Application Backdoor Assessment. Complete securing of your applications



Similar documents
BMS Consulting Cyber Security and IT Technology Team

Application Security Testing Powered by HPE Fortify on Demand. Managed application security testing available on demand

IBM Security AppScan Source

Two factor strong authentication. Complex solution for two factor strong authentication

Application Performance Management. Java EE.Net, Databases Message Queue Transaction, Web Servers End User Experience

Product Roadmap. Sushant Rao Principal Product Manager Fortify Software, a HP company

IBM Rational AppScan Source Edition

Application Code Development Standards

Migration from Lotus to Exchange Complex solution for simplify transition

SWASCAN ALL in ONE. SWASCAN Web Application SWASCAN Network SWASCAN Code Review

EFFICIENT AND FLEXIBLE SOLUTIONS FOR YOUR SOFTWARE DEVELOPMENT NEEDS

Cybernetic Global Intelligence. Service Information Package

IBM Rational AppScan: Application security and risk management

Penetration Testing in Romania

Application Security Center overview

Testing Solutions to Tackle Application Security Checkpoint Technologies SQGNE. Jimmie Parson Checkpoint Technologies

Is your software secure?

Andrea Fabrizi. Curriculum Vitae. Date of Birth: 10/04/1983 City of Birth: Anagni, Italy

InfoSec Academy Application & Secure Code Track

Application Security Testing. Jesper Kråkhede

Testing the Security of your Applications

HP Fortify application security

IBM Rational AppScan: enhancing Web application security and regulatory compliance.

KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES.

Evolution of Penetration Testing

Penetration testing & Ethical Hacking. Security Week 2014

Keeping your data yours

Hands-On Ethical Hacking and Network Defense - Second Edition Chapter 1. After reading this chapter and completing the exercises, you will be able to:

Seven Practical Steps to Delivering More Secure Software. January 2011

Securing Your Web Application against security vulnerabilities. Ong Khai Wei, IT Specialist, Development Tools (Rational) IBM Software Group

Contents. Facts. Contact. Company Biography...4. Qualifications & Accolades...5. Executive Leadership Team...6. Products & Services...

VULNERABILITY & COMPLIANCE MANAGEMENT SYSTEM

A Strategic Approach to Web Application Security The importance of a secure software development lifecycle

Testing the Security of your Applications

Integrated Threat & Security Management.

LEARNING CURRICULUM SECURITY COMPASS TRAINING 2015 Q3. Copyright Security Compass. 1

Guide to Penetration Testing

Black Box versus White Box: Different App Testing Strategies John B. Dickson, CISSP

How To Make Your Software More Secure

Решения HP по информационной безопасности

Using Free Tools To Test Web Application Security

HP Application Security Center

HP Fortify Application Security Lucas v. Stockhausen PreSales Manager HP Fortify EMEA Enterprise Security

Digi Device Cloud: Security You Can Trust

Web Application security testing: who tests the test?

El costo oculto de las aplicaciones Vulnerables. Faustino Sanchez. WW Security Sales Enablement. IBM Canada

WEB APPLICATION VULNERABILITY STATISTICS (2013)

Security Testing. Vulnerability Assessment vs Penetration Testing. Gabriel Mihai Tanase, Director KPMG Romania. 29 October 2014

How Your Current IT Security System Might Be Leaving You Exposed TAKEAWAYS CHALLENGES WHITE PAPER

The Evolution of Application Monitoring

The Next Generation of Security Leaders

Automatic vs. Manual Code Analysis

Penetration Testing Services. Demonstrate Real-World Risk

5 Partner Benefits and Requirements Benefits Requirements... 8

STATE OF WASHINGTON DEPARTMENT OF SOCIAL AND HEALTH SERVICES P.O. Box 45810, Olympia, Washington October 21, 2013

IBM Security AppScan Source for Analysis Version User Guide IBM

Manual Penetration Testing for ContractPal

Network Test Labs Inc Security Assessment Service Description Complementary Service Offering for New Clients

Passing PCI Compliance How to Address the Application Security Mandates

Hackers are here. Where are you?

The Emergence of the ISO in Community Banking Patrick H. Whelan CISA IT Security & Compliance Consultant

Rational AppScan & Ounce Products

IBM Security AppScan Source for Analysis Version User Guide IBM

Network Test Labs (NTL) Software Testing Services for igaming

w w w. m a l l ate c h n o l o g i e s. c o m. a u

White Paper. Automating Your Code Review: Moving to a SaaS Model for Application Security

Pentests more than just using the proper tools

locuz.com Professional Services Security Audit Services

Threat Intelligence Pty Ltd Specialist Security Training Catalogue

1000 Projects later. Security Code Scans at SAP

McAfee Database Security. Dan Sarel, VP Database Security Products

Learning objectives for today s session

Pentests more than just using the proper tools

Redhawk Network Security, LLC Layton Ave., Suite One, Bend, OR

On Demand Penetration Testing Applications Networks Compliance.

Acceptance Criteria for Penetration Tests According to PCI DSS

Why You Need to Test All Your Cloud, Mobile and Web Applications

Security-as-a-Service (Sec-aaS) Framework. Service Introduction

AUTOMATED PENETRATION TESTING PRODUCTS

EC-Council. Certified Ethical Hacker. Program Brochure

Transcription:

Application Backdoor Assessment Complete securing of your applications

Company brief BMS Consulting is established as IT system integrator since 1997 Leading positons in Eastern Europe country Product portfolio IT Security Clouds, Migration and IT Support Business software development Internal processes are certified according to the quility requirements of ISO 9001 international standard 60+ technology partners around the world Our honorable clients: 80+ certified engeneers and consultants 500+ projects in government, industry, banking and telecom sectors

200+ Employees 60+ Vendors InfoPulse A part of thepartner Nordic IT group EVRY

Application Backdoor Assessment Background Typical application consists from tens of thousands stings of code and each string can contain peace that can behave unpredictable way. There are a lot of reasons for backdoors and vulnerabilities to appear in your software: Human errors Sabotage Government anc competitor s espionage Orginized crime You need to inspect every peace of code to be sure that you application is safe to use. Expecially it relates to software that suffer frequent changes or updates. Brif service description Application backdoor assessment is a special type of source code audit that is directed to insure full code safety. This assessment is based on static analysis of source code with dynamic confirmation of vulnerable or dangerous parts of code. We use as proven automatic tools for static code analysis as manual code inspection by professional application security engineers. Main features More than 80% of possible vulnerabilities can be found and corrected before application go to operation More than 10 different programming languages are supported All vulnerabilities and backdoors fount are been thoroughly inspected through dynamic testing and threat modelling All assessment process is fully controlled by client Who will need it Each company that uses custom developed software (both inhouse and outsourced) All candidates to PCI DSS or ISO 27001 compliance Companies that became a target of attack or hacking activities and needs to understand all possible ways of intrusion Companies that deal with sensitive financial or personal information InfoPulse Partner A part of the Nordic IT group EVRY Companies that migrate their software to new platform or in the cloud Everyone who accepts in production IT systems that suffer from custom software changes or updates.

Static + dynamic analysis Dynamic Analysis reveals about Static Analysis reveals about Hybrid Analysis reveals about 20% 80% 100% vulnerabilities vulnerabilities vulnerabilities Testing of running application that allows to identify the most obvious vulnerabilities, which real hackers will find first. Application vulnerability scan in the "rest allows to find the most flaws - even those that hacker will not be able to use. Integrated approach means that all static analysis findings go through functional verification. It allows to reveal almost all errors and efficiently plan measures for their remediation and provide the best protection

Tools and Standards OWASP Code Review Guide v1.1 OWASP Testing Guide v3 IBM Security AppScan Source / HP Fortify

Supported Languages Java JavaScript JSP ColdFusion C, C++, Objective-C NET (C#, ASP.NET and VB.NET) Classic ASP (JavaScript/VBScript) PHP Perl VisualBasic 6 PL/SQL T-SQL SAP ABAP COBOL

Project plan Project management: PM[10%] Consultant[30%] Consultant[30%] Consultant[100%] Consultant[20%] Engineer[100%] Engineer[100%] Engineer[30%] Consultant[100%] Preparation Static testing Hybrid testing Dynamic testing Report design Presentation of results Agreement on volume, tools and work area (SOW) Obtaining the necessary permits Getting the initial data Automated source code scanning by tools (static method) Manual inspection of tools results (static method) Application flow analysis (dynamic method) The identification of vulnerable applications Determination of immediate steps to address the most critical vulnerabilities Recommendations to address identified vulnerabilities Presentation of results Coordination of the plan to address identified vulnerabilities

Application Backdoor Assessment Project Results Assessment Report that includes : Identified vulnerabilities and backdoors Identified high-priority steps to be done to address the most critical problems List of approved vulnerabilities tested by the auditor Verification that the vulnerability or backdoor can be exploited on running application (in a test environment) Recommendations to address identified problem pieces of code Benefits Very fast results Full confidentiality is guaranteed Detailed recommendations Email and phone support Follow-up checks are included Free vulnerability scan during 1 year guarantee period Pricing Lines of code Duration, workdays Price, Euro 1000 13 8300 10000 25 16100 20000 30 18100

Our competences and experience Our team Several sub teams of professional: Pentesters Developers Software engineers Software testers Security architects Certified CISA, CISSP, CEH Our experience 13 years in CyberSecurity More than 20 software penetration tests More than 100 satisfied customers Deep expertise in Corporate IT Security Oracle SAP Microsoft,Net Java Android Security ios Security Internet banking security BMS strengths Professional teams specialized in many areas Multilingual staff Guaranteed quality Unique approach to project management

Thank you for attention! 11