Application Backdoor Assessment. Complete securing of your applications
|
|
|
- Lesley Stevenson
- 10 years ago
- Views:
Transcription
1 Application Backdoor Assessment Complete securing of your applications
2 Company brief BMS Consulting is established as IT system integrator since 1997 Leading positons in Eastern Europe country Product portfolio IT Security Clouds, Migration and IT Support Business software development Internal processes are certified according to the quility requirements of ISO 9001 international standard 60+ technology partners around the world Our honorable clients: 80+ certified engeneers and consultants 500+ projects in government, industry, banking and telecom sectors
3 200+ Employees 60+ Vendors InfoPulse A part of thepartner Nordic IT group EVRY
4 Application Backdoor Assessment Background Typical application consists from tens of thousands stings of code and each string can contain peace that can behave unpredictable way. There are a lot of reasons for backdoors and vulnerabilities to appear in your software: Human errors Sabotage Government anc competitor s espionage Orginized crime You need to inspect every peace of code to be sure that you application is safe to use. Expecially it relates to software that suffer frequent changes or updates. Brif service description Application backdoor assessment is a special type of source code audit that is directed to insure full code safety. This assessment is based on static analysis of source code with dynamic confirmation of vulnerable or dangerous parts of code. We use as proven automatic tools for static code analysis as manual code inspection by professional application security engineers. Main features More than 80% of possible vulnerabilities can be found and corrected before application go to operation More than 10 different programming languages are supported All vulnerabilities and backdoors fount are been thoroughly inspected through dynamic testing and threat modelling All assessment process is fully controlled by client Who will need it Each company that uses custom developed software (both inhouse and outsourced) All candidates to PCI DSS or ISO compliance Companies that became a target of attack or hacking activities and needs to understand all possible ways of intrusion Companies that deal with sensitive financial or personal information InfoPulse Partner A part of the Nordic IT group EVRY Companies that migrate their software to new platform or in the cloud Everyone who accepts in production IT systems that suffer from custom software changes or updates.
5 Static + dynamic analysis Dynamic Analysis reveals about Static Analysis reveals about Hybrid Analysis reveals about 20% 80% 100% vulnerabilities vulnerabilities vulnerabilities Testing of running application that allows to identify the most obvious vulnerabilities, which real hackers will find first. Application vulnerability scan in the "rest allows to find the most flaws - even those that hacker will not be able to use. Integrated approach means that all static analysis findings go through functional verification. It allows to reveal almost all errors and efficiently plan measures for their remediation and provide the best protection
6 Tools and Standards OWASP Code Review Guide v1.1 OWASP Testing Guide v3 IBM Security AppScan Source / HP Fortify
7 Supported Languages Java JavaScript JSP ColdFusion C, C++, Objective-C NET (C#, ASP.NET and VB.NET) Classic ASP (JavaScript/VBScript) PHP Perl VisualBasic 6 PL/SQL T-SQL SAP ABAP COBOL
8 Project plan Project management: PM[10%] Consultant[30%] Consultant[30%] Consultant[100%] Consultant[20%] Engineer[100%] Engineer[100%] Engineer[30%] Consultant[100%] Preparation Static testing Hybrid testing Dynamic testing Report design Presentation of results Agreement on volume, tools and work area (SOW) Obtaining the necessary permits Getting the initial data Automated source code scanning by tools (static method) Manual inspection of tools results (static method) Application flow analysis (dynamic method) The identification of vulnerable applications Determination of immediate steps to address the most critical vulnerabilities Recommendations to address identified vulnerabilities Presentation of results Coordination of the plan to address identified vulnerabilities
9 Application Backdoor Assessment Project Results Assessment Report that includes : Identified vulnerabilities and backdoors Identified high-priority steps to be done to address the most critical problems List of approved vulnerabilities tested by the auditor Verification that the vulnerability or backdoor can be exploited on running application (in a test environment) Recommendations to address identified problem pieces of code Benefits Very fast results Full confidentiality is guaranteed Detailed recommendations and phone support Follow-up checks are included Free vulnerability scan during 1 year guarantee period Pricing Lines of code Duration, workdays Price, Euro
10 Our competences and experience Our team Several sub teams of professional: Pentesters Developers Software engineers Software testers Security architects Certified CISA, CISSP, CEH Our experience 13 years in CyberSecurity More than 20 software penetration tests More than 100 satisfied customers Deep expertise in Corporate IT Security Oracle SAP Microsoft,Net Java Android Security ios Security Internet banking security BMS strengths Professional teams specialized in many areas Multilingual staff Guaranteed quality Unique approach to project management
11 Thank you for attention! 11
BMS Consulting Cyber Security and IT Technology Team
BMS Consulting Cyber Security and IT Technology Team Cyber Security and IT Technology Team Who we are High professional team from Ukraine which specializes on InfoSec and complex IT projects around the
Application Security Testing Powered by HPE Fortify on Demand. Managed application security testing available on demand
Application Security Testing Powered by HPE Fortify on Demand Managed application security testing available on demand Powered by HPE Fortify on Demand, Sogeti Application security testing is a managed
IBM Security AppScan Source
Source Secure traditional and mobile applications and build secure software with static application security testing Highlights Identify vulnerabilities in your source code, review data and call flows,
Two factor strong authentication. Complex solution for two factor strong authentication
Two factor strong authentication Complex solution for two factor strong authentication Company brief BMS Consulting is established as IT system integrator since 1997 Leading positons in Eastern Europe
Application Performance Management. Java EE.Net, Databases Message Queue Transaction, Web Servers End User Experience
Application Performance Management Java EE.Net, Databases Message Queue Transaction, Web Servers End User Experience InfoPulse A part of the Partner Nordic IT group EVRY Company brief BMS Consulting is
Product Roadmap. Sushant Rao Principal Product Manager Fortify Software, a HP company
Product Roadmap Sushant Rao Principal Product Manager Fortify Software, a HP company Agenda Next Generation of Security Analysis Future Directions 2 Currently under investigation and not guaranteed to
IBM Rational AppScan Source Edition
IBM Software November 2011 IBM Rational AppScan Source Edition Secure applications and build secure software with static application security testing Highlights Identify vulnerabilities in your source
Application Code Development Standards
Application Code Development Standards Overview This document is intended to provide guidance to campus system owners and software developers regarding secure software engineering practices. These standards
Migration from Lotus to Exchange Complex solution for simplify transition
Complex solution for simplify transition InfoPulse A part of the Partner Nordic IT group EVRY Company brief BMS Consulting is established as IT system integrator since 1997 Leading positons in Eastern
SWASCAN ALL in ONE. SWASCAN Web Application SWASCAN Network SWASCAN Code Review
SWASCAN ALL in ONE SWASCAN Web Application SWASCAN Network SWASCAN Code Review SWASCAN at a Glance The first Cloud Suite Security Platform The right way to manage the Security Risk, both for web and mobile
EFFICIENT AND FLEXIBLE SOLUTIONS FOR YOUR SOFTWARE DEVELOPMENT NEEDS
EFFICIENT AND FLEXIBLE SOLUTIONS FOR YOUR SOFTWARE DEVELOPMENT NEEDS Mobile Solutions Windows Phone, ios, Android.Net & C/C++ Java, Scala, Legacy, HTML 5 & Embedded JavaScript Business Analysis Software
Cybernetic Global Intelligence. Service Information Package
Cybernetic Global Intelligence Service Information Package / 2015 Content Who we are Our mission Message from the CEO Our services 01 02 02 03 Managed Security Services Penetration Testing Security Audit
IBM Rational AppScan: Application security and risk management
IBM Software Security November 2011 IBM Rational AppScan: Application security and risk management Identify, prioritize, track and remediate critical security vulnerabilities and compliance demands 2 IBM
Penetration Testing in Romania
Penetration Testing in Romania Adrian Furtunǎ, Ph.D. 11 October 2011 Romanian IT&C Security Forum Agenda About penetration testing Examples Q & A 2 What is penetration testing? Method for evaluating the
Application Security Center overview
Application Security overview Magnus Hillgren Presales HP Software Sweden Fredrik Möller Nordic Manager - Fortify Software HP BTO (Business Technology Optimization) Business outcomes STRATEGY Project &
Testing Solutions to Tackle Application Security Checkpoint Technologies SQGNE. Jimmie Parson Checkpoint Technologies
Testing Solutions to Tackle Application Security Checkpoint Technologies SQGNE Jimmie Parson Checkpoint Technologies Welcome, Introductions Agenda Checkpoint Technologies Quick Corporate Overview Why do
Is your software secure?
Is your software secure? HP Fortify Application Security VII konferencja Secure 2013 Warsaw - October 9, 2013 Gunner Winkenwerder Sales Manager Fortify CEE, Russia & CIS HP Enterprise Security +49 (172)
Andrea Fabrizi. Curriculum Vitae. Date of Birth: 10/04/1983 City of Birth: Anagni, Italy
Curriculum Vitae 1 General Information Name: Andrea Fabrizi Date of Birth: 10/04/1983 City of Birth: Anagni, Italy Place of residence: Luxembourg Phone: Website: www.andreafabrizi.it Email: andrea.fabrizi
InfoSec Academy Application & Secure Code Track
Fundamental Courses Foundational Courses InfoSec Academy Specialized Courses Advanced Courses Certification Preparation Courses Certified Information Systems Security Professional (CISSP) Texas Security
Application Security Testing. Jesper Kråkhede
Application Security Testing Jesper Kråkhede AST 2015-10-22 2 Others call it security and try to avoid it I call it passion and dive right into it Jesper Kråkhede Worked as a security consultant for 17
Testing the Security of your Applications
Home Safeguarding Business Critical Testing the of your Applications Safeguarding business critical systems and applications 2 Safeguarding business critical systems and applications Organizations are
HP Fortify application security
HP Fortify application security Erik Costlow Enterprise Security The problem Cyber attackers are targeting applications Networks Hardware Applications Intellectual Property Security Measures Switch/Router
IBM Rational AppScan: enhancing Web application security and regulatory compliance.
Strategic protection for Web applications To support your business objectives IBM Rational AppScan: enhancing Web application security and regulatory compliance. Are untested Web applications putting your
KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES. www.kaspersky.com
KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES www.kaspersky.com EXPERT SERVICES Expert Services from Kaspersky Lab are exactly that the services of our in-house experts, many of them global
Evolution of Penetration Testing
Alexander Polyakov, QSA,PA-QSA CTO Digital Security (dsec.ru) Head of DSecRG (dsecrg.com) ERPSCAN Architect (erpscan.com) Head of OWASP-EAS Pentests? Again? Why? Many companies are doing this Many companies
Penetration testing & Ethical Hacking. Security Week 2014
Penetration testing & Ethical Hacking Security Week 2014 Agenda Penetration Testing Vulnerability Scanning Social engineering Security Services offered by Endava 2 3 Who I am Catanoi Maxim Information
Keeping your data yours
CORPORATE BROCHURE Keeping your data yours Outpost24 provides state of the art vulnerability management technology and services that simplify the complex security needs of modern businesses. Since 2001,
Hands-On Ethical Hacking and Network Defense - Second Edition Chapter 1. After reading this chapter and completing the exercises, you will be able to:
Objectives After reading this chapter and completing the exercises, you will be able to: Describe the role of an ethical hacker Describe what you can do legally as an ethical hacker Describe what you can
Seven Practical Steps to Delivering More Secure Software. January 2011
Seven Practical Steps to Delivering More Secure Software January 2011 Table of Contents Actions You Can Take Today 3 Delivering More Secure Code: The Seven Steps 4 Step 1: Quick Evaluation and Plan 5 Step
Securing Your Web Application against security vulnerabilities. Ong Khai Wei, IT Specialist, Development Tools (Rational) IBM Software Group
Securing Your Web Application against security vulnerabilities Ong Khai Wei, IT Specialist, Development Tools (Rational) IBM Software Group Agenda Security Landscape Vulnerability Analysis Automated Vulnerability
Contents. Facts. Contact. Company Biography...4. Qualifications & Accolades...5. Executive Leadership Team...6. Products & Services...
Contents Company Biography...4 Qualifications & Accolades...5 Executive Leadership Team...6 Products & Services...8 Company History...10 Facts Founded: 2000 CEO: Brad Caldwell Website: www.securitymetrics.com
VULNERABILITY & COMPLIANCE MANAGEMENT SYSTEM
VULNERABILITY & COMPLIANCE MANAGEMENT SYSTEM 2 REDUCE COSTS. IMPROVE EFFICIENCY. MANAGE RISK. MaxPatrol from Positive Technologies provides visibility and control of security compliance across your entire
A Strategic Approach to Web Application Security The importance of a secure software development lifecycle
A Strategic Approach to Web Application Security The importance of a secure software development lifecycle Rachna Goel Technical Lead Enterprise Technology Web application security is clearly the new frontier
Testing the Security of your Applications
Home Safeguarding Business Critical Testing the of your Applications Safeguarding business critical systems and applications 2 Safeguarding business critical systems and applications Organizations are
Integrated Threat & Security Management.
Integrated Threat & Security Management. SOLUTION OVERVIEW Vulnerability Assessment for Web Applications Fully Automated Web Crawling and Reporting Minimal Website Training or Learning Required Most Accurate
LEARNING CURRICULUM SECURITY COMPASS TRAINING 2015 Q3. Copyright 2015. Security Compass. 1
LEARNING CURRICULUM SECURITY COMPASS TRAINING 2015 Q3 Copyright 2015. Security Compass. 1 CONTENTS WHY SECURITY COMPASS...3 RECOMMENDED LEARNING PATHs...4 TECHNICAL LEARNING PATHS...4 BUSINESS / SUPPORT
Guide to Penetration Testing
What to consider when testing your network HALKYN CONSULTING 06 May 11 T Wake CEH CISSP CISM CEH CISSP CISM Introduction Security breaches are frequently in the news. Rarely does a week go by without a
Black Box versus White Box: Different App Testing Strategies John B. Dickson, CISSP
Black Box versus White Box: Different App Testing Strategies John B. Dickson, CISSP Learning objectives for today s session Understand different types of application assessments and how they differ Be
How To Make Your Software More Secure
SAP Security Concepts and Implementation Source Code Scan Tools Used at SAP Detecting and Eliminating Security Flaws Early On Table of Contents 4 SAP Makes Code Scan Tools for ABAP Programming Language
Решения HP по информационной безопасности
Решения HP по информационной безопасности Евгений Нечитайло [email protected] Mobile: +380 67 464 0218 Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject
Using Free Tools To Test Web Application Security
Using Free Tools To Test Web Application Security Speaker Biography Matt Neely, CISSP, CTGA, GCIH, and GCWN Manager of the Profiling Team at SecureState Areas of expertise: wireless, penetration testing,
HP Application Security Center
HP Application Security Center Web application security across the application lifecycle Solution brief HP Application Security Center helps security professionals, quality assurance (QA) specialists and
HP Fortify Application Security Lucas v. Stockhausen PreSales Manager HP Fortify EMEA [email protected] +49 1520 1898430 Enterprise Security
HP Fortify Application Security Lucas v. Stockhausen PreSales Manager HP Fortify EMEA [email protected] +49 1520 1898430 Enterprise Security The problem Cyber attackers are targeting applications
Digi Device Cloud: Security You Can Trust
Digi Device Cloud: Security You Can Trust Abstract Historically, security has oftentimes been an afterthought or a bolt-on to any engineering product. In today s markets, however, security is taking a
Web Application security testing: who tests the test?
Web Application security testing: who tests the test? Ainārs Galvāns Application Penetration Tester www.exigenservices.lv About myself Functional testing Leading test group Reporting to client Performance
El costo oculto de las aplicaciones Vulnerables. Faustino Sanchez. WW Security Sales Enablement. IBM Canada
El costo oculto de las aplicaciones Vulnerables. Faustino Sanchez. WW Security Sales Enablement. IBM Canada The Traditional Approach is Changing. Security is no longer controlled and enforced through the
WEB APPLICATION VULNERABILITY STATISTICS (2013)
WEB APPLICATION VULNERABILITY STATISTICS (2013) Page 1 CONTENTS Contents 2 1. Introduction 3 2. Research Methodology 4 3. Summary 5 4. Participant Portrait 6 5. Vulnerability Statistics 7 5.1. The most
Security Testing. Vulnerability Assessment vs Penetration Testing. Gabriel Mihai Tanase, Director KPMG Romania. 29 October 2014
Security Testing Vulnerability Assessment vs Penetration Testing Gabriel Mihai Tanase, Director KPMG Romania 29 October 2014 Agenda What is? Vulnerability Assessment Penetration Testing Acting as Conclusion
How Your Current IT Security System Might Be Leaving You Exposed TAKEAWAYS CHALLENGES WHITE PAPER
WHITE PAPER CHALLENGES Protecting company systems and data from costly hacker intrusions Finding tools and training to affordably and effectively enhance IT security Building More Secure Companies (and
The Evolution of Application Monitoring
The Evolution of Application Monitoring Narayan Makaram, CISSP, Director, Solutions Marketing, HP Enterprise Security Business Unit, May 18 th, 2012 Rise of the cyber threat Enterprises and Governments
The Next Generation of Security Leaders
The Next Generation of Security Leaders In an increasingly complex cyber world, there is a growing need for information security leaders who possess the breadth and depth of expertise necessary to establish
Automatic vs. Manual Code Analysis
Automatic vs. Manual Code Analysis 2009-11-17 Ari Kesäniemi Senior Security Architect Nixu Oy [email protected] Copyright The Foundation Permission is granted to copy, distribute and/or modify this
Penetration Testing Services. Demonstrate Real-World Risk
Penetration Testing Services Demonstrate Real-World Risk Penetration Testing Services The best way to know how intruders will actually approach your network is to simulate a real-world attack under controlled
5 Partner Benefits and Requirements... 8 5.1 Benefits... 8 5.2 Requirements... 8
Table of Contents Table of Contents... 2 1 Overview & Presentation... 4 2 Partner Communications... 5 2.1 Partner channels... 5 2.2 Kiuwan Representatives... 5 3 About Kiuwan... 6 4 Partner Types... 7
STATE OF WASHINGTON DEPARTMENT OF SOCIAL AND HEALTH SERVICES P.O. Box 45810, Olympia, Washington 98504 5810. October 21, 2013
STATE OF WASHINGTON DEPARTMENT OF SOCIAL AND HEALTH SERVICES P.O. Box 45810, Olympia, Washington 98504 5810 October 21, 2013 To: RE: All Vendors Request for Information (RFI) The State of Washington, Department
IBM Security AppScan Source for Analysis Version 9.0.3.3. User Guide IBM
IBM Security AppScan Source for Analysis Version 9.0.3.3 User Guide IBM IBM Security AppScan Source for Analysis Version 9.0.3.3 User Guide IBM (C) Copyright IBM Corp. and its licensors 2003, 2016. All
Manual Penetration Testing for ContractPal
Manual Penetration Testing for ContractPal Customer Background ContractPal, Inc. is a SaaS Business Process Outsourcing (BPO) company that has been offering its services and custom applications to a wide
Network Test Labs Inc Security Assessment Service Description Complementary Service Offering for New Clients
Network Test Labs Inc Security Assessment Service Description Complementary Service Offering for New Clients Network Test Labs Inc. Head Office 170 422 Richards Street, Vancouver BC, V6B 2Z4 E-mail: [email protected]
Passing PCI Compliance How to Address the Application Security Mandates
Passing PCI Compliance How to Address the Application Security Mandates The Payment Card Industry Data Security Standards includes several requirements that mandate security at the application layer. These
Hackers are here. Where are you?
1 2 What is EC-Council Certified Security Analyst Licensed Penetration Tester Program You are an ethical hacker. Your last name is Pwned. You dream about enumeration and you can scan networks in your sleep.
The Emergence of the ISO in Community Banking Patrick H. Whelan CISA IT Security & Compliance Consultant
THE MARKET LEADER IN IT, SECURITY AND COMPLIANCE SERVICES FOR COMMUNITY FINANCIAL INSTITUTIONS The Emergence of the ISO in Community Banking Patrick H. Whelan CISA IT Security & Compliance Consultant Agenda
Rational AppScan & Ounce Products
IBM Software Group Rational AppScan & Ounce Products Presenters Tony Sisson and Frank Sassano 2007 IBM Corporation IBM Software Group The Alarming Truth CheckFree warns 5 million customers after hack http://infosecurity.us/?p=5168
IBM Security AppScan Source for Analysis Version 9.0.3.1. User Guide IBM
IBM Security AppScan Source for Analysis Version 9.0.3.1 User Guide IBM IBM Security AppScan Source for Analysis Version 9.0.3.1 User Guide IBM (C) Copyright IBM Corp. and its licensors 2003, 2015. All
Network Test Labs (NTL) Software Testing Services for igaming
Network Test Labs (NTL) Software Testing Services for igaming Led by committed, young and dynamic professionals with extensive expertise and experience of independent testing services, Network Test Labs
w w w. m a l l ate c h n o l o g i e s. c o m. a u
w w w. m a l l ate c h n o l o g i e s. c o m. a u COMPANY PROFILE Registered Name Malla Technologies Pty. Ltd. Trading Name Malla Technologies Australian Company Number (ACN) 163 620 166 Australian Business
White Paper. Automating Your Code Review: Moving to a SaaS Model for Application Security
White Paper Automating Your Code Review: Moving to a SaaS Model for Application Security Contents Overview... 3 Executive Summary... 3 Code Review and Security Analysis Methods... 5 Source Code Review
Pentests more than just using the proper tools
Pentests more than just using the proper tools Agenda 1. Information Security @ TÜV Rheinland 2. Penetration testing Introduction Evaluation scheme Security Analyses of web applications Internal Security
locuz.com Professional Services Security Audit Services
locuz.com Professional Services Security Audit Services Today s Security Landscape Today, over 80% of attacks against a company s network come at the Application Layer not the Network or System layer.
Threat Intelligence Pty Ltd [email protected] 1300 809 437. Specialist Security Training Catalogue
Threat Intelligence Pty Ltd [email protected] 1300 809 437 Specialist Security Training Catalogue Did you know that the faster you detect a security breach, the lesser the impact to the organisation?
1000 Projects later. Security Code Scans at SAP
1000 Projects later Security Code Scans at SAP About Us Ruediger Bachmann is a Development Architect at SAP AG working, as member of the central code analyses team, in the areas application security and
McAfee Database Security. Dan Sarel, VP Database Security Products
McAfee Database Security Dan Sarel, VP Database Security Products Agenda Databases why are they so frail and why most customers Do very little about it? Databases more about the security problem Introducing
Learning objectives for today s session
Black Box versus White Box: Different App Testing Strategies John B. Dickson, CISSP Learning objectives for today s session Understand what a black box and white box assessment is and how they differ Identify
Pentests more than just using the proper tools
Pentests more than just using the proper tools Agenda 1. Information Security @ TÜV Rheinland 2. Security testing 3. Penetration testing Introduction Evaluation scheme Security Analyses of web applications
Redhawk Network Security, LLC 62958 Layton Ave., Suite One, Bend, OR 97701 [email protected] 866-605- 6328 www.redhawksecurity.
Planning Guide for Penetration Testing John Pelley, CISSP, ISSAP, MBCI Long seen as a Payment Card Industry (PCI) best practice, penetration testing has become a requirement for PCI 3.1 effective July
On Demand Penetration Testing Applications Networks Compliance. www.ivizsecurity.com
On Demand Penetration Testing Applications Networks Compliance www.ivizsecurity.com About iviz Security Information Security company with industry s first on-demand penetration testing solution using unique
Acceptance Criteria for Penetration Tests According to PCI DSS
Acceptance Criteria for Penetration Tests According to PCI DSS Requirement 11.3 of the PCI DSS (Version 1.2.1, July 2009) defines the regular performance of penetration tests for all systems in scope as
Why You Need to Test All Your Cloud, Mobile and Web Applications
Why You Need to Test All Your Cloud, Introduction In a recent survey of security executives, more than 70 percent of respondents acknowledged that they are performing vulnerability tests on fewer than
Security-as-a-Service (Sec-aaS) Framework. Service Introduction
Security-as-a-Service (Sec-aaS) Framework Service Introduction Need of Information Security Program In current high-tech environment, we are getting more dependent on information systems. This dependency
AUTOMATED PENETRATION TESTING PRODUCTS
AUTOMATED PENETRATION TESTING PRODUCTS Justification and Return on Investment (ROI) EXECUTIVE SUMMARY This paper will help you justify the need for an automated penetration testing product and demonstrate
EC-Council. Certified Ethical Hacker. Program Brochure
EC-Council C Certified E Ethical Hacker Program Brochure Course Description The (CEH) program is the core of the most desired information security training system any information security professional
