SlideShare a Scribd company logo
1 of 2
Download to read offline
About the Company 
founded in 1999. The Wiredrive team consists of 35 employees and has 
and London. 
The Requirements 
Wiredrive is preparing for SSAE16 compliance and needed a suite of 
tools to validate secure coding best practices. 
Wiredrive’s Enterprise clients required recurring penetration tests and 
static code scans to audit the platform’s security. 
Wiredrive needed an internal solution that integrates with its 
Continuous Integration (CI) SDLC process, which uses Atlassian's 
Bamboo and GIT as the source repository. 
The solution needed to scan a large web application consisting of PHP, 
JavaScript, and Python. 
Wiredrive needed to scan its WordPress plugin and sample code. 
1. 
2. 
3. 
4. 
5. 
The Alternatives 
During the evaluation process, Wiredrive reviewed several open source 
solutions that failed to locate known vulnerabilities. 
Wiredrive asked their Enterprise customers’ security departments for 
security audit recommendations. 
WIREDRIVE 
CHECKMARX’S Case Study 
Overview 
COUNTRY: USA 
INDUSTRY: cloud media 
sharing 
web site: www.wiredrive.com 
PROFILE: Wiredrive is the cloud 
media sharing service of choice for 
the world’s largest advertising, 
entertainment and consumer 
marketing companies. Production, 
sales and marketing teams trust 
Wiredrive to simplify the logistics of 
creativity and securely manage their 
most important media assets. Them 
bring people and media together in 
a shared space where hard work and 
great ideas blossom into amazing 
things. Wiredrive is a fast-growing, 
SOLUTION: Projects - Online 
production, review and approval, and 
integrated campaign management. 
Wiredrive Projects consolidates all of 
your assets into one place that can be 
accessed anywhere, anytime. 
Library - Create video reels and 
multi-media presentations instantly, 
with a myriad of powerful search 
tools, meta-tagging abilities, 
management tools and reporting 
abilities. Used for promotion and new 
business presentations. 
After additional research, Wiredrive realized that the recommended 
security vendors were frequently using Checkmarx. 
When one of Wiredrive's major customers specically 
recommended Checkmarx, they decided to evaluate the product.
The Checkmarx Selection 
Wiredrive found Checkmarx's CxCloud solution 
unknown vulnerability. The test was easy to 
perform because CxCloud integrated directly 
with Github. CxCloud showed the complete 
locations in the code. 
Wiredrive ran their second test to validatetheir 
custom framework, which revealed both known 
and unknown vulnerabilities. Since Checkmarx 
met all evaluation requirements, Wiredrive 
signed up. 
The Implementation 
directly to CxCloud and ran a full scan. The QA 
team grouped the results and prioritized remedi-ation. 
The initial scans found vulnerabilities 
in the deprecated code, which was quickly 
addressed. 
Wiredrive successfully integrated Bamboo 
with the Checkmarx CLI interface with the help 
from the Checkmarx's support team. This let 
vulnerabilities decrease on an ongoing basis. 
Now, Wiredrive runs a full scan on every build to 
make sure that new code adheres to secure 
coding best practices. 
Enterprise customer requirements. 
The Bottom Line 
The sales cycle and product evaluation was simple and straightforward. The Checkmarx team was prompt and 
helpful throughout the entire sales and onboarding cycle. Technologically, the product exposed unknown 
easy to understand. 
Finally, Wiredrive’s Enterprise customers have responded positively by signing up additional departments and 
referring new customers. 
Checkmarx plays a fundamental role in hardening our web application. 
of defense. 
Daniel Bondurant, CTO 
Wiredrive.com

More Related Content

More from Checkmarx

How Virtual Compilation Transforms Static Code Analysis
How Virtual Compilation Transforms Static Code AnalysisHow Virtual Compilation Transforms Static Code Analysis
How Virtual Compilation Transforms Static Code AnalysisCheckmarx
 
A Successful SAST Tool Implementation
A Successful SAST Tool ImplementationA Successful SAST Tool Implementation
A Successful SAST Tool ImplementationCheckmarx
 
Source Code vs. Binary Code Analysis
Source Code vs. Binary Code AnalysisSource Code vs. Binary Code Analysis
Source Code vs. Binary Code AnalysisCheckmarx
 
DevOps & Security: Here & Now
DevOps & Security: Here & NowDevOps & Security: Here & Now
DevOps & Security: Here & NowCheckmarx
 
AppSec How-To: Achieving Security in DevOps
AppSec How-To: Achieving Security in DevOpsAppSec How-To: Achieving Security in DevOps
AppSec How-To: Achieving Security in DevOpsCheckmarx
 
The App Sec How-To: Choosing a SAST Tool
The App Sec How-To: Choosing a SAST ToolThe App Sec How-To: Choosing a SAST Tool
The App Sec How-To: Choosing a SAST ToolCheckmarx
 
The Security State of The Most Popular WordPress Plug-Ins
The Security State of The Most Popular WordPress Plug-InsThe Security State of The Most Popular WordPress Plug-Ins
The Security State of The Most Popular WordPress Plug-InsCheckmarx
 
10 Steps To Secure Agile Development
10 Steps To Secure Agile Development10 Steps To Secure Agile Development
10 Steps To Secure Agile DevelopmentCheckmarx
 
Graph Visualization - OWASP NYC Chapter
Graph Visualization - OWASP NYC ChapterGraph Visualization - OWASP NYC Chapter
Graph Visualization - OWASP NYC ChapterCheckmarx
 
Happy New Year!
Happy New Year!Happy New Year!
Happy New Year!Checkmarx
 

More from Checkmarx (10)

How Virtual Compilation Transforms Static Code Analysis
How Virtual Compilation Transforms Static Code AnalysisHow Virtual Compilation Transforms Static Code Analysis
How Virtual Compilation Transforms Static Code Analysis
 
A Successful SAST Tool Implementation
A Successful SAST Tool ImplementationA Successful SAST Tool Implementation
A Successful SAST Tool Implementation
 
Source Code vs. Binary Code Analysis
Source Code vs. Binary Code AnalysisSource Code vs. Binary Code Analysis
Source Code vs. Binary Code Analysis
 
DevOps & Security: Here & Now
DevOps & Security: Here & NowDevOps & Security: Here & Now
DevOps & Security: Here & Now
 
AppSec How-To: Achieving Security in DevOps
AppSec How-To: Achieving Security in DevOpsAppSec How-To: Achieving Security in DevOps
AppSec How-To: Achieving Security in DevOps
 
The App Sec How-To: Choosing a SAST Tool
The App Sec How-To: Choosing a SAST ToolThe App Sec How-To: Choosing a SAST Tool
The App Sec How-To: Choosing a SAST Tool
 
The Security State of The Most Popular WordPress Plug-Ins
The Security State of The Most Popular WordPress Plug-InsThe Security State of The Most Popular WordPress Plug-Ins
The Security State of The Most Popular WordPress Plug-Ins
 
10 Steps To Secure Agile Development
10 Steps To Secure Agile Development10 Steps To Secure Agile Development
10 Steps To Secure Agile Development
 
Graph Visualization - OWASP NYC Chapter
Graph Visualization - OWASP NYC ChapterGraph Visualization - OWASP NYC Chapter
Graph Visualization - OWASP NYC Chapter
 
Happy New Year!
Happy New Year!Happy New Year!
Happy New Year!
 

Recently uploaded

Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdfChristopherTHyatt
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfhans926745
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 

Recently uploaded (20)

Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 

Wiredrive.com Uses Checkmarx As Its First Line of Defense

  • 1. About the Company founded in 1999. The Wiredrive team consists of 35 employees and has and London. The Requirements Wiredrive is preparing for SSAE16 compliance and needed a suite of tools to validate secure coding best practices. Wiredrive’s Enterprise clients required recurring penetration tests and static code scans to audit the platform’s security. Wiredrive needed an internal solution that integrates with its Continuous Integration (CI) SDLC process, which uses Atlassian's Bamboo and GIT as the source repository. The solution needed to scan a large web application consisting of PHP, JavaScript, and Python. Wiredrive needed to scan its WordPress plugin and sample code. 1. 2. 3. 4. 5. The Alternatives During the evaluation process, Wiredrive reviewed several open source solutions that failed to locate known vulnerabilities. Wiredrive asked their Enterprise customers’ security departments for security audit recommendations. WIREDRIVE CHECKMARX’S Case Study Overview COUNTRY: USA INDUSTRY: cloud media sharing web site: www.wiredrive.com PROFILE: Wiredrive is the cloud media sharing service of choice for the world’s largest advertising, entertainment and consumer marketing companies. Production, sales and marketing teams trust Wiredrive to simplify the logistics of creativity and securely manage their most important media assets. Them bring people and media together in a shared space where hard work and great ideas blossom into amazing things. Wiredrive is a fast-growing, SOLUTION: Projects - Online production, review and approval, and integrated campaign management. Wiredrive Projects consolidates all of your assets into one place that can be accessed anywhere, anytime. Library - Create video reels and multi-media presentations instantly, with a myriad of powerful search tools, meta-tagging abilities, management tools and reporting abilities. Used for promotion and new business presentations. After additional research, Wiredrive realized that the recommended security vendors were frequently using Checkmarx. When one of Wiredrive's major customers specically recommended Checkmarx, they decided to evaluate the product.
  • 2. The Checkmarx Selection Wiredrive found Checkmarx's CxCloud solution unknown vulnerability. The test was easy to perform because CxCloud integrated directly with Github. CxCloud showed the complete locations in the code. Wiredrive ran their second test to validatetheir custom framework, which revealed both known and unknown vulnerabilities. Since Checkmarx met all evaluation requirements, Wiredrive signed up. The Implementation directly to CxCloud and ran a full scan. The QA team grouped the results and prioritized remedi-ation. The initial scans found vulnerabilities in the deprecated code, which was quickly addressed. Wiredrive successfully integrated Bamboo with the Checkmarx CLI interface with the help from the Checkmarx's support team. This let vulnerabilities decrease on an ongoing basis. Now, Wiredrive runs a full scan on every build to make sure that new code adheres to secure coding best practices. Enterprise customer requirements. The Bottom Line The sales cycle and product evaluation was simple and straightforward. The Checkmarx team was prompt and helpful throughout the entire sales and onboarding cycle. Technologically, the product exposed unknown easy to understand. Finally, Wiredrive’s Enterprise customers have responded positively by signing up additional departments and referring new customers. Checkmarx plays a fundamental role in hardening our web application. of defense. Daniel Bondurant, CTO Wiredrive.com