code 1860, Presentation
kamrul hasan
 
Ipc presentation
Ipc presentationIpc presentation
Ipc presentation
Sanjana Bharadwaj
 
When the right of private defence of property extends to causing death
When the right of private defence of property extends to causing deathWhen the right of private defence of property extends to causing death
When the right of private defence of property extends to causing death
mukundsarda123
 
Criminal law.power point
Criminal law.power pointCriminal law.power point
Criminal law.power point
VIT LAW SCHOOL,CHENNAI
 
Indian Penal Code - by Alvin Jo caleb
Indian Penal Code - by Alvin Jo calebIndian Penal Code - by Alvin Jo caleb
Indian Penal Code - by Alvin Jo calebSchin Dler
 
General exceptions Indian Penal Code, (S. 76 to 106)
General  exceptions Indian Penal Code, (S. 76 to 106)General  exceptions Indian Penal Code, (S. 76 to 106)
General exceptions Indian Penal Code, (S. 76 to 106)
Dr. Sandeep Kulshrestha
 
The Indian Penal Code.
The Indian Penal Code.The Indian Penal Code.

Viewers also liked (7)

The penal code 1860, Presentation
The penal code 1860, PresentationThe penal code 1860, Presentation
The penal code 1860, Presentation
 
Ipc presentation
Ipc presentationIpc presentation
Ipc presentation
 
When the right of private defence of property extends to causing death
When the right of private defence of property extends to causing deathWhen the right of private defence of property extends to causing death
When the right of private defence of property extends to causing death
 
Criminal law.power point
Criminal law.power pointCriminal law.power point
Criminal law.power point
 
Indian Penal Code - by Alvin Jo caleb
Indian Penal Code - by Alvin Jo calebIndian Penal Code - by Alvin Jo caleb
Indian Penal Code - by Alvin Jo caleb
 
General exceptions Indian Penal Code, (S. 76 to 106)
General  exceptions Indian Penal Code, (S. 76 to 106)General  exceptions Indian Penal Code, (S. 76 to 106)
General exceptions Indian Penal Code, (S. 76 to 106)
 
The Indian Penal Code.
The Indian Penal Code.The Indian Penal Code.
The Indian Penal Code.
 

Similar to Seric case study Trespass Security Appscan

Secure HANA in the Cloud | Mitigating Internal & External Threats | Symmetry™
Secure HANA in the Cloud | Mitigating Internal & External Threats | Symmetry™ Secure HANA in the Cloud | Mitigating Internal & External Threats | Symmetry™
Secure HANA in the Cloud | Mitigating Internal & External Threats | Symmetry™
Symmetry™
 
inSOC Sales Deck Dec 2020.pdf
inSOC Sales Deck Dec 2020.pdfinSOC Sales Deck Dec 2020.pdf
inSOC Sales Deck Dec 2020.pdf
ChristopherSumner7
 
Powering DX & Cloud Workloads into Shape with Dynatrace AI at FLG (Sponsored ...
Powering DX & Cloud Workloads into Shape with Dynatrace AI at FLG (Sponsored ...Powering DX & Cloud Workloads into Shape with Dynatrace AI at FLG (Sponsored ...
Powering DX & Cloud Workloads into Shape with Dynatrace AI at FLG (Sponsored ...
Amazon Web Services
 
Website Security Service.pdf
Website Security Service.pdfWebsite Security Service.pdf
Website Security Service.pdf
Briskinfosec Technology and Consulting
 
Addressing the Cyber-Security Landscape
Addressing the Cyber-Security LandscapeAddressing the Cyber-Security Landscape
Addressing the Cyber-Security Landscape
ePlus
 
Securing 100 products - How hard can it be?
Securing 100 products - How hard can it be?Securing 100 products - How hard can it be?
Securing 100 products - How hard can it be?
Priyanka Aash
 
Qualys Corporate Brochure
Qualys Corporate BrochureQualys Corporate Brochure
Qualys Corporate Brochure
Qualys
 
How to assess the risks in your SAP systems at the push of a button
How to assess the risks in your SAP systems at the push of a buttonHow to assess the risks in your SAP systems at the push of a button
How to assess the risks in your SAP systems at the push of a button
Virtual Forge
 
BMC - Response to the SolarWinds Breach/Malware
BMC - Response to the SolarWinds Breach/MalwareBMC - Response to the SolarWinds Breach/Malware
BMC - Response to the SolarWinds Breach/Malware
Mike Rizzo
 
Streamlining AppSec Policy Definition.pptx
Streamlining AppSec Policy Definition.pptxStreamlining AppSec Policy Definition.pptx
Streamlining AppSec Policy Definition.pptx
tmbainjr131
 
Introduction to Chaos Engineering
Introduction to Chaos EngineeringIntroduction to Chaos Engineering
Introduction to Chaos Engineering
Raymond Adrian (Rad) Butalid
 
Partnership to Capture Indonesia ERP Cloud Trend Opportunities
Partnership to Capture Indonesia ERP Cloud Trend OpportunitiesPartnership to Capture Indonesia ERP Cloud Trend Opportunities
Partnership to Capture Indonesia ERP Cloud Trend Opportunities
Sutedjo Tjahjadi
 
Keeping Up with the ELK Stack: Elasticsearch, Kibana, Beats, and Logstash
Keeping Up with the ELK Stack: Elasticsearch, Kibana, Beats, and LogstashKeeping Up with the ELK Stack: Elasticsearch, Kibana, Beats, and Logstash
Keeping Up with the ELK Stack: Elasticsearch, Kibana, Beats, and Logstash
Amazon Web Services
 
Secure Foundations: Why Red Hat Enterprise Linux is not just another Linux di...
Secure Foundations: Why Red Hat Enterprise Linux is not just another Linux di...Secure Foundations: Why Red Hat Enterprise Linux is not just another Linux di...
Secure Foundations: Why Red Hat Enterprise Linux is not just another Linux di...
Lucy Huh Kerner
 
Tenable Solutions for Enterprise Cloud Security
Tenable Solutions for Enterprise Cloud SecurityTenable Solutions for Enterprise Cloud Security
Tenable Solutions for Enterprise Cloud Security
MarketingArrowECS_CZ
 
FinnOps Busniess profile, AWS , Azure from Finnops
FinnOps Busniess profile, AWS , Azure  from FinnopsFinnOps Busniess profile, AWS , Azure  from Finnops
FinnOps Busniess profile, AWS , Azure from Finnops
najathsl1
 
Democratizing security
Democratizing securityDemocratizing security
Democratizing security
Sanjeev Sharma
 
Synopsys_site.pptx
Synopsys_site.pptxSynopsys_site.pptx
Synopsys_site.pptx
Arthur528009
 
RSA 2021 Navigating the Unknowable: Resilience through Security Chaos Enginee...
RSA 2021 Navigating the Unknowable: Resilience through Security Chaos Enginee...RSA 2021 Navigating the Unknowable: Resilience through Security Chaos Enginee...
RSA 2021 Navigating the Unknowable: Resilience through Security Chaos Enginee...
Aaron Rinehart
 

Similar to Seric case study Trespass Security Appscan (20)

Secure HANA in the Cloud | Mitigating Internal & External Threats | Symmetry™
Secure HANA in the Cloud | Mitigating Internal & External Threats | Symmetry™ Secure HANA in the Cloud | Mitigating Internal & External Threats | Symmetry™
Secure HANA in the Cloud | Mitigating Internal & External Threats | Symmetry™
 
inSOC Sales Deck Dec 2020.pdf
inSOC Sales Deck Dec 2020.pdfinSOC Sales Deck Dec 2020.pdf
inSOC Sales Deck Dec 2020.pdf
 
Powering DX & Cloud Workloads into Shape with Dynatrace AI at FLG (Sponsored ...
Powering DX & Cloud Workloads into Shape with Dynatrace AI at FLG (Sponsored ...Powering DX & Cloud Workloads into Shape with Dynatrace AI at FLG (Sponsored ...
Powering DX & Cloud Workloads into Shape with Dynatrace AI at FLG (Sponsored ...
 
Website Security Service.pdf
Website Security Service.pdfWebsite Security Service.pdf
Website Security Service.pdf
 
Addressing the Cyber-Security Landscape
Addressing the Cyber-Security LandscapeAddressing the Cyber-Security Landscape
Addressing the Cyber-Security Landscape
 
Securing 100 products - How hard can it be?
Securing 100 products - How hard can it be?Securing 100 products - How hard can it be?
Securing 100 products - How hard can it be?
 
Qualys Corporate Brochure
Qualys Corporate BrochureQualys Corporate Brochure
Qualys Corporate Brochure
 
How to assess the risks in your SAP systems at the push of a button
How to assess the risks in your SAP systems at the push of a buttonHow to assess the risks in your SAP systems at the push of a button
How to assess the risks in your SAP systems at the push of a button
 
BMC - Response to the SolarWinds Breach/Malware
BMC - Response to the SolarWinds Breach/MalwareBMC - Response to the SolarWinds Breach/Malware
BMC - Response to the SolarWinds Breach/Malware
 
Streamlining AppSec Policy Definition.pptx
Streamlining AppSec Policy Definition.pptxStreamlining AppSec Policy Definition.pptx
Streamlining AppSec Policy Definition.pptx
 
Introduction to Chaos Engineering
Introduction to Chaos EngineeringIntroduction to Chaos Engineering
Introduction to Chaos Engineering
 
Partnership to Capture Indonesia ERP Cloud Trend Opportunities
Partnership to Capture Indonesia ERP Cloud Trend OpportunitiesPartnership to Capture Indonesia ERP Cloud Trend Opportunities
Partnership to Capture Indonesia ERP Cloud Trend Opportunities
 
Appulse Introduction
Appulse   IntroductionAppulse   Introduction
Appulse Introduction
 
Keeping Up with the ELK Stack: Elasticsearch, Kibana, Beats, and Logstash
Keeping Up with the ELK Stack: Elasticsearch, Kibana, Beats, and LogstashKeeping Up with the ELK Stack: Elasticsearch, Kibana, Beats, and Logstash
Keeping Up with the ELK Stack: Elasticsearch, Kibana, Beats, and Logstash
 
Secure Foundations: Why Red Hat Enterprise Linux is not just another Linux di...
Secure Foundations: Why Red Hat Enterprise Linux is not just another Linux di...Secure Foundations: Why Red Hat Enterprise Linux is not just another Linux di...
Secure Foundations: Why Red Hat Enterprise Linux is not just another Linux di...
 
Tenable Solutions for Enterprise Cloud Security
Tenable Solutions for Enterprise Cloud SecurityTenable Solutions for Enterprise Cloud Security
Tenable Solutions for Enterprise Cloud Security
 
FinnOps Busniess profile, AWS , Azure from Finnops
FinnOps Busniess profile, AWS , Azure  from FinnopsFinnOps Busniess profile, AWS , Azure  from Finnops
FinnOps Busniess profile, AWS , Azure from Finnops
 
Democratizing security
Democratizing securityDemocratizing security
Democratizing security
 
Synopsys_site.pptx
Synopsys_site.pptxSynopsys_site.pptx
Synopsys_site.pptx
 
RSA 2021 Navigating the Unknowable: Resilience through Security Chaos Enginee...
RSA 2021 Navigating the Unknowable: Resilience through Security Chaos Enginee...RSA 2021 Navigating the Unknowable: Resilience through Security Chaos Enginee...
RSA 2021 Navigating the Unknowable: Resilience through Security Chaos Enginee...
 

More from William Macleod

3 ways to reduce Oracle license costs
3 ways to reduce Oracle license costs3 ways to reduce Oracle license costs
3 ways to reduce Oracle license costs
William Macleod
 
Digital Participation
Digital ParticipationDigital Participation
Digital Participation
William Macleod
 
Seric case study Scottish Fire and Rescue Commvault
Seric case study Scottish Fire and Rescue CommvaultSeric case study Scottish Fire and Rescue Commvault
Seric case study Scottish Fire and Rescue Commvault
William Macleod
 
Digital Participation case study
Digital Participation case studyDigital Participation case study
Digital Participation case study
William Macleod
 
Digital Participation infographic
Digital Participation infographicDigital Participation infographic
Digital Participation infographicWilliam Macleod
 
Scottish fire service case study - Data Management
Scottish fire service case study - Data ManagementScottish fire service case study - Data Management
Scottish fire service case study - Data Management
William Macleod
 

More from William Macleod (6)

3 ways to reduce Oracle license costs
3 ways to reduce Oracle license costs3 ways to reduce Oracle license costs
3 ways to reduce Oracle license costs
 
Digital Participation
Digital ParticipationDigital Participation
Digital Participation
 
Seric case study Scottish Fire and Rescue Commvault
Seric case study Scottish Fire and Rescue CommvaultSeric case study Scottish Fire and Rescue Commvault
Seric case study Scottish Fire and Rescue Commvault
 
Digital Participation case study
Digital Participation case studyDigital Participation case study
Digital Participation case study
 
Digital Participation infographic
Digital Participation infographicDigital Participation infographic
Digital Participation infographic
 
Scottish fire service case study - Data Management
Scottish fire service case study - Data ManagementScottish fire service case study - Data Management
Scottish fire service case study - Data Management
 

Seric case study Trespass Security Appscan

  • 1. a. Seric Systems Ltd, Studio 2004, Abbey Mill Business Centre, Mile End Building, 12 Seedhill Road, Paisley, PA1 1JS. t. 0141 561 1161 e. info@seric.co.uk w. seric.co.uk tw. @sericsystems CASE STUDY PREDICTIVE ANALYTICS STORAGE AND INTEGRATED SYSTEMS SOCIAL BUSINESS AND COLLABORATION IT SECURITY TRESPASS Security Vulnerability Scanning BRIEF Trespass required a solution which could scan their website for security vulnerabilities and ensure that they were fully compliant with the latest PCI security standards. SOLUTION The Seric solution was IBM Rational AppScan Standard Edition. AppScan’s ability to scan a wide range of applications for security vulnerabilities with high levels of accuracy, accompanied by intuitive fix recommendations, meant that any security vulnerabilities were resolved in a timely fashion. AppScan’s regulatory compliance reporting templates and console gives Trespass an enterprise wide visibility into risks and continuous updates on remediation progress ensuring compliance would no longer be an issue. OUTCOME “This solution has dramatically improved our ability to identify and correct vulnerabilities on our e-commerce platforms” Stuart Melville IT Manager Trespass “The varying levels of reporting can provide a concise management view and can easily drill down to a technical level, which has proved very useful in helping our developers find the most appropriate response.” Stuart Melville, IT Manager, Trespass