HP Fortify Software Security Center

Similar documents
HP Application Security Center

HP Fortify application security

Real-time hybrid analysis:

HP ENTERPRISE SECURITY. Protecting the Instant-On Enterprise

Application Security Center overview

A white paper analysis from Orasi Software. Enterprise Security. Attacking the problems of application and mobile security

Is your software secure?

HP CLOUDSYSTEM. A single platform for private, public, and hybrid clouds. Simply the most complete cloud system for enterprises and service providers

Changing the Enterprise Security Landscape

Vulnerabilities: A 360 Degree Approach

Continuous???? Copyright 2015 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.

Solution brief. HP CloudSystem. An integrated and open platform to build and manage cloud services

Business white paper. Missioncritical. defense. Creating a coordinated response to application security attacks

HP Fortify Application Security Lucas v. Stockhausen PreSales Manager HP Fortify EMEA Enterprise Security

HP Private Cloud Solutions

Solution brief. HP solutions for IT service management. Integration, automation, and the power of self-service IT

Assuring Application Security: Deploying Code that Keeps Data Safe

How To Make Your Software More Secure

HP End User Management software. Enables real-time visibility into application performance and availability. Solution brief

Total Protection for Compliance: Unified IT Policy Auditing

Brochure. Update your Windows. HP Technology Services for Microsoft Windows 2003 End of Support (EOS) and Microsoft Migrations

CaaS Think as a bad guy Petr Hněvkovský, CISA, CISSP HP Enterprise Security

with Managing RSA the Lifecycle of Key Manager RSA Streamlining Security Operations Data Loss Prevention Solutions RSA Solution Brief

Решения HP по информационной безопасности

Testing Solutions to Tackle Application Security Checkpoint Technologies SQGNE. Jimmie Parson Checkpoint Technologies

BRIDGE. the gaps between IT, cloud service providers, and the business. IT service management for the cloud. Business white paper

The Evolution of Application Monitoring

Top 5 reasons to choose HP Information Archiving

Securing your IT infrastructure with SOC/NOC collaboration

Advanced Threat Protection with Dell SecureWorks Security Services

The top 10 misconceptions about performance and availability monitoring

HP and Business Objects Transforming information into intelligence

Application Security 101. A primer on Application Security best practices

Product Roadmap. Sushant Rao Principal Product Manager Fortify Software, a HP company

HP CLOUDSYSTEM. An integrated platform for private, public, and hybrid clouds

Moderator: Benjamin McGee, CISSP Cyber Security Lead SAIC

HP Managed Print Services. FOCUS and INVEST in. BUSINESS and CUSTOMERS

Finding the right cloud solutions for your organization

Continuous Network Monitoring

THE TOP 4 CONTROLS.

Cisco Cloud Web Security

HP 3PAR storage technologies for desktop virtualization

Private cloud computing

How To Standardize Itil V3.3.5

HP Security Solutions for Microsoft

For your network: HP Network Support Combined with Cisco Services

CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL

El costo oculto de las aplicaciones Vulnerables. Faustino Sanchez. WW Security Sales Enablement. IBM Canada

DEMONSTRATING THE ROI FOR SIEM

Managing the Challenges of Cloud Management November 7, 2013

Be Fast, but be Secure a New Approach to Application Security July 23, 2015

Streamline Processes and Gain Business Insights in the Cloud

Application Security Testing as a Foundation for Secure DevOps

How To Create An Insight Analysis For Cyber Security

Mike Smart Cyber Strategist & Enterprise Security Solutions, EMEA. Cyber: The Catalyst to Transform the Security Program

Brochure. ECM without borders. HP Enterprise Content Management (ECM)

Business white paper. Lower risk and cost with proactive information governance

Start Anywhere and Go Everywhere with Cloud Services for HR

A guide to HP enterprise mobility solutions. Expanding the potential of your business with advanced mobility services

SYMANTEC MANAGED SECURITY SERVICES. Superior information security delivered with exceptional value.

Patient Relationship Management

Why should I care about PDF application security?

Analyze, Validate, and Optimize Business Application Performance

Why cloud backup? Top 10 reasons

Solutions Brochure. Security that. Security Connected for Financial Services

Taming Microsoft Environments with HP SiteScope Exchange and Active Directory Solution Templates

Optimize Application Performance and Enhance the Customer Experience

defending against advanced persistent threats: strategies for a new era of attacks agility made possible

Top 5 reasons to choose HP Information Archiving

Made to Fit Your Needs. SAP Solution Overview SAP Solutions for Small Businesses and Midsize Companies

Detect, Prevent, and Deter Fraud in Big Data Environments

Cyber Governance Preparing for the Inevitable Perimeter Breach

Vulnerability Management

HP Service Manager software. The HP next-generation IT Service Management solution is the industry-leading consolidated IT service desk.

Testing the Security of your Applications

Achieving business excellence through quality in a BPO environment

Experience the commitment WHITE PAPER. Information Security Continuous Monitoring. Charting the Right Course. cgi.com 2014 CGI GROUP INC.

How To Protect Your Network From Attack From A Network Security Threat

Elevate Your Customer Engagement Strategy with Cloud Services

Transform Invoice Management with a Hybrid of Cloud and On-Premise Software

Technology Blueprint. Protect Your Servers. Guard the data and availability that enable business-critical communications

HP and netforensics Security Information Management solutions. Business blueprint

From the Bottom to the Top: The Evolution of Application Monitoring

IBM Security X-Force Threat Intelligence

HP Server Automation Standard

PREMIER SERVICES MAXIMIZE PERFORMANCE AND REDUCE RISK

IBM Security Intelligence Strategy

Transcription:

HP Fortify Software Security Center Proactively Eliminate Risk in Software Trust Your Software

92% of exploitable vulnerabilities are in software National Institute for Standards and Technology (NIST) Can You Trust Your Software? Business software is more accessible than ever. Even legacy and in-house applications are now available from the web, in the cloud, and on mobile devices. As a consequence, today s applications can extend far beyond the reach of the best perimeter defenses, leaving them and the sensitive information at the core of your enterprise wholly unprotected. Hackers, organized crime cartels, and rogue governments are highly skilled at exploiting vulnerabilities in software to: Steal data, customer identities, intellectual property, and cash Disrupt business operations Inflict brand damage Place employees, customers, and the public at risk $7.2 M = average organizational cost per security breach (U.S.). Ponemon Institute study, March 2011 93% = increase in web attacks from 2009 to 2010 Symantec Internet Security Threat Report, April 2011 250% = increase in mobile malware from 2009 to 2010 Juniper Networks study, May 2011 Figure 1: Risk is Everywhere Vulnerability risks can be present in software no matter how it s created or deployed. in-house commercial outsourced open source mobile desktop in-house cloud 2

SSA: A Systematic Approach to Eliminating Risk in Software Increasingly, leading enterprises and organizations are finding that the most effective way to secure today s software is by employing a proactive approach known as Software Security Assurance (SSA). It s a comprehensive discipline that provides you with a systematic way to eliminate vulnerability risk in software. SSA is based on the very sound principle that it s far more effective and cost-efficient to secure applications while they re being developed than to do so after they ve been deployed. Accordingly, the key objectives of SSA are not only to identify and remove risk in existing applications, but more importantly to promote secure development practices during development and throughout the application lifecycle. HP Fortify Software Security Center HP Fortify Software Security Center enables any organization of any size to automate any or all aspects of a successful SSA program. Part of the family of HP Enterprise Security Products, HP Fortify Software Security Center is comprised of industry-leading products, solutions, and features that address the complete spectrum of your application security needs. HP Fortify Software Security Center can help you: Address immediate security issues in software you ve already deployed. Reduce systemic risk in software you re developing or acquiring from vendors. Meet compliance goals for internal and external security mandates. Whether you re just getting started with software security and want to know where you stand or take your established SSA program to the next level, HP Fortify Software Security Center can get you there faster and for less cost. Key Benefits Reduces time to find and fix vulnerability issues in software. Lowers costs associated with development, remediation, and compliance. Boosts productivity by automating application security procedures. Accelerates time to market by ensuring fewer security-related delays. 3

Comprehensive Security for Enterprise Applications With HP Fortify Software Security Center, your teams can ease the burden and the cost of securing almost any mission-critical application, regardless of development technology. Comprehensive in scope, it helps eliminate vulnerability risk whether your software is deployed using traditional networks, the cloud, or mobile technology. The suite provides unmatched capabilities in two primary areas, designed to help you achieve the most essential software security objectives: Security Testing Identify exploitable vulnerabilities in less time, with less effort no matter how or where your software originates. Secure Development Lifecycle Work with development and vendors to fix security issues fast in deployed software and ensure that security is built-in to all future software from the very beginning. Figure 2: Software Security Center Dashboard HP Fortify Software Security Center provides the ability to eliminate risk in existing applications and deliver new applications with security built in. 4

Security Testing with HP Fortify Software Security Center Accurately Assess the Security State of Your Applications Security testing with HP Fortify Software Security Center helps you quickly gain an accurate picture of risk in your applications, no matter if they re developed in-house or by vendors. It provides you with the broadest set of security testing capabilities available, such as: Static Analysis, also known as Static Application Security Testing (SAST), available from HP Fortify Static Code Analyzer (SCA). Detects more types of potential vulnerabilities than any other detection method Pinpoints the root cause of vulnerabilities with line-of-code detail Helps you identify critical issues during development when they are easiest and least expensive to fix Dynamic Analysis, also known as Dynamic Application Security Testing (DAST), available from HP WebInspect. (see Figure 3) Detects vulnerabilities in running Web applications and Web services by simulating comprehensive attack scenarios Validates whether a particular vulnerability is in fact genuinely exploitable Speeds remediation by enabling you to know with certainty which issues to address first and why Figure 3: WebInspect Scan Dashboard The Dashboard delivers real-time visibility into and interactivity with test results. 5

Maximizing the Best of Both HP Fortify Software Security Center provides an industry first the ability to significantly enhance the accuracy and scope of dynamic and static testing through real-time hybrid analysis. Its unique HP Fortify SecurityScope technology combines the vulnerability verification of HP WebInspect with the superior application coverage and code-level insight of HP Fortify SCA. As a result, it increases the relevancy of results, enabling you to identify more of your most urgent issues and fix them sooner because you know their precise cause and location in the source code. Threat Intelligence Cyber criminals uncover new vulnerabilities in software every day. To guard against such relentless ingenuity requires ongoing, in-depth analysis into evolving application security issues and risks. All HP Fortify Software Security Center testing products leverage the latest threat intelligence furnished by the HP Fortify Security Research Group (SRG), the world s largest commercial vulnerability research team. Secure Development Lifecycle with HP Fortify Software Security Center Systematically Eliminate Software Risk throughout the Enterprise With versatile capabilities such as those offered in the HP Fortify Software Security Center server, Secure Development Lifecycle components provide everything you need to ensure that development teams and third-party vendors can efficiently remove risk from all of your applications, whether currently deployed, in development, or in planning. Remediation Management With HP Fortify Software Security Center, diverse security and development teams can work together as one to triage, rapidly fix, track, validate, and manage vulnerability problems in deployed software. Shared collaboration environments and audit toolsets enable key personnel to apply repeatable, automated processes to address issues faster and more cost effectively. Moreover, they speed remediation further still because they integrate with industry-standard integrated development environments (IDEs), quality assurance (QA) tools, and bug tracking systems. Proactive Software Security Management The HP Fortify Software Security Center suite empowers you to ingrain software security into all software-related processes. Its centralized tools and pre-defined templates help automate and orchestrate the many activities required to apply Software Security Assurance policies and best practices from the outset in the development of new software and at every stage in the application lifecycle. Additionally, it serves as a system of record for all software security activities, while helping you foster a culture of application security awareness throughout your organization. 6

Your Choice of Delivery Options Secure Your Applications in the Way That Works Best for You HP Fortify Software Security Center is available through a choice of delivery models, designed to meet your specific needs and circumstances. If you have the staffing resources and infrastructure, you may prefer to deploy and run the suite yourself on-premise. If you want to get started quickly, without having to procure hardware, deploy software, and train staff, you can take advantage of HP Fortify on Demand (see Figure 4), a cloud-based security-as-a-service solution based on HP Fortify Software Security Center. Both options are available with Managed Services offerings to augment your staff and provide whatever expertise you may need to expand and improve your application security efforts. Compound Your Benefits The benefits from HP Fortify Software Security Center multiply the more you use them, according to results from a Mainstay Partners return on investment (ROI) study, which reported: Annual benefits of as much as $37 million Reduction in average remediation time from two weeks to one hour Reduction in repeat vulnerabilities from 80 percent to virtually zero $44,000 in average remediation cost savings per application $3.8 million in average yearly savings from faster time-to-market Figure 4: The Executive Dashboard The HP Fortify on Demand Executive Dashboard shows key results for your application testing projects from a single screen. 7

Maximize Your Investment HP Fortify Software Security Center delivers substantial advantages, helping you develop safer code, boost productivity, reduce costs, protect your data assets, and more effectively manage all software security activities. HP Enterprise Security Products provides holistic services to help you make the most of these and other benefits, with real-world Software Security Assurance expertise from thousands of customer deployments, more than anyone else in the industry. Consulting Services Security Risk Assessments Software Security Strategy and Planning SSA Roadmap Development Secure Development Process Implementation Training and Education Security Awareness and Secure Coding education programs Software Security Assurance elearning courses TeamStart Workshops HP Fortify Product elearning courses About HP Enterprise Security HP is a leading provider of security and compliance solutions for modern enterprises that want to mitigate risk in their hybrid environments and defend against advanced threats. Based on market leading products from ArcSight, Fortify, and TippingPoint, the HP Security Intelligence and Risk Management (SIRM) Platform uniquely delivers the advanced correlation, application protection, and network defense technology to protect today s applications and IT infrastructures from sophisticated cyber threats. Visit HP Enterprise Security at: www.hpenterprisesecurity.com For more information Learn more about HP Enterprise Security Products and HP Fortify Software Security Center. Visit www.hpenterprisesecurity.com or www.fortify.com, or contact an HP Fortify representative by calling +1 (650) 358-5600, or for federal sales, +1 (650) 378-5096. Copyright 2011 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. The only warranties for HP products and services are set forth in the express warranty statements accompanying such products and services. Nothing herein should be construed as constituting an additional warranty. HP shall not be liable for technical or editorial errors or omissions contained herein. All other product and company names may be trademarks or registered trademarks of their respective owners. 4AA0-xxxxENW, Created Month 20XX