Optimizing Security in Software Development: Secure at the Source
Aberdeen's research has found that companies leverage three distinct strategies to address the security threats and vulnerabilities that are latent in their currently deployed portfolios of application software: find and fix, defend and defer, and secure at the source. Taking all factors into consideration, should the primary means of achieving secure applications be inspection, additional layers of protection, or prevention? Aberdeen's analysis of companies adopting the secure at the source strategy – i.e., the integration of secure application development tools and practices into the software development lifecycle, to increase the elimination of security vulnerabilities before applications are deployed – found that they realized a very strong return on their annual investments in application security, higher than that of the Industry Average and higher than that of both the find and fix and defend and defer approaches. Although the secure at the source approach is currently the least common to be implemented, Aberdeen's research confirms that it is maturing and transitioning from early adoption to mainstream use.
RecordedOct 13 201134 mins
Your place is confirmed, we'll send you email reminders
James Rabon, Fortify Product Mgr/Security Specialist, HPE and Poonam Yadav, Fortify Product Mgr/Security Specialist, HPE
Is your business challenged with competing priorities and resources when it comes to application security testing and the need for more rapid application development? Are you impacted by costly and cumbersome remediation of security issues? In a world of competing requirements, how can your application security keep up with the rapid pace of development, and still remain effective?
Learn how some of the most advanced and innovative application security customers tackle this problem by:
• Using automation - where modern security tools are being included in the “treat infrastructure as code” mantra
• Making static and dynamic analysis of applications more efficient and effective
• Integrating application security throughout the software development lifecycle (using a DevOps toolchain)
• Gaining visibility and insights into production application behavior and exploits via low-impact Continuous Monitoring
• Protecting security flaws in production to buy time for true remediation
David Harper, Fortify on Demand Practice Principal, EMEA, HPE
Whether a mandate to secure all web and mobile apps comes from a newly enlightened CIO or in response to a major security breach, beginning even a small application security program can be a daunting task. How will you know how many digital assets you have, let alone their risk profile?
In this webinar we will explore how, using a cloud solution like Fortify on Demand, even the largest organizations can begin to scan apps immediately and rapidly scale an application security program. Identify and risk rank assets, fix critical vulnerabilities, and put in place a process to secure all new and existing applications - without hiring a separate security team.
Stan Wisseman, Security Strategist, Security & Information Governance, HPE and Jeff Payne, CEO and Founder, Coveros
Rapid application delivery is dramatically transforming how software is created and delivered, pushing the limits on the speed and innovation required of development teams. If you are wondering how this change in culture, process and operations affects Application Security, you are not alone.
HPE research reveals that while fully mature DevOps programs are rare, well over half of organizations surveyed are implementing key DevOps methodologies such as Automated Testing and Frequent Delivery. And while most agree that this presents an opportunity to integrate Application Security methodologies – that is not the reality. In fact, only 20% of organizations cite Static Testing during the coding process.
Join HPE and Coveros to discuss practical advice that DevOps and Application Security Teams, of any maturity level, can take away from these findings and begin to build a roadmap for building security into every step of the SDLC, from coding through production.
Runtime Application Self-Protection (RASP) is growing in popularity as a scalable solution to protect apps from software vulnerabilities in real-time while providing pan-enterprise visibility. As application security and software development organizations use RASP to accurately and safely mitigate the risk of apps in production, security monitoring groups leverage the technology to gain centralized, real-time visibility into use and abuse. Learn about Application Defender’s signature-less detection strategy and how it integrates with your SIEM.
Nidhi Shah, Lead Researcher, Software Security Research & Sasi Siddharth Muthurajan, Sr Researcher, Applied Security Research
Recent innovations in HPE Security Fortify WebInspect have enabled the automated detection of complex vulnerabilities. Hear about two recently patented technologies—multi-credential audit and login macro analysis—that enable the detection of privilege escalation, weak passwords and inconsistent authentication feedback. See critical issues such as unsafe Java deserialization, reflected file download and XML entity expansion. Learn about these vulnerabilities and ways to use WebInspect to detect them.
Michael Right, Sr Product Manager, Fortify and Emil Kiner, Product Manager, Fortify
As threats evolve, so must application security. HPE Security Fortify continues to create and pioneer new features and functionality to further automate and streamline your app security testing program. Learn about new static scanning advances that align with DevOps requirements. Hear how scan analytics can further enhance and refine advanced auditing processes to increase the relevancy of security scan results.
Scott Johnson, Director of Product Management, Fortify
Application security tools are best used when they are naturally integrated into the SDLC workflow. With integrations spanning all stages of development, deployment and production, the HPE Security Fortify suite uses open APIs to embed application security testing into the development tool chain.
As application security moves into the realm of monitoring and protecting applications in production, it’s becoming even more critical to adopt solutions that are automated, continuous and natural. New technology innovations from HPE Security Fortify enable practitioners to continuously discover, profile and assess application portfolios of all sizes.
Application Defender can provide consistent and centralized logging of application use and abuse to SOCs or others tasked with Security Monitoring. Learn about the Application Logging categories and use cases that will enable you to gain visibility into application activity across the whole enterprise without changing source or parsing logs.
While the value of your information is growing, security threats such as attacks or information theft are making headline news every day and becoming more serious. With SAP and HPE customers investing significantly in mobile solutions, web applications, and customization, it is critical now more than ever to invest in application security solutions.
Did you know?
43% of companies had a data breach in the past 2 years
84% of breaches occur at the application layer
75% of mobile applications fail basic security tests
It is 30x more expensive to fix issues in production than while in project phase
Please join this webinar where our presenter will share the current application security vulnerability situation, common challenges and the approach SAP has taken to ensure application security of its software using HPE Fortify solution.
Coffee Talk with Michael Farnum, Practice Principle at Fortify on Demand
The number of applications has increased considerably and organizations are finding they do not have the time, let alone the expertise and resources, to manage an appsec program. In this Coffee Talk, we will make you aware of options available so you can ensure the applications your business depends on, are secure. HPE Security Fortify on Demand is a managed service that allows your organization to stay on top of security vulnerabilities and the latest threats, without the stressors of doing it all yourself.
Jonathan Griggs, Product Manager for HPE Security WebInspect
The world of web development has evolved and the tactics for securing it have advanced as well. Join Jonathan Griggs, the product manager for HPE Security WebInspect and WebInspect Enterprise, as he covers the concepts and practices around using a dynamic application security testing tool in a modern software security assurance program.
Dr. Larry Ponemon, chairman and founder of the Ponemon Institute
On average, the 58 United States companies participating in the 2015 Cost of Cyber Crime study lost $15 million due to cyber crime, an increase of 19 percent from $12.7 million in last year's study. And other countries are close behind. These are results from the recently completed Ponemon Institute 2015 Cost of Cyber Crime study. You know the risks, but you need the data to plan your defenses and demonstrate the cost of inaction.
For a fuller look at these and other findings from the institute’s study, join Dr. Larry Ponemon, chairman and founder of the Ponemon Institute, to learn:
-What cyber crimes are most common and most costly
-The hidden internal and external costs you incur
-What security defenses are most effective in reducing losses
-How businesses with a strong security posture drive down costs
With cyber crime becoming more frequent and sophisticated, Static Application Security Testing (SAST) is an increasingly vital activity for an organization. Web applications and software are prime targets for hackers. SAST can help organizations find and fix vulnerabilities in their applications not only at testing, but early in the development lifecycle. In this brief, I will discuss how an effective SAST program can not only reduce risk, but also scale and augment other security efforts, saving time and money in the long run.