Product Roadmap. Sushant Rao Principal Product Manager Fortify Software, a HP company



Similar documents
Is your software secure?

HP Fortify application security

IBM Rational AppScan Source Edition

Application Code Development Standards

Application Backdoor Assessment. Complete securing of your applications

HP ESP Partner Enablement Fortify Proof of Concept Boot Camp Training

IBM Security AppScan Source

HP Fortify Software Security Center

Real-time hybrid analysis:

IMPROVING VULNERABILITY MANAGEMENT EFFECTIVENESS WITH APPLICATION SECURITY MONITORING

Application Security Center overview

Application Security Testing Powered by HPE Fortify on Demand. Managed application security testing available on demand

From the Bottom to the Top: The Evolution of Application Monitoring

Testing Solutions to Tackle Application Security Checkpoint Technologies SQGNE. Jimmie Parson Checkpoint Technologies

1000 Projects later. Security Code Scans at SAP

Continuous???? Copyright 2015 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.

What s New in HP Fortify Software Security Center 4.20

IBM Rational AppScan: Application security and risk management

Braindumps.C questions

HP Fortify Application Security Lucas v. Stockhausen PreSales Manager HP Fortify EMEA Enterprise Security

Automatic vs. Manual Code Analysis

Bringing Security Testing to Development. How to Enable Developers to Act as Security Experts

Release 1. ICAPRG604A Create cloud computing services

HP Application Security Center

What s New in HP Fortify Software Security Center 4.30 and HP WebInspect Products

Complete Assessment Catalog

Track and Keynote/Session Title 9:00:00 AM Keynote 11g Database Development Java Track Database Apex Track.Net Track. 09:30:00 AM with Oracle and

BEST WEB PROGRAMMING LANGUAGES TO LEARN ON YOUR OWN TIME

HP Fortify Software Security Center v3.70 System Requirements. HP Fortify Software Licenses. HP Fortify Software Security Center Server Requirements

HP Fortify Software Security Center v3.60 System Requirements. HP Fortify Software Licenses. HP Fortify Software Security Center Server Requirements

TOOL EVALUATION REPORT: FORTIFY

SOFTWARE TESTING TRAINING COURSES CONTENTS

Passing PCI Compliance How to Address the Application Security Mandates

How To Protect Your Data From Attack

Improving your Secure SDLC ( SSDLC ) with Prevoty. How adding real-time application security dramatically decreases vulnerabilities

Web 2.0 Technology Overview. Lecture 8 GSL Peru 2014

Your Technology Partner Offshore and Onsite. Services Portfolio

Integrating Application Security into the Mobile Software Development Lifecycle. WhiteHat Security Paper

Inputsoft Business Software & Consulting. Learn more at

Hybrid Analysis Mapping: Making Security and Development Tools Play Nice Together. Dan Cornell. CTO, Denim

How To Work For Hanodale

Building Assurance Into Software Development Life- Cycle (SDLC)

Emaml.NET ASP.NET Server Control for ArcIMS

Introduction to Oracle Mobile Application Framework Raghu Srinivasan, Director Development Mobile and Cloud Development Tools Oracle

Welcome to the Force.com Developer Day

NSFOCUS Web Vulnerability Scanning System

TEAM Academy Catalog. 187 Ballardvale Street, Wilmington, MA

Fortify Training Services. Securing Your Entire Software Portfolio FRAMEWORK*SSA

How To Develop A System For A Car Dealership

Web Pages. Static Web Pages SHTML

STATE OF WASHINGTON DEPARTMENT OF SOCIAL AND HEALTH SERVICES P.O. Box 45810, Olympia, Washington October 21, 2013

CIM Courses for Creating Web Pages

Magic Quadrant for Static Application Security Testing

Development Testing for Agile Environments

RIA SECURITY TECHNOLOGY

Software Development Interactief Centrum voor gerichte Training en Studie Edisonweg 14c, 1821 BN Alkmaar T:

Java/J2EE or Web Developer. Formal Education. Technical knowledge. Spoken Languages

ANDROID DEVELOPER RESUME USA

Pivot Charting in SharePoint with Nevron Chart for SharePoint

capabilities statement

HP Fortify Static Code Analyzer

Adobe Systems Incorporated

Security Products Development. Leon Juranic

Senior Oracle Developer Call us today to schedule this resource. CORP: (214) CENDIEN

Your Technology Partner Offshore and Onsite. Outsourced Software Development Services at

The Top Web Application Attacks: Are you vulnerable?

HP ESP 2013 Solution Roadmap

The Evolution of Application Monitoring

Deepak Patil (Technical Director) iasys Technologies Pvt. Ltd.

Managing Your Application Security Program with the ThreadFix Ecosystem!! Dan

Functional UI testing of Adobe Flex RIA. Viktor Gamov August,

Solution Showcase Session. Enterprise 2.0 Computing Services

COMPUTER SCIENCE (AS) Associate Degree, Certificate of Achievement & Department Certificate Programs

Sabre Red Apps. Developer Toolkit Overview. October 2014

Education. Relevant Courses

HP CloudSystem Enterprise

WebGoat for testing your Application Security tools

SWASCAN ALL in ONE. SWASCAN Web Application SWASCAN Network SWASCAN Code Review

BarTender Integration Methods. Integrating BarTender s Printing and Design Functionality with Your Custom Application WHITE PAPER

QA Tools (QTP, QC/ALM), Selenium with Java, Mobile with Automation, Unix, SQL, SOAP UI

ASP &.NET. Microsoft's Solution for Dynamic Web Development. Mohammad Ali Choudhry Milad Armeen Husain Zeerapurwala Campbell Ma Seul Kee Yoon

Interactive Application Security Testing (IAST)

Application Services Mobile Apps Development ERP Implementation and Support Testing Services HR & Management Consultancy

Threat Modeling. Categorizing the nature and severity of system vulnerabilities. John B. Dickson, CISSP

Development. Resilient Software. Secure and. Mark S. Merkow Lakshmikanth Raghavan. CRC Press. Taylor& Francis Croup. Taylor St Francis Group,

ASSOCIATE IN ARTS DEGREE-60 UNITS

The Evolution of Enterprise Application Security. Why enterprises need runtime application self-protection

Transcription:

Product Roadmap Sushant Rao Principal Product Manager Fortify Software, a HP company

Agenda Next Generation of Security Analysis Future Directions 2 Currently under investigation and not guaranteed to be included in future releases

Next Generation of Security Analysis 3

A Key Element in SSA is Security Testing Which is the best Security Testing Methodology? 4

Dynamic Testing Dynamic Testing identifies Exploits What are the root-cause vulnerabilities of these exploits?

Dynamic Testing Pros & Cons Advantages Concrete prioritization of results Tests deployment environment Disadvantages Little insight into root cause Limited by functional coverage 6

Static Testing Which vulnerabilities are accessible from the outside? Static Testing Comprehensively Identifies Vulnerabilities in Code

Static Testing Pros & Cons Advantages Comprehensive results Source-level details Disadvantages Exploits are difficult to provide Prioritization difficult 8

Hybrid Technology Correlates Exploits with Vulnerabilities Dynamic SQL Injection result Static SQL injection result Code

Challenge of Hybrid 1.0 Technology Correlating URLs (DAST) with Source Code (SAST) is difficult!

Problems With Hybrid 1.0 Inaccurate Inefficient Ineffective Correlation is difficult DAST provides URL, but SAST provides code-level data flow Securing applications become very time and resource intensive No clear benefits to current approach As a result, users don t bother doing Hybrid Security Testing 11

Need a way to correlate Dynamic & Static testing Introducing RAST for Intelligent Correlation Observe actual attacks Sidestep security controls Obfuscation Encryption

RAST is the key to correlation URL: www.sales.company. com File: NewClass.cs Line: 27 File: NewClass.cs Line: 27 ID: 234 ID: 234 Source Code: <java.sql.connection.xxx>

Introducing Hybrid 2.0 Technology = + +

Fortify Hybrid 2.0 Technology Correlation Engine (Fortify 360 Server)

Hybrid 2.0 Technology Directly links more vulnerabilities Code

Hybrid 2.0 Technology Correlation re-prioritizes riskier issues Code

Hybrid 2.0 Technology Direct dynamic testing Code

Deploying Hybrid 2.0 Step 1: Implement A Security Gate Security acceptance testing Development Fortify Gate Production Hybrid 2.0 Static Analysis Dynamic Analysis Run-Time Analysis

Fortify Security Gate with Hybrid 2.0 Monitor in Production Fortify Gate Pass Defend Fail Defend in Production Defend and Monitor Applications Evaluate Business Risk Remediate Remediate in Development Generate Detailed Reports for Developers

Issue with Step 1: Costs of Failing Monitor in Production Pass Fail Defend in Production $ Evaluate Business Risk Remediate in Development $$$

Step 2: Expand to earlier stages in SDLC Requirements / Design Fortify Coding Testing Production Gate Hybrid 2.0 Static Analysis Dynamic Analysis Run-Time Analysis

Benefits of Fortify Hybrid 2.0 Relevance Find the root cause Understand the context of vulnerabilities Importance Fix the most critical vulnerabilities Prioritize your resources and time Speed Fix security issues fast Release secure applications to market quickly

Future Direction* Currently under investigation and not guaranteed to be included in future releases 24

Security Languages Currently Support 18 Languages: ASP.NET, VB.NET, C#, Java, JSP, C, C++, COBOL, Cold Fusion, T-SQL, PL/SQL, JavaScript / AJAX, Classic ASP, PHP, Python, VBScript, Visual Basic, XML / HTML Under Development: SAP ABAP Under Consideration Web 2.0 Adobe Flex / Flash Microsoft Silverlight Expanded HTML5 support Dynamic Languages Ruby / JRuby Business Languages Oracle Fusion Salesforce APEX Legacy Languages PERL 25

Findings: Groups of Related Issues Correlation Is a way to automatically group issues based on rules Findings Will allow you to manually group issues during the audit process Create your own findings (groups), drag and drop issues into them as you see fit Correlation could turn into an initial seeding for findings Benefits Save time by mass auditing issues Bugtrackers Will be an important part of findings. We will provide an easy way to file a bug for several issues at once. 26

Security Education Plugin Working on a plugin that can alert you to security vulnerabilities in real time as you re developing code i.e. when you start typing in java.sql.connection.preparecall(), you ll see a popup that alerts you to the security vulnerabilities that are related to that API Security information will come from our rules Parsed/cached at plugin startup Looking at two different use cases: on-the-fly (alerts as you type), and on-demand (show all alerts for the current file) Several IDEs, will probably start with Eclipse Separate from our existing plugins, but can be used together 27

Easy & Fast Better Defect Tracking Integration Improved Scanning Performance Seamless Build Integration Lighter-weight plug-ins for Developer IDEs

Potential Fortify HP Integrations Hybrid 2.0: DAST, SAST & RAST integration Defect Tracking: HP Quality Center & Fortify 360 Server Functional & Security Testing: HP QA Inspect & Fortify RAST Security Dashboard: Fortify 360 Server & HP AMP 29

Potential Fortify HP Integrations PLAN CODE TEST PRODUCTION Source code validation Fortify (SCA) Fortify + HP Application Security Center QA & integration testing PTA + QA Inspect Hybrid 2.0 Production assessment WebInspect Runtime Analysis Fortify RTA Enterprise security assurance & reporting Fortify 360 Enterprise security assurance and reporting Assessment Management Platform Potential Integrations

Thank you 31

Key Enhancements Released in 2010 2.6.0 RTA for Java 1.4 RTA for.net 2.0, 3.0, and 3.5 IDE Plugin for Oracle Jdeveloper User-extensible Vulnerability Descriptions and Recommendations 2.6.5 SCA for.net 4.0 IDE Plugin support for Visual Studio 2010 SCA, IDE Plugins and Demo Suite for Windows 7 SCA, 360 Server and RTA for Windows 2008 Server R2 32

SAP ABAP Scanning SAP is used by many companies to run the company Finance, Manufacturing, Marketing, HR, etc ABAP is SAP s business processing language to customize SAP Fortify SAP ABAP scanning will analyze ABAP applications for vulnerabilities 33