SWASCAN ALL in ONE. SWASCAN Web Application SWASCAN Network SWASCAN Code Review

Similar documents
Application Backdoor Assessment. Complete securing of your applications

Application Code Development Standards

IBM Rational AppScan: Application security and risk management

IBM Rational AppScan Source Edition

SECURITY AND REGULATORY COMPLIANCE OVERVIEW

Secunia Corporate Software Inspector (Secunia CSI) ver.5.0

SECURITY AND REGULATORY COMPLIANCE OVERVIEW

A Decision Maker s Guide to Securing an IT Infrastructure

Symantec Client Management Suite 8.0

Bringing Continuous Security to the Global Enterprise

IBM Security AppScan Source

TECHNICAL AUDITS FOR CERTIFYING EUROPEAN CITIZEN COLLECTION SYSTEMS

Application Security Testing Powered by HPE Fortify on Demand. Managed application security testing available on demand

Trend Micro. Advanced Security Built for the Cloud

Complete Patch Management

WhiteHat Security White Paper. Top 11 PCI DSS 3.0 Changes That Will Affect Your Application Security Program

5 Partner Benefits and Requirements Benefits Requirements... 8

IT Security & Compliance. On Time. On Budget. On Demand.

Product Roadmap. Sushant Rao Principal Product Manager Fortify Software, a HP company

How to manage IT Risks and IT Compliance as a Service

BYOD: End-to-End Security

Building Robust Applications l Optimizing Performance l Transforming Business

Mobile device and application management. Speaker Name Date

AUTOMATING THE 20 CRITICAL SECURITY CONTROLS

Integrated Threat & Security Management.

Azure Day Application Development

FISMA / NIST REVISION 3 COMPLIANCE

Mac OS X Security Checklist:

Is your software secure?

HP Application Security Center

An Oracle White Paper May Oracle Integration Cloud Service (ICS) Security & Compliance

Aiming at Higher Network Security Levels Through Extensive PENETRATION TESTING. Anestis Bechtsoudis. abechtsoudis (at) ieee.

KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES.

NE T GENERATION CLOUD SECURITY PLATFORM

Integrating Application Security into the Mobile Software Development Lifecycle. WhiteHat Security Paper

ARS v2.0. Solution Brief. ARS v2.0. EventTracker Enterprise v7.x. Publication Date: July 22, 2014

R 143 CYBERSECURITY RECOMMENDATION FOR MEDIA VENDORS SYSTEMS, SOFTWARE & SERVICES

Information Security Services

What We Do: Simplify Enterprise Mobility

STATE OF WASHINGTON DEPARTMENT OF SOCIAL AND HEALTH SERVICES P.O. Box 45810, Olympia, Washington October 21, 2013

5 REASONS START. why QuickBooks Enterprise Solutions is the right solution for you. Slide 1 of 9. ProTracksales.com

Kenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data

DOBUS And SBL Cloud Services Brochure

NEXPOSE ENTERPRISE METASPLOIT PRO. Effective Vulnerability Management and validation. March 2015

Addressing the SANS Top 20 Critical Security Controls for Effective Cyber Defense

GoodData Corporation Security White Paper

DOBUS And SBL Cloud Services Brochure

SAP Security Recommendations December Secure Software Development at SAP Embedding Security in the Product Innovation Lifecycle Version 1.

Mean Time to Fix (MTTF) IT Risk s Dirty Little Secret Joe Krull, CPP, CISSP, IAM, CISA, A.Inst.ISP, CRISC, CIPP

Kaseya IT Automation Framework

Cisco Mobile Collaboration Management Service

Web application security: automated scanning versus manual penetration testing.

THE BLUENOSE SECURITY FRAMEWORK

Testing the Security of your Applications

IBM Endpoint Manager for Mobile Devices

SAST, DAST and Vulnerability Assessments, = 4

Data Security and Privacy Principles for IBM SaaS How IBM Software as a Service is protected by IBM s security-driven culture

Patch and Vulnerability Management Program

ETHICAL HACKING APPLICATIO WIRELESS110 00NETWORK APPLICATION MOBILE MOBILE0001

Vulnerability Management

State of Web Application Security

Introduction to QualysGuard IT Risk SaaS Services. Marek Skalicky, CISM, CRISC Regional Account Manager for Central & Adriatic Eastern Europe

The Security Development Lifecycle at SAP How SAP Builds Security into Software Products

LEARNING CURRICULUM SECURITY COMPASS TRAINING 2015 Q3. Copyright Security Compass. 1

Source Code Review Using Static Analysis Tools

Address IT costs and streamline operations with IBM service desk and asset management.

Integrating Security into the Application Development Process. Jerod Brennen, CISSP CTO & Principal Security Consultant, Jacadis

PCI Compliance for Cloud Applications

Rational AppScan & Ounce Products

Microsoft Modern ALM. Gilad Levy Baruch Frei

CORE Security and the Payment Card Industry Data Security Standard (PCI DSS)

CONTENTS. Abstract Need for Desktop Management What should typical Desktop Management Software do? Securing Desktops...

BeBanjo Infrastructure and Security Overview

Firewall Access Request Form

Five Steps to Secure Outsourced Application Development

SERENA SOFTWARE Serena Service Manager Security

Unifying IT How Dell Is Using BMC

Cloud Security Trust Cisco to Protect Your Data

CORE IMPACT AND THE CONSENSUS AUDIT GUIDELINES (CAG)

BYOD Management : Geo-fence

10 Hidden IT Risks That Might Threaten Your Law Firm

Certified Information Professional 2016 Update Outline

UNIFIED THREAT MANAGEMENT SOLUTIONS AND NEXT-GENERATION FIREWALLS ADMINISTRATION TOOLS NETWORK SECURITY I ENDPOINT SECURITY I DATA SECURITY

Transcription:

SWASCAN ALL in ONE SWASCAN Web Application SWASCAN Network SWASCAN Code Review

SWASCAN at a Glance The first Cloud Suite Security Platform The right way to manage the Security Risk, both for web and mobile applications as well as the overall technological infrastructure All-in-one SAAS that offers to its users: Flexibility Cost cutting Scalability Accessibility Background to audit Three main products: Web Application Scan Network Scan Code Review Compliance to regulations and OWASP best practises

SWASCAN Core Business The power and efficiency of Cloud technology is enhanced by a unique platform with a SaaS model, through different integrated and advanced tools. SWASCAN key products aim to test and verify the weaknesses of third-parties applications, preventing data-loss, and analyze the quality standards of company s network security, its compliance, internal policies and procedures, overall quality and the security of source code. SWASCAN also offers other features that complete the Suite and make it an ideal solution for the full risk management activity. Scale Discover Assess Prioritize Global Scalability, Manageability Scan application everywhere Automated, Dynamic, Deep Scanning Identify the highest business risk, and take action

SWASCAN Suite description: WEB APP SCAN Swascan Web APP SCAN basically allows: To provide automated security testing and security scan of web applications to identify vulnerabilities To verify the weaknesses of third-parties applications that could generate loss of data or undesired accesses to private data To verify and guarantee the compliance to OWASP best practices and current regulations, identifying security issues of the applications To customize the length of the service (monthly, per year) and the number of targets to be analyzed VULNERABILITY SCANNING COMPLIANCE AUDIT FRAMEWORK Provides a Web Application Scan. Identifies more than 200 different web application security flaws and vulnerabilities, including SQL injection, Cross-Site Scripting and many others Failure to comply with strict regulations can be costly for companies. Swascan is an essential tool to help ensuring you to meet mandatory standards and avoid penalties. Automatic generation of reports giving you a complete and detailed overview of your network inventory, status, and security risks.

SWASCAN Suite description: Network SCAN Network Scan aims to Scan networks and devices and suggests you how they can be fixed. To Analyse the security level of company networks To Verify the compliance to current regulations To Check the company policies and internal procedures framework To Offer a security service customizable by number of targets VULNERABILITY SCANNING COMPLIANCE AUDIT FRAMEWORK Successfully meet compliance regulations Perform full vulnerability and port scanning Manage organization-wide software deployment Solve bring your own device (BYOD) headaches Provide IT reports to your managers Generate reports of devices, computers, software and applications installed in your network automatically, giving you a complete and detailed overview of your network inventory, status, and security risks. Automatically scan for and deploy missing security and non-security patches issued by Windows, Mac OS, Linux and many third-party applications.

SWASCAN Suite description: Network SCAN

SWASCAN Suite description: Code Review Code Review has been created to provide a source code analysis to identify and resolve security weaknesses and vulnerabilities To Test the vulnerability of source codes To Assess leaks and inefficiencies of source codes To Highlight the areas to intervene on Easy to use CODE REVIEW Scans uncompiled code Highly accurate On-Premise & On-Demand CODING LANGUAGES & FRAMEWORKS AUDITING AND COMPLIANCE Security code review is the process of auditing the source code for an application to verify that the proper security controls are in place, that they work as intended and that they have been invoked in all the right places. Code review is a way of ensuring that the application has been developed to be self-defended in its given environment.

SWASCAN Code Review Languages SUPPORTED LANGUAGES STANDARD ON DEMAND ABAP Android C/C++ C# COBOL Groovy Java Javascript IOS Objective-C PHP PL/SQL Python RPG VB.NET Visual Basic 6 Web ML

SWASCAN Suite description: other Services The Suite has been enriched of other ancillary tools, that complete the platform: A reporting tool that makes easier the risk management activity (e.g. audit) A recovery tool that suggests how to re-arrange the different security levels

PRODUCT PRODUCT Positioning Positioning PRICING FUNCTION / EFFICIENCY 12

13 BATTLE CARD CLOUD TECHLOGY WEB SCAN VPN SCAN NETWORK SCAN CODE REVIEW ANNUAL LICENSE (T PERPETUAL) BATTLE Card

SWASCAN Screenshot

SWASCAN Competence: Security Management Policy and Compliance Adaptation to the regulatory and legislative law/body in the field of security Personal Data Protection and Privacy... ICT Security Management of activities of ethical hacking to verify the security of the systems and infrastructures Risk Management Analysis and assessment of the level of maturity of the security system in order to define a correct security strategy Information Security Development of the ISMS System for the support of the international security certification ISO 27001

SWASCAN Team The right mix to achieve extraordinary results: an established software developer (Business Competence) a digital Venture Incubator (Key Capital) a Security Expert (Raoul Chiesa) Software development and updates Business development Business development Business development Administration and legal issues Networking Monitoring of innovation related to the Security field Corporate strategy Strong expertise on cyber-security, hacking, cyber-crime Member of several Security agencies, associations, European groups, domestic and International governments task forces

info@swascan.com