Testing Solutions to Tackle Application Security Checkpoint Technologies SQGNE. Jimmie Parson Checkpoint Technologies



Similar documents
Application Security Center overview

Accelerating Software Security With HP. Rob Roy Federal CTO HP Software

HP Fortify Software Security Center

The Convergence of IT Security and Compliance with a Software as a Service (SaaS) approach

The Evolution of Application Monitoring

Moderator: Benjamin McGee, CISSP Cyber Security Lead SAIC

Product Roadmap. Sushant Rao Principal Product Manager Fortify Software, a HP company

Fortify. Securing Your Entire Software Portfolio

HP Application Security Center

From the Bottom to the Top: The Evolution of Application Monitoring

Your world runs on applications. Secure them with Veracode.

Best Practices - Remediation of Application Vulnerabilities

HP Fortify application security

NEXPOSE ENTERPRISE METASPLOIT PRO. Effective Vulnerability Management and validation. March 2015

White Paper. Guide to PCI Application Security Compliance for Merchants and Service Providers

IT Security & Compliance. On Time. On Budget. On Demand.

2011 Forrester Research, Inc. Reproduction Prohibited

Using Free Tools To Test Web Application Security

On Demand Penetration Testing Applications Networks Compliance.

Learning from Patient Zero: Dissecting Recent Data Breaches to Evolve Our Defenses. March 25, 2015; New York; Andrew Hay

Continuous???? Copyright 2015 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.

Is your software secure?

Real World Healthcare Security Exposures. Brian Selfridge, Partner, Meditology Services

Application Backdoor Assessment. Complete securing of your applications

Network Test Labs (NTL) Software Testing Services for igaming

IBM Rational AppScan: Application security and risk management

Enterprise Software Security Strategies

Practical Applications of Software Security Model Chris Nagel

Application Security Testing. Jesper Kråkhede

Application Security 101. A primer on Application Security best practices

ETHICAL HACKING APPLICATIO WIRELESS110 00NETWORK APPLICATION MOBILE MOBILE0001

Guided HIPAA Compliance

HP ESP Partner Enablement Fortify Proof of Concept Boot Camp Training

Info-Security Conference Securing Your Applications in the Cloud. 29 May 2013

REPORT State of Vulnerability Risk Management

Redhawk Network Security, LLC Layton Ave., Suite One, Bend, OR

The Value of Vulnerability Management*

PCI Compliance: How to ensure customer cardholder data is handled with care

Continuous Network Monitoring

Enterprise Information Technology Security Assessment RFP Answers to Questions

Application Security in the Software Development Lifecycle

White Paper. Automating Your Code Review: Moving to a SaaS Model for Application Security

NEC Managed Security Services

Table of contents. Web application security: too costly to ignore. White paper

The AppSec How-To: 10 Steps to Secure Agile Development

Integrated Threat & Security Management.

Testing the Security of your Applications

Managing Privileged Identities in the Cloud. How Privileged Identity Management Evolved to a Service Platform

IBM Innovate AppScan: Introducin g Security, a first. Bobby Walters Consultant, ATSC bwalters@atsc.com Application Security & Compliance

HP CloudSystem Enterprise

Part Banker. Part Geek. All Security & Compliance.

AUTOMATED PENETRATION TESTING PRODUCTS

To Outsource or not to Outsource: That is the Network Security Question

Passing PCI Compliance How to Address the Application Security Mandates

High End Information Security Services

Enterprise Application Security Program

A white paper analysis from Orasi Software. Enterprise Security. Attacking the problems of application and mobile security

Capturing the New Frontier:

Enterprise Security Solutions

Compliance Guide ISO Compliance Guide. September Contents. Introduction 1. Detailed Controls Mapping 2.

Integrate App. Security in Continuous Integration

Incorporated in January, QA and QC expertise focused on functional, performance and application security validation

The Emergence of the ISO in Community Banking Patrick H. Whelan CISA IT Security & Compliance Consultant

Getting software security Right

HP Fortify Application Security Lucas v. Stockhausen PreSales Manager HP Fortify EMEA Enterprise Security

Procuring Penetration Testing Services

To ensure independence, PSC does not represent, resell or receive commissions from any third party hardware, software or solutions vendors.

Payment Card Industry Data Security Standard

Testing the Security of your Applications

About This Document. Response to Questions. Security Sytems Assessment RFQ

Cautela Labs Cloud Agile. Secured. Threat Management Security Solutions at Work

Keeping watch over your best business interests.

Nine Steps to Smart Security for Small Businesses

Security Breaches and Vulnerability Experiences Overview of PCI DSS Initiative and CISP Payment Application Best Practices Questions and Comments

Addressing the SANS Top 20 Critical Security Controls for Effective Cyber Defense

Be Fast, but be Secure a New Approach to Application Security July 23, 2015

Vulnerability Risk Management 2.0. Best Practices for Managing Risk in the New Digital War

Logentries Insights: The State of Log Management & Analytics for AWS

Threat Intelligence Pty Ltd Specialist Security Training Catalogue

Cenzic Product Guide. Cloud, Mobile and Web Application Security

CloudCheck Compliance Certification Program

Getting Started with Web Application Security

Controlling Risk Through Software Code Governance

eguide: Designing a Continuous Response Architecture Executive s Guide to Windows Server 2003 End of Life

PCI Deadline Are you Complying? Mark Cuneo. CardConnect

How To Make Your Software More Secure

Finding The PPM Sweet Spot

PCI Compliance for Cloud Applications

Seven Practical Steps to Delivering More Secure Software. January 2011

PCI DSS Overview and Solutions. Anwar McEntee

A Decision Maker s Guide to Securing an IT Infrastructure

PCI COMPLIANCE & VIRTUAL ASSET MANAGEMENT

Security-as-a-Service (Sec-aaS) Framework. Service Introduction

OFFICE OF CORPORATE CREDIT UNIONS Risk Reporting for Corporate IT Networks.. Risk Assessment Reporting in Corporate Credit Unions

Application Code Development Standards

How to start a software security initiative within your organization: a maturity based and metrics driven approach OWASP

Cyber Security and Information Assurance Controls Prevention and Reaction NOVEMBER 2013

Assuring Application Security: Deploying Code that Keeps Data Safe

How to achieve PCI DSS Compliance with Checkmarx Source Code Analysis

Transcription:

Testing Solutions to Tackle Application Security Checkpoint Technologies SQGNE Jimmie Parson Checkpoint Technologies

Welcome, Introductions Agenda Checkpoint Technologies Quick Corporate Overview Why do we need Application Security? High Level Discussion of HP s Fortify and Web Inspect Q & A

Welcome and Introductions Thanks everyone for attending today! From Checkpoint Technologies, we have Jimmie Parson Sr. Technical Engineer 813-818-8324 x133 (office) www.checkpointech.com

Checkpoint Technologies Corporate Overview

About Checkpoint Technologies. ü Incorporated in January, 2003 ü Experts in Quality Assurance, Security and Software Testing! ü HP Software Gold Partner & Authorized Training Partner ü HP Authorized Software Support Partner ü Partner of Perfecto Mobile, Mobile Labs, and Turnkey Solutions ü QAI Training Partner 5 Software Solutions Expert Services IT Performance Hardware Solutions

Professional Services Staff Augmentation Consulting Outsourcing Training Mentoring Long-term contract services, on-site and remote QA leads, manual testers, automation experts, etc. Assessment, installation, configuration, analysis, etc. Long-term and short-term, on-site and remote U.S. based functional and performance testing Software testing performed at our test lab by expert resources HP Authorized Training Partner On-site, virtual, or public Structured classroom format using HP materials Customized training essential to your team - in your environment Cost-effective $$$ 6

Security Overview

Why do we need Application Security? More and more each day, the world is embracing: Online transactions, conducting research, storing information, social media How many of you have heard in the news (or been affected by) a data breach: (Retail) LARGE Retailer CEO Resigns (analysts forecast a total cost of approximately $1 billion) (Healthcare) N.Y. Presbyterian & Columbia Medical Center Largest HIPAA enforcement fine to date of $4.8 million due to compromised patient records (Banking) First American Bank, Casino (Las Vegas Sands Corp) Bottom Line: No industry/organization is Safe - Lose your Data, Lose your Livelihood and Reputation!

Application Security Discussion Risk is Everywhere! Vulnerability risks can be present in software no matter how it s created or deployed.

Follow the Leader!

HP Fortify/Web Inspect Discussion

Security Testing - Key Features of Fortify Engage in security testing with HP s Fortify SSC (Software Security Center) Quickly gain an accurate picture of risk in your applications, no matter if they re developed in-house or by vendors. Engage in Static Analysis, also known as Static Application Security Testing (SAST), Detects more types of potential vulnerabilities than any other detection method Pinpoints the root cause of vulnerabilities with line-of-code detail Helps you identify critical issues during development when they are easiest and least expensive to fix

Key Features of WebInspect Dynamic Analysis, also known as Dynamic Application Security Testing (DAST), available from HP Web Inspect. Engage in dynamic security testing for web apps from Dev thru Production Automated and configurable web application security and penetration testing tool that mimics real-world hacking techniques and attacks Easily manage, view and share security-test results and histories Security test web APIs and web services that support your business Demonstrate compliance with various regulatory agencies Run compliance reports for all major regulatory standards, including PCI, SOX, ISO, and HIPAA

Main WebInspect Screen A Basic Web Guided Scan Services Scan u8lizes guides Scan the scans you Scan through a web Wizard service the to best walk by An Enterprise Scan is a comprehensive crawling steps you for through the configuring WSDL the file steps a and scan to submibng tailored create a for scan values your overview of your Web presence primarily for applica8on each using parameter WebInspect s including mobile each default opera8on devices sebngs

WebInspect Policy Manager Mobile Policy OpenSSL Heartbleed Policy OWASP Top 10 Applica9on Security Risks Policy

Web Inspect Live Scan Visualization Live Scan Dashboard Live Scan Sta9s9cs Excluded & Allowed Hosts Vulnerabili9es Found in Applica9on Detailed AAack Table

Generating Reports The WebInspect Report Wizard allows you to easily select the report types and detail you want included in your reports

Fortify on Demand What if we don t have in house resources and or expertise in Security Testing? HP Fortify on Demand offers a simple cost-effective cloud-based approach with no application security experience required. Start small and quickly scale to hundreds of apps. This flexible solution can assess them all; web, mobile and client in-house, 3 rd party or commercial off-the-shelf. It s as easy as 1, 2, 3! 1) Initiate: Upload your source code or point us at your URL and receive a comprehensive application layer test that encompasses static and dynamic analysis. 2) Test: Our SaaS expert team will conduct a thorough audit of your application for security vulnerabilities. 3) Review: Review detailed and correlated results, prioritized by severity & exploitability. Issues identified include line of code-level details with suggestions on how to fix.

HP Fortify On Demand Executive Dashboard: Charts the applications by risk category and star rating Issues: Provides Remediation Advice

Q&A Thank You Jimmie Parson Sr. Technical Engineer 813-818-8324 x133 (office) www.checkpointech.com Perform Better with Checkpoint Technologies and HP