SlideShare une entreprise Scribd logo
1  sur  22
HP Fortify
Cloud Security
Name
Title
Enterprise Security



© Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
The motivation




© Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
Suddenly, the cloud is everywhere
You hear buzzwords like…




                                                                                                                                        Private
                                                                             Hybrid                                                     clouds
                                                                             clouds
                   Public
                   clouds

                                                                                                                     Community clouds


                                                            … but, what does this all mean?

3 © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
Why all the interest in the cloud

Two primary reasons
                                                    Reduce costs:
                                                    • Hardware to procure, setup and maintain
                  $                                 • Software to procure, install and patch
                                                    • Employees to hire, train and retain


                                                    Increase agility:
                                                    • Instant provisioning and self service
                                                    • Scale resources to meet business demands
                                                    • Mobility and always on access for employees


4 © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
Anatomy of a business pain point: an example

  Business selects              Architecture and                Evaluation/ POC                 Purchase                    Order placed
    application                  product review                                                 approved                                    IT is too slow:
                                                                                                                                            • Many people
                                                                                                                                            • Many steps/ tasks
   More meetings                             Unpack and
                                           install in staging
                                                                                     Hardware
                                                                                   purchased and
                                                                                                                              Planning
                                                                                                                              meetings
                                                                                                                                            • Many weeks/
                                                                                      delivered
                                                                                                                                              months
                                                                                                                                            • Prone to errors

  Coordinate build                         Change control                          Re-cable, move                         User acceptance
     process                                 approvals                             into production                             testing
                                                                                     environment                                            The whole process
                                                                                                                                            can take months!

      Weeks                                                                                                                   Months


5 © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
No wonder, the business is sidestepping IT
                                                       ―..developers are bypassing IT and putting
                                             applications onto public clouds at a rate                                               5x greater
                                                                than IT thinks‖




                                                                    …leading to shadow IT
                                                                  departments with increased
                                                                     risk for the business
 Source: You’re Not Ready For Internal Cloud, by James Staten, Forrester Research, Inc., July
 26, 2010
6 © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
The cloud opportunity
      Business                                                 Business is adopting cloud 5x faster than IT


                                                                     Cloud can benefit the organization
      IT
                                                                     • Increase time to value
                                                                     • Speed innovation
                                                                     • Accelerate business processes

 IT departments recognize the benefits, but concerns are slowing them
 down:
 •   70% CIOs have security top of mind1
 •   75% CIOs demand high SLA guarantees for performance and availability2
 •   63% Require integration of internal & external services2
 •   79% concerned about lock-in2
 1. Source: Goldman Sachs Equity Research, January 2011; 2. Source: IDC, Enterprise Panel Survey,
      November 2010
7 © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
With the cloud, IT’s role becomes more
strategic
As the builder and broker of services


Build on-premises,                                    Transform legacy                                       Manage across legacy     Consume
private and hybrid cloud                              infrastructure and                                     applications and cloud   off-premises, public
services                                              applications and                                       assets                   services
                                                      processes


     Traditional

                                                                                                                                                Public


        Private

                                                                 …. while doing this all
                                                                 securely
8 © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
Key to broad cloud adoption and deployment:
Trust

               Security                                      Service level                                       Compliance          Control
                                                              agreement




                Before the benefits and economics of cloud computing can be realized,
                             organizations require a trusted cloud service



9 © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
The solution




© Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
What is cloud?
Third era of computing




                                                                1960s                                             1980s               2000s
                                                                Mainframe                                       Client server          Cloud




11 © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
Cloud computing defined
―Cloud computing is a style of computing where scalable and elastic IT-enabled
capabilities are delivered as a service to customers using internet or intranet
technologies.‖
 Key
 characteristics:
                      Elastic: scale on demand to add                                                                                    IT as a
                      or remove resources as needed                                                                                      service

                      Shared: share a pool of resources                                                         Enabling
                      to build economies of scale


                      Metered: tracked with usage                                                                                     Compute as a utility
                      metrics to enable multiple payment
                      models
  Source: Gartner, Inc., Oct 2009

12 © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
Cloud computing in pictures

                                                                                                                                          User management
                          Broad
     Essential           network               Rapid              Measured            On-demand
characteristics          access               elasticity           service            self-service                                                            Application
                                                                                                                           Application       Application

                                                  Resourcing pooling
                                                                                                                            Application      Application
                                                                                                                             platform         Platform
                                                                                                                                                                                SaaS
        Service         Software as a               Platform as a              Infrastructure as                                                O/S
                                                                                                                                O/S            Image
        models          Service (SaaS)              Service (PaaS)              a Service (IaaS)
                                                                                                                                                               PaaS
                                                                                                                              Network

  Deployment                                                                                                                                   IaaS
      models                                                                                                                 Physical
                           Public              Private               Hybrid            Community


                                                                                                                              Consumer responsible              Provider responsible


   13 © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.                 Source: NIST
Security needs for cloud computing
Same as the security controls in traditional, on-premise IT infrastructure

                           App                 Applications                     SDLC, Binary Analysis, Scanners, WAFs, Transactional
                                                                                Security
                                                Information                     DLP, CMF, Database Activity Monitoring, Encryption


                                              Management                        SIEM, GRC, IAM, VA/VM, Patch Mgmt, Configuration Mgmt


                                                   Network                      NIDS/NIPS, Firewalls, DPI, Anti-DDOS, QoS, DNSSEC


                                         Trusted computing Hardware, Software, RoT & API’s


                                        Compute & storage Host-based Firewalls, HIDS/HIPS, Encryption, FAM


                                                   Physical                     Physical Access, CCTV, Guards
                                                                                                                                      Source Cloud Security Alliance 2011
14 © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
Cloud application security concerns

                                                                                            App


                                                                                                                                      Will we be
    Is it compliant?                                                  Are we secure?
                                                                                                                                      compromised?
    • Does the application meet all                                   • Is the application securely                                   • Has the provider’s cloud
       regulatory, legal and industry                                    designed and developed for                                    infrastructure been vigorously
       requirements?                                                     the cloud?                                                    tested?
    • Will the cloud provider                                         • Has the legacy application                                    • In this shared
       guarantee 24x7 SLA access                                         been evaluated for cloud                                      environment, are other
       to the application?                                               readiness before migrating                                    customer’s applications
                                                                         there?                                                        secure?

15 © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
Big questions for cloud users
Are you a consumer or a provider of the cloud?

                                                                                Cloud Consumers:
                                                                                Are your applications ready for the cloud?
                                                                                • Analysts estimate that as much as 75% of attacks are at the
                                                                                  application layer
                                                                                • In the cloud, applications are the primary target of attacks
                                                                                • Cloud applications face the same set of security concerns as
                                                                                  those on the ground, plus more

                                                                                Cloud Providers:
                                                                                Is your cloud infrastructure secure?
                                                                                •   Providers need to ensure consumers that their data is secure
                                                                                •   Need to manage the risk of liability for security incidents and
                                                                                    breaches
                                                                                •   Must test the security of their infrastructure
16 © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
HP Fortify Software Security Center
Identify and eliminate risk in existing applications and prevent the introduction
of risk during application development— in-house or from vendors.


                                                                                        • Protect business critical applications from advanced
                                                                                            cyber attacks by removing security vulnerabilities from
                                                                                            software
                 In-house                         Outsourced
                                                                                        • Accelerate time-to-value for achieving secure
                                                                                            applications

                                                                                        • Increase development productivity by enabling
                                                                                            security to be built into software, rather than added on
                   Commercial                Open Source
                                                                                            after it is deployed

                                                                                        • Deliver risk intelligence from application development
                                                                                            to improve operational security

17 © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
HP Fortify on Demand
Test all in-house or third-party applications quickly, accurately and affordably in
the cloud– without the need for hardware, software or expertise.

                                                                                          • Automate application security testing without
                                                                                            hardware or software, and with minimal
               HP Fortify                                                                   resources and expertise
              on Demand                                                                   • Receive verified, correlated application
                                                                                            security results in days
                                                                                          • Achieve any government and industry
                                                                                            regulatory compliance
                                                                                          • Scale to test all applications– desktop, cloud
                                                                                            and mobile—even those outside your control

18 © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
Cloud specific features in HP Fortify products

                                                         Cloud vulnerability analysis to test the readiness of software for cloud
                                                         environments by finding issues specific to the cloud environment


                                                         Cloud Readiness Scorecard™ to rate an application from weak to strong
                                                         depending on the number of minor or major fixes required in deploying an
                                                         application to the cloud


                                                         Project Template for remediation that enables teams to zero in on the root
                                                         cause of important security vulnerabilities


                                                         HP Fortify Secure Coding Rulepacks that provides continual up-to-date
                                                         guidelines on emerging threats identified by our advanced Security
                                                         Research team

19 © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
Cloud application security recommendations

                 Find and fix vulnerabilities in existing applications before they are migrated to
                 a cloud environment

                 Audit new code / applications for resiliency in the target cloud environment

                 Establish a remediation / feedback loop with software developers and outside
                 vendors to deal with ongoing issues




20 © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
Summary: cloud application security
Comprehensive cloud application security solutions


      1             That proactively identifies and eliminates risk in any cloud application or
                    infrastructure
                    To ensure that all cloud applications and infrastructures are trustworthy,
      2             developed and deployed securely, and safe for all users and enterprises
                    Achieving compliance with any government, industry and regulatory
      3             standards and guidelines

                    Available on-premise or on-demand, and with professional services
      4

21 © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
Thank You




© Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.

Contenu connexe

Tendances

Workload IQ: A Differentiated Approach
Workload IQ: A Differentiated ApproachWorkload IQ: A Differentiated Approach
Workload IQ: A Differentiated ApproachNovell
 
The Identity-infused Enterprise
The Identity-infused EnterpriseThe Identity-infused Enterprise
The Identity-infused EnterpriseNovell
 
Sentri's Microsoft Cloud Webinar
Sentri's Microsoft Cloud WebinarSentri's Microsoft Cloud Webinar
Sentri's Microsoft Cloud WebinarSentri
 
#EMC #DOCUMENTUM -content-management-in-action
#EMC #DOCUMENTUM -content-management-in-action#EMC #DOCUMENTUM -content-management-in-action
#EMC #DOCUMENTUM -content-management-in-actionMountaha
 
Intel Social Computing & Sustainability Issues
Intel Social Computing & Sustainability IssuesIntel Social Computing & Sustainability Issues
Intel Social Computing & Sustainability IssuesUmair Mohsin
 
Web Ex Presentation For Stn 2 24 11
Web Ex Presentation For Stn 2 24 11Web Ex Presentation For Stn 2 24 11
Web Ex Presentation For Stn 2 24 11mcini
 
Php In The Enterprise 01 24 2010
Php In The Enterprise 01 24 2010Php In The Enterprise 01 24 2010
Php In The Enterprise 01 24 2010phptechtalk
 
WS: Kohler, Logica - Running operations devops style
WS: Kohler, Logica - Running operations devops styleWS: Kohler, Logica - Running operations devops style
WS: Kohler, Logica - Running operations devops styleCloudOps Summit
 
Your New Workplace
Your New WorkplaceYour New Workplace
Your New Workplacebpaternoster
 
It aac defense-it-cloud2013
It aac defense-it-cloud2013It aac defense-it-cloud2013
It aac defense-it-cloud2013John Weiler
 
Intergen Twilight Seminar: Constructive Disruption with Cloud Technologies
Intergen Twilight Seminar: Constructive Disruption with Cloud TechnologiesIntergen Twilight Seminar: Constructive Disruption with Cloud Technologies
Intergen Twilight Seminar: Constructive Disruption with Cloud TechnologiesIntergen
 
DDS in a Nutshell
DDS in a NutshellDDS in a Nutshell
DDS in a NutshellRick Warren
 

Tendances (16)

Workload IQ: A Differentiated Approach
Workload IQ: A Differentiated ApproachWorkload IQ: A Differentiated Approach
Workload IQ: A Differentiated Approach
 
XEN App
XEN AppXEN App
XEN App
 
The Identity-infused Enterprise
The Identity-infused EnterpriseThe Identity-infused Enterprise
The Identity-infused Enterprise
 
Enable flexible working
Enable flexible workingEnable flexible working
Enable flexible working
 
Sentri's Microsoft Cloud Webinar
Sentri's Microsoft Cloud WebinarSentri's Microsoft Cloud Webinar
Sentri's Microsoft Cloud Webinar
 
#EMC #DOCUMENTUM -content-management-in-action
#EMC #DOCUMENTUM -content-management-in-action#EMC #DOCUMENTUM -content-management-in-action
#EMC #DOCUMENTUM -content-management-in-action
 
Logicalis BYOD Briefing
Logicalis BYOD BriefingLogicalis BYOD Briefing
Logicalis BYOD Briefing
 
Intel Social Computing & Sustainability Issues
Intel Social Computing & Sustainability IssuesIntel Social Computing & Sustainability Issues
Intel Social Computing & Sustainability Issues
 
Web Ex Presentation For Stn 2 24 11
Web Ex Presentation For Stn 2 24 11Web Ex Presentation For Stn 2 24 11
Web Ex Presentation For Stn 2 24 11
 
Extreme Competition
Extreme CompetitionExtreme Competition
Extreme Competition
 
Php In The Enterprise 01 24 2010
Php In The Enterprise 01 24 2010Php In The Enterprise 01 24 2010
Php In The Enterprise 01 24 2010
 
WS: Kohler, Logica - Running operations devops style
WS: Kohler, Logica - Running operations devops styleWS: Kohler, Logica - Running operations devops style
WS: Kohler, Logica - Running operations devops style
 
Your New Workplace
Your New WorkplaceYour New Workplace
Your New Workplace
 
It aac defense-it-cloud2013
It aac defense-it-cloud2013It aac defense-it-cloud2013
It aac defense-it-cloud2013
 
Intergen Twilight Seminar: Constructive Disruption with Cloud Technologies
Intergen Twilight Seminar: Constructive Disruption with Cloud TechnologiesIntergen Twilight Seminar: Constructive Disruption with Cloud Technologies
Intergen Twilight Seminar: Constructive Disruption with Cloud Technologies
 
DDS in a Nutshell
DDS in a NutshellDDS in a Nutshell
DDS in a Nutshell
 

En vedette

Fortify On Demand and ShadowLabs
Fortify On Demand and ShadowLabsFortify On Demand and ShadowLabs
Fortify On Demand and ShadowLabsjasonhaddix
 
Hp Fortify Pillar
Hp Fortify PillarHp Fortify Pillar
Hp Fortify PillarEd Wong
 
Are your Cloud Services Secure and Compliant today?
Are your Cloud Services Secure and Compliant today?Are your Cloud Services Secure and Compliant today?
Are your Cloud Services Secure and Compliant today?Sridhar Karnam
 
Casablanca a Cloud Security od HP – Miroslav Knapovský
Casablanca a Cloud Security od HP – Miroslav KnapovskýCasablanca a Cloud Security od HP – Miroslav Knapovský
Casablanca a Cloud Security od HP – Miroslav KnapovskýCasablanca
 
Cloud Security And Cyber Security Legal And Regulatory Hp Version V 2.1
Cloud Security And Cyber Security Legal And Regulatory  Hp Version V 2.1Cloud Security And Cyber Security Legal And Regulatory  Hp Version V 2.1
Cloud Security And Cyber Security Legal And Regulatory Hp Version V 2.1David Spinks
 
Securing Cloud Services
Securing Cloud ServicesSecuring Cloud Services
Securing Cloud ServicesJohn Rhoton
 
HP WebInspect
HP WebInspectHP WebInspect
HP WebInspectrohit_ta
 
Cheatsheet for your cloud project
Cheatsheet for your cloud projectCheatsheet for your cloud project
Cheatsheet for your cloud projectPetteri Heino
 
The Joy of Proactive Security
The Joy of Proactive SecurityThe Joy of Proactive Security
The Joy of Proactive SecurityAndy Hoernecke
 
Hypervisor Security - OpenStack Summit Hong Kong
Hypervisor Security - OpenStack Summit Hong KongHypervisor Security - OpenStack Summit Hong Kong
Hypervisor Security - OpenStack Summit Hong KongRobert Clark
 
AWS security monitoring and compliance validation from Adobe.
AWS security monitoring and compliance validation from Adobe.AWS security monitoring and compliance validation from Adobe.
AWS security monitoring and compliance validation from Adobe.Splunk
 
Poster Analysis Source Code
Poster Analysis Source CodePoster Analysis Source Code
Poster Analysis Source Codekirstysals
 
Hp fortify source code analyzer(sca)
Hp fortify source code analyzer(sca)Hp fortify source code analyzer(sca)
Hp fortify source code analyzer(sca)Nagaraju Repala
 
Cloud infrastructure and Cloud Services
Cloud infrastructure and Cloud ServicesCloud infrastructure and Cloud Services
Cloud infrastructure and Cloud ServicesIntel Corporation
 
AWS Services overview and global infrastructure
AWS Services overview and global infrastructureAWS Services overview and global infrastructure
AWS Services overview and global infrastructureSchibsted Tech Polska
 
Web Application Security Vulnerability Management Framework
Web Application Security Vulnerability Management FrameworkWeb Application Security Vulnerability Management Framework
Web Application Security Vulnerability Management Frameworkjpubal
 

En vedette (20)

Fortify On Demand and ShadowLabs
Fortify On Demand and ShadowLabsFortify On Demand and ShadowLabs
Fortify On Demand and ShadowLabs
 
Hp Fortify Pillar
Hp Fortify PillarHp Fortify Pillar
Hp Fortify Pillar
 
Fortify - Source Code Analyzer
Fortify - Source Code AnalyzerFortify - Source Code Analyzer
Fortify - Source Code Analyzer
 
Are your Cloud Services Secure and Compliant today?
Are your Cloud Services Secure and Compliant today?Are your Cloud Services Secure and Compliant today?
Are your Cloud Services Secure and Compliant today?
 
Casablanca a Cloud Security od HP – Miroslav Knapovský
Casablanca a Cloud Security od HP – Miroslav KnapovskýCasablanca a Cloud Security od HP – Miroslav Knapovský
Casablanca a Cloud Security od HP – Miroslav Knapovský
 
Cloud Security And Cyber Security Legal And Regulatory Hp Version V 2.1
Cloud Security And Cyber Security Legal And Regulatory  Hp Version V 2.1Cloud Security And Cyber Security Legal And Regulatory  Hp Version V 2.1
Cloud Security And Cyber Security Legal And Regulatory Hp Version V 2.1
 
Securing Cloud Services
Securing Cloud ServicesSecuring Cloud Services
Securing Cloud Services
 
HP WebInspect
HP WebInspectHP WebInspect
HP WebInspect
 
Cheatsheet for your cloud project
Cheatsheet for your cloud projectCheatsheet for your cloud project
Cheatsheet for your cloud project
 
4 hp converged_cloud
4 hp converged_cloud4 hp converged_cloud
4 hp converged_cloud
 
Fortify dev ops (002)
Fortify   dev ops (002)Fortify   dev ops (002)
Fortify dev ops (002)
 
Source Code Scanners
Source Code ScannersSource Code Scanners
Source Code Scanners
 
The Joy of Proactive Security
The Joy of Proactive SecurityThe Joy of Proactive Security
The Joy of Proactive Security
 
Hypervisor Security - OpenStack Summit Hong Kong
Hypervisor Security - OpenStack Summit Hong KongHypervisor Security - OpenStack Summit Hong Kong
Hypervisor Security - OpenStack Summit Hong Kong
 
AWS security monitoring and compliance validation from Adobe.
AWS security monitoring and compliance validation from Adobe.AWS security monitoring and compliance validation from Adobe.
AWS security monitoring and compliance validation from Adobe.
 
Poster Analysis Source Code
Poster Analysis Source CodePoster Analysis Source Code
Poster Analysis Source Code
 
Hp fortify source code analyzer(sca)
Hp fortify source code analyzer(sca)Hp fortify source code analyzer(sca)
Hp fortify source code analyzer(sca)
 
Cloud infrastructure and Cloud Services
Cloud infrastructure and Cloud ServicesCloud infrastructure and Cloud Services
Cloud infrastructure and Cloud Services
 
AWS Services overview and global infrastructure
AWS Services overview and global infrastructureAWS Services overview and global infrastructure
AWS Services overview and global infrastructure
 
Web Application Security Vulnerability Management Framework
Web Application Security Vulnerability Management FrameworkWeb Application Security Vulnerability Management Framework
Web Application Security Vulnerability Management Framework
 

Similaire à Hp Fortify Cloud Application Security

Master agile development and testing
Master agile development and testingMaster agile development and testing
Master agile development and testingvmglover
 
Bb3061 bess systems of record sv
Bb3061 bess systems of record svBb3061 bess systems of record sv
Bb3061 bess systems of record svCharlie Bess
 
HP Cloud Maps Customer Presentation
HP Cloud Maps Customer PresentationHP Cloud Maps Customer Presentation
HP Cloud Maps Customer PresentationRien du Pre
 
Cloud Computing and eDiscovery: What is in it for you? By ESG's Brian Babinea...
Cloud Computing and eDiscovery: What is in it for you? By ESG's Brian Babinea...Cloud Computing and eDiscovery: What is in it for you? By ESG's Brian Babinea...
Cloud Computing and eDiscovery: What is in it for you? By ESG's Brian Babinea...CaseCentral
 
Developing applications for the cloud
Developing applications for the cloudDeveloping applications for the cloud
Developing applications for the cloudBart Blommaerts
 
The Digital Age: How to get the most out of mobile devices in the legal envir...
The Digital Age: How to get the most out of mobile devices in the legal envir...The Digital Age: How to get the most out of mobile devices in the legal envir...
The Digital Age: How to get the most out of mobile devices in the legal envir...e-ternity
 
Hadoop Enterprise Readiness
Hadoop Enterprise ReadinessHadoop Enterprise Readiness
Hadoop Enterprise Readinessad17633
 
Presentation 20111102
Presentation 20111102Presentation 20111102
Presentation 20111102dgarlough
 
ITque Cloud Intro Webinar Slides - Feb 2013
ITque Cloud Intro Webinar Slides - Feb 2013ITque Cloud Intro Webinar Slides - Feb 2013
ITque Cloud Intro Webinar Slides - Feb 2013ITque, Inc.
 
considering the cloud? From IaaS to SaaS and Beyond - Find Your Path to the C...
considering the cloud? From IaaS to SaaS and Beyond - Find Your Path to the C...considering the cloud? From IaaS to SaaS and Beyond - Find Your Path to the C...
considering the cloud? From IaaS to SaaS and Beyond - Find Your Path to the C...Web2Present
 
XebiaLabs Overview Slides
XebiaLabs Overview SlidesXebiaLabs Overview Slides
XebiaLabs Overview SlidesXebiaLabs
 
BYOD: Built for business, designed for end users (Feb 27, 2013 Innovation Din...
BYOD: Built for business, designed for end users (Feb 27, 2013 Innovation Din...BYOD: Built for business, designed for end users (Feb 27, 2013 Innovation Din...
BYOD: Built for business, designed for end users (Feb 27, 2013 Innovation Din...itnewsafrica
 
Smarter Computing Integrated Systems
Smarter Computing Integrated SystemsSmarter Computing Integrated Systems
Smarter Computing Integrated SystemsIBMGovernmentCA
 
Amazing Winter Keynote - IT as a Team Sport
Amazing Winter Keynote - IT as a Team SportAmazing Winter Keynote - IT as a Team Sport
Amazing Winter Keynote - IT as a Team SportPaul Muller
 
How to Transform Enterprise Applications to On-premise Clouds with Wipro and ...
How to Transform Enterprise Applications to On-premise Clouds with Wipro and ...How to Transform Enterprise Applications to On-premise Clouds with Wipro and ...
How to Transform Enterprise Applications to On-premise Clouds with Wipro and ...Eucalyptus Systems, Inc.
 
How to Transform Enterprise Applications to On-premise Clouds with Wipro and ...
How to Transform Enterprise Applications to On-premise Clouds with Wipro and ...How to Transform Enterprise Applications to On-premise Clouds with Wipro and ...
How to Transform Enterprise Applications to On-premise Clouds with Wipro and ...Eucalyptus Systems, Inc.
 

Similaire à Hp Fortify Cloud Application Security (20)

Master agile development and testing
Master agile development and testingMaster agile development and testing
Master agile development and testing
 
Bb3061 bess systems of record sv
Bb3061 bess systems of record svBb3061 bess systems of record sv
Bb3061 bess systems of record sv
 
Day 2 p3 - automation
Day 2   p3 - automationDay 2   p3 - automation
Day 2 p3 - automation
 
Cloud ready
Cloud readyCloud ready
Cloud ready
 
HP Cloud Maps Customer Presentation
HP Cloud Maps Customer PresentationHP Cloud Maps Customer Presentation
HP Cloud Maps Customer Presentation
 
Cloud Computing and eDiscovery: What is in it for you? By ESG's Brian Babinea...
Cloud Computing and eDiscovery: What is in it for you? By ESG's Brian Babinea...Cloud Computing and eDiscovery: What is in it for you? By ESG's Brian Babinea...
Cloud Computing and eDiscovery: What is in it for you? By ESG's Brian Babinea...
 
Developing applications for the cloud
Developing applications for the cloudDeveloping applications for the cloud
Developing applications for the cloud
 
The Digital Age: How to get the most out of mobile devices in the legal envir...
The Digital Age: How to get the most out of mobile devices in the legal envir...The Digital Age: How to get the most out of mobile devices in the legal envir...
The Digital Age: How to get the most out of mobile devices in the legal envir...
 
Hadoop Enterprise Readiness
Hadoop Enterprise ReadinessHadoop Enterprise Readiness
Hadoop Enterprise Readiness
 
121211 improve your productivity
121211 improve your productivity121211 improve your productivity
121211 improve your productivity
 
Presentation 20111102
Presentation 20111102Presentation 20111102
Presentation 20111102
 
ITque Cloud Intro Webinar Slides - Feb 2013
ITque Cloud Intro Webinar Slides - Feb 2013ITque Cloud Intro Webinar Slides - Feb 2013
ITque Cloud Intro Webinar Slides - Feb 2013
 
considering the cloud? From IaaS to SaaS and Beyond - Find Your Path to the C...
considering the cloud? From IaaS to SaaS and Beyond - Find Your Path to the C...considering the cloud? From IaaS to SaaS and Beyond - Find Your Path to the C...
considering the cloud? From IaaS to SaaS and Beyond - Find Your Path to the C...
 
XebiaLabs Overview Slides
XebiaLabs Overview SlidesXebiaLabs Overview Slides
XebiaLabs Overview Slides
 
BYOD: Built for business, designed for end users (Feb 27, 2013 Innovation Din...
BYOD: Built for business, designed for end users (Feb 27, 2013 Innovation Din...BYOD: Built for business, designed for end users (Feb 27, 2013 Innovation Din...
BYOD: Built for business, designed for end users (Feb 27, 2013 Innovation Din...
 
Smarter Computing Integrated Systems
Smarter Computing Integrated SystemsSmarter Computing Integrated Systems
Smarter Computing Integrated Systems
 
Considering the Cloud? 5 Points to Consider
Considering the Cloud? 5 Points to ConsiderConsidering the Cloud? 5 Points to Consider
Considering the Cloud? 5 Points to Consider
 
Amazing Winter Keynote - IT as a Team Sport
Amazing Winter Keynote - IT as a Team SportAmazing Winter Keynote - IT as a Team Sport
Amazing Winter Keynote - IT as a Team Sport
 
How to Transform Enterprise Applications to On-premise Clouds with Wipro and ...
How to Transform Enterprise Applications to On-premise Clouds with Wipro and ...How to Transform Enterprise Applications to On-premise Clouds with Wipro and ...
How to Transform Enterprise Applications to On-premise Clouds with Wipro and ...
 
How to Transform Enterprise Applications to On-premise Clouds with Wipro and ...
How to Transform Enterprise Applications to On-premise Clouds with Wipro and ...How to Transform Enterprise Applications to On-premise Clouds with Wipro and ...
How to Transform Enterprise Applications to On-premise Clouds with Wipro and ...
 

Hp Fortify Cloud Application Security

  • 1. HP Fortify Cloud Security Name Title Enterprise Security © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
  • 2. The motivation © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
  • 3. Suddenly, the cloud is everywhere You hear buzzwords like… Private Hybrid clouds clouds Public clouds Community clouds … but, what does this all mean? 3 © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
  • 4. Why all the interest in the cloud Two primary reasons Reduce costs: • Hardware to procure, setup and maintain $ • Software to procure, install and patch • Employees to hire, train and retain Increase agility: • Instant provisioning and self service • Scale resources to meet business demands • Mobility and always on access for employees 4 © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
  • 5. Anatomy of a business pain point: an example Business selects Architecture and Evaluation/ POC Purchase Order placed application product review approved IT is too slow: • Many people • Many steps/ tasks More meetings Unpack and install in staging Hardware purchased and Planning meetings • Many weeks/ delivered months • Prone to errors Coordinate build Change control Re-cable, move User acceptance process approvals into production testing environment The whole process can take months! Weeks Months 5 © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
  • 6. No wonder, the business is sidestepping IT ―..developers are bypassing IT and putting applications onto public clouds at a rate 5x greater than IT thinks‖ …leading to shadow IT departments with increased risk for the business Source: You’re Not Ready For Internal Cloud, by James Staten, Forrester Research, Inc., July 26, 2010 6 © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
  • 7. The cloud opportunity Business Business is adopting cloud 5x faster than IT Cloud can benefit the organization IT • Increase time to value • Speed innovation • Accelerate business processes IT departments recognize the benefits, but concerns are slowing them down: • 70% CIOs have security top of mind1 • 75% CIOs demand high SLA guarantees for performance and availability2 • 63% Require integration of internal & external services2 • 79% concerned about lock-in2 1. Source: Goldman Sachs Equity Research, January 2011; 2. Source: IDC, Enterprise Panel Survey, November 2010 7 © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
  • 8. With the cloud, IT’s role becomes more strategic As the builder and broker of services Build on-premises, Transform legacy Manage across legacy Consume private and hybrid cloud infrastructure and applications and cloud off-premises, public services applications and assets services processes Traditional Public Private …. while doing this all securely 8 © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
  • 9. Key to broad cloud adoption and deployment: Trust Security Service level Compliance Control agreement Before the benefits and economics of cloud computing can be realized, organizations require a trusted cloud service 9 © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
  • 10. The solution © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
  • 11. What is cloud? Third era of computing 1960s 1980s 2000s Mainframe Client server Cloud 11 © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
  • 12. Cloud computing defined ―Cloud computing is a style of computing where scalable and elastic IT-enabled capabilities are delivered as a service to customers using internet or intranet technologies.‖ Key characteristics: Elastic: scale on demand to add IT as a or remove resources as needed service Shared: share a pool of resources Enabling to build economies of scale Metered: tracked with usage Compute as a utility metrics to enable multiple payment models Source: Gartner, Inc., Oct 2009 12 © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
  • 13. Cloud computing in pictures User management Broad Essential network Rapid Measured On-demand characteristics access elasticity service self-service Application Application Application Resourcing pooling Application Application platform Platform SaaS Service Software as a Platform as a Infrastructure as O/S O/S Image models Service (SaaS) Service (PaaS) a Service (IaaS) PaaS Network Deployment IaaS models Physical Public Private Hybrid Community Consumer responsible Provider responsible 13 © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. Source: NIST
  • 14. Security needs for cloud computing Same as the security controls in traditional, on-premise IT infrastructure App Applications SDLC, Binary Analysis, Scanners, WAFs, Transactional Security Information DLP, CMF, Database Activity Monitoring, Encryption Management SIEM, GRC, IAM, VA/VM, Patch Mgmt, Configuration Mgmt Network NIDS/NIPS, Firewalls, DPI, Anti-DDOS, QoS, DNSSEC Trusted computing Hardware, Software, RoT & API’s Compute & storage Host-based Firewalls, HIDS/HIPS, Encryption, FAM Physical Physical Access, CCTV, Guards Source Cloud Security Alliance 2011 14 © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
  • 15. Cloud application security concerns App Will we be Is it compliant? Are we secure? compromised? • Does the application meet all • Is the application securely • Has the provider’s cloud regulatory, legal and industry designed and developed for infrastructure been vigorously requirements? the cloud? tested? • Will the cloud provider • Has the legacy application • In this shared guarantee 24x7 SLA access been evaluated for cloud environment, are other to the application? readiness before migrating customer’s applications there? secure? 15 © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
  • 16. Big questions for cloud users Are you a consumer or a provider of the cloud? Cloud Consumers: Are your applications ready for the cloud? • Analysts estimate that as much as 75% of attacks are at the application layer • In the cloud, applications are the primary target of attacks • Cloud applications face the same set of security concerns as those on the ground, plus more Cloud Providers: Is your cloud infrastructure secure? • Providers need to ensure consumers that their data is secure • Need to manage the risk of liability for security incidents and breaches • Must test the security of their infrastructure 16 © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
  • 17. HP Fortify Software Security Center Identify and eliminate risk in existing applications and prevent the introduction of risk during application development— in-house or from vendors. • Protect business critical applications from advanced cyber attacks by removing security vulnerabilities from software In-house Outsourced • Accelerate time-to-value for achieving secure applications • Increase development productivity by enabling security to be built into software, rather than added on Commercial Open Source after it is deployed • Deliver risk intelligence from application development to improve operational security 17 © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
  • 18. HP Fortify on Demand Test all in-house or third-party applications quickly, accurately and affordably in the cloud– without the need for hardware, software or expertise. • Automate application security testing without hardware or software, and with minimal HP Fortify resources and expertise on Demand • Receive verified, correlated application security results in days • Achieve any government and industry regulatory compliance • Scale to test all applications– desktop, cloud and mobile—even those outside your control 18 © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
  • 19. Cloud specific features in HP Fortify products Cloud vulnerability analysis to test the readiness of software for cloud environments by finding issues specific to the cloud environment Cloud Readiness Scorecard™ to rate an application from weak to strong depending on the number of minor or major fixes required in deploying an application to the cloud Project Template for remediation that enables teams to zero in on the root cause of important security vulnerabilities HP Fortify Secure Coding Rulepacks that provides continual up-to-date guidelines on emerging threats identified by our advanced Security Research team 19 © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
  • 20. Cloud application security recommendations Find and fix vulnerabilities in existing applications before they are migrated to a cloud environment Audit new code / applications for resiliency in the target cloud environment Establish a remediation / feedback loop with software developers and outside vendors to deal with ongoing issues 20 © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
  • 21. Summary: cloud application security Comprehensive cloud application security solutions 1 That proactively identifies and eliminates risk in any cloud application or infrastructure To ensure that all cloud applications and infrastructures are trustworthy, 2 developed and deployed securely, and safe for all users and enterprises Achieving compliance with any government, industry and regulatory 3 standards and guidelines Available on-premise or on-demand, and with professional services 4 21 © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
  • 22. Thank You © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.

Notes de l'éditeur

  1. So much has been written, advertised and discussed about cloud computing, it is appropriate to define the term for common understanding. Cloud computing generally describes a method to supplement, consume and deliver IT services over the Internet. Web-based network resources, software and data services are shared under multi-tenancy and provided on-demand to customers. It is this central tenet of sharing - and the standardization it implies - that is the enabler of cloud computing’s core benefits. Cloud computing providers can amortize their costs across many clients and pass these savings on to them. This paradigm shift in computing infrastructure was a logical byproduct and consequence of the ease-of-access to remote and virtual computing sites provided by the Internet. The U.S. National Institute of Standards & Technology (NIST) defines four cloud deployment models: Community Cloud – Shares infrastructure between several organizations from a specific community with common concerns (e.g., security, compliance, jurisdiction), whether managed internally or by a third-party and hosted internally or externally. Public Cloud – The cloud infrastructure is provisioned by the cloud provider for open use by the general public. It may be owned, managed, and operated by a business, academic, or government organization, or some combination of them. Private Cloud – Infrastructure provisioned solely for a single organization, whether managed internally or by a third-party and hosted internally or externally. Hybrid Cloud – A composition of two or more clouds (private, community, or public) that remain unique entities but are bound together, offering the benefits of multiple deployment models. It can also be defined as multiple cloud systems that are connected in a way that allows programs and data to be moved easily from one deployment system to another.
  2. The cloud helps you in two ways: by reducing the costs for operating your business and at the same time increase business agility and flexibility.You need to start testing all your applications immediately. However, this can be an overwhelming endeavor. You need large upfront capital and human investments: Hardware to procure, setup and maintain for the test/ staging environment Software to procure, install and maintain to automate the testing People with the right expertise and experience in security to hire, train and retain Process to define and refine so that everything is standardized and efficient
  3. Some of the symptoms of that problem is that it takes an incredibly long time to get a server up and running and an application up and running.Multiple organizations, different areas of expertise whether it be server, storage, network and management, facilties. Whenever you plug in a server into this infrastructure, you have to cable it up to all those domains, but its not just the cable clutter if you will that is slowing things down, its also that every time you do one of these things, theres a process associated with it. And that process has a lot of manual overhead as well. So the end result is that the architecture that we have built in the last 10-15 years in the data center, kind of the rack, stack and wired world as its called in the past, this architecture forces some incredible organizational complexity on the customers when they go to a larger deployment. Complexity in terms of phy. As well as process complexity.We understand what the problem is and where it came from.[this slide is a simplification of the time-consuming process of standing up complex infrastructure. Make sure the customer sees their own process in all or part of the diagram]To provision new application infrastructure can takes weeks or months due to complexity. This process typically involves reviews and approvals, meetings and more meetings, plus the unpacking and implementation of the systems. The bottom left hand corner reflects the siloed nature of data center teams that must coordinate the build process across servers, network, storage and facilities, as in the previous slide. These meetings, handoffs and wait times between teams are just one aspect of the complexity in the overall provisioning process. [Note stop sign and heading back to the beginning in an endless loop] And sometimes the process can get derailed, requiring a return to the starting point and creating further delays.
  4. Key pointsMany business leaders recognize this and are already moving towards adopting cloud services faster than many IT leaders are comfortable with.Business users have been quick to recognize the cloud’s advantages in speeding innovation, accelerating business processes, and reducing time to revenue. The increasing simplicity of rich cloud services, combined with an increasing level of IT sophistication of the consumers and employees of modern enterprises has resulted in pressure being applied to IT to speed the adoption of cloud services, and in some cases even bypassing IT and signing up for public cloud services like those from Salesforce and Google, often accessed over a smartphone, tablet or laptop owned and managed by the employee instead of the one traditionally provided to them by the enterprise.In theory this is great news, especially if you’re a service provider, but the reality is that cloud adoption will stall in the enterprise unelss we can address a number of critical challenges. Enterprise IT leaders that have been slower to adopt cloud solutions cite well-founded concerns about the challenges of maintainging security, service levels and a portfolio governance seamlessly across the entire IT value chain while ensuring that the decisions they make about cloud technology suppliers today don’t prevent them from innovating in the future.
  5. To succeed, we need to rethink the role of the CIO and of IT. Moving from IT as a sole “supplier” or builder of services, to becoming the builder AND the broker of IT services. That means going beyond building world-class, reliable services inside the datacenter, but to create a core competency in aligning business needs with the optimal mix of internally and externally available services and then seamlessly blending them into a reliable, secure and compliant end-to-end experience.Starting with being able to source and consume the services you need from the market – building a network of suppliers you trust that can be relied upon to deliver at a predictable price and performance.CIO’s also need build a capability to act as an internal service provider, matching the transparency and flexibility of externally available services for those areas where either economies of scale, competitive advantage, risk or compliance mean that it makes more sense to provide their own services.No matter whether they seek to leverage public or private cloud services, both business and IT processes require transformation if they are to maximize the benefits of cloud technologies and ready the enterprise for accelerated innovation and improved agility.Finally, CIO’s need to manage and secure the entire IT value chain using the same consistent, seamless tools and processes or they risk creating silos that introduce cost, complexity and risk to hybrid environments.
  6. We think that cloud is the third generation of computing, after mainframes and client server. It actually represents the maturation of the Internet. It is important to have a common definition of the cloud.
  7. The slide above offers Gartner’s definition of cloud services, as well as fundamental characteristics which have progressively attracted consensus in the market. Almost everyone agrees today that cloud is an “evolved” way of delivering and consuming services, that leverages new technologies such as virtualization and automation, but also changes in the mindset of consumers (e.g: it is now totally accepted to wire money from your account to another one by using the internet portal of your bank). Some people would argue that is it essentially about leveraging new business models, or “consuming by the glass”, which is a drastic change in how IT use to deliver service (see the dedicated whitepaper on this).Also, when we talk about “what” we deliver as a service, we should be more specific: if we look at the typical technology layers within the enterprise, the majority of our customers talk about infrastructure, platform and applications. Cloud is enabling the delivery and consumption of those layers “as a service”.
  8. We use NIST’s cloud definition as the standard. It is important to understand that there are many different types of clouds: SaaS, a full business application, PaaS, a rapid application development environment, IaaS, basic compute and storage. They can be deployed in different ways, but they are all characterized as resource pooling with elasticity, multi-tenancy and metered serviceCloud Computing – a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction. Cloud Deployment Models Community Cloud – Shares infrastructure between several organizations from a specific community with common concerns (e.g., security, compliance, jurisdiction), whether managed internally or by a third-party and hosted internally or externally. Public Cloud – The cloud infrastructure is provisioned by the cloud provider for open use by the general public. It may be owned, managed, and operated by a business, academic, or government organization, or some combination of them. Private Cloud – Infrastructure provisioned solely for a single organization, whether managed internally or by a third-party and hosted internally or externally. Hybrid Cloud – A composition of two or more clouds (private, community, or public) that remain unique entities but are bound together, offering the benefits of multiple deployment models. It can also be defined as multiple cloud systems that are connected in a way that allows programs and data to be moved easily from one deployment system to another. Cloud Service Models Software as a Service (SaaS) – Employs the provider’s applications running on a cloud infrastructure. The applications are accessible from various client devices through either a thin client interface, such as a web browser (e.g., web-based email), or a program interface. The provider manages or controls the underlying cloud infrastructure with the possible exception of limited user-specific application configuration settings. Platform as a Service (PaaS) – Consumer-created or acquired applications supported by the provider are deployed onto the cloud infrastructure which the provider manages or controls. The consumer has control over the deployed applications and possible configuration settings for the application-hosting environment. Infrastructure as a Service (IaaS) – The consumer provisions processing, storage, networks, and other fundamental computing resources where the consumer is able to deploy and run arbitrary software, which can include operating systems and applications. The provider manages or controls the underlying cloud infrastructure while the consumer has control over operating systems, storage, and deployed applications; and possible limited control of select networking components (e.g., host firewalls). With IT transformation to the cloud, many of the traditional layers have been abstracted from customers perspective. Customers care more about who is accessing which application/data, and less about which platform the application is running on. Cloud Service Providers have increasing security responsibilities as they move from IaaS to PaaS, to SaaS.IaaS: For example, a LAMP stack (Linux, Apache web-server, MySQL DB, and Perl/PHP/Python) deployed on Amazons EC2 would be classified as a public off-premise, 3rd party managed IaaS solution, even if the instances and applications/data contained within them are owned by the Cloud consumer. Here Amazon is responsible for Infrastructure Security for the Physical and Network level. The consumer is responsible for securing the O/S, Apache Web-server and the MySQL DB.PaaS: Google App Engine includes – dynamic web-server, peristent storage, automatic scaling and load balancing, a Java/Python runtime and development environment, task queues, etc. Here Google provides the tools to secure the platform (e.g. JVM) and application by providing tools to integrate with Google accounts.SaaS: SalesForce.com – provides a purposeful set of applications that are hosted in the cloud. SalesForce.com takes care of protection of all layers – physical, network, system, database, application and users.
  9. The security of the cloud depends not only the physical location of the assets (internal or external), but also the sensitivity of the information, who is consuming the information (multi-tenant Vs single tenant), and who is responsible for the governance, security, and compliance.Security risks depend on:Data classification of the assets, resources, and information being managed?Who manages them and how?Which controls are selected and how they are integrated?Compliance requirements?
  10. Fortify gives you advanced technologies to ensure your applications are secure. Fortify inspects applications at the source code level (static testing) and while they are running (dynamic testing). Fortify supports more languages than any other application security vendor with significant strengths in the area of mobile application security. But it’s not just built for custom applications, Fortify and determine if vulnerabilities exist in commercial, custom and open source activities. And even more differentiated, Fortify can be delivered as a software you purchase or as a service. With unmatched flexibilityand depth of coverage, Fortify ensures you have a world class application security program in place.
  11. Fortify gives you advanced technologies to ensure your applications are secure. Fortify inspects applications at the source code level (static testing) and while they are running (dynamic testing). Fortify supports more languages than any other application security vendor with significant strengths in the area of mobile application security. But it’s not just built for custom applications, Fortify and determine if vulnerabilities exist in commercial, custom and open source activities. And even more differentiated, Fortify can be delivered as a software you purchase or as a service. With unmatched flexibility and depth of coverage, Fortify ensures you have a world class application security program in place.You simply upload an application’s binaries and/or provide a URL for testing, using a highly secure cloud environment designed to safeguard sensitive uploads and intellectual property. HP Fortify on Demand then conducts a static and/or dynamic test and security experts verify the results. It presents correlated findings in an unbiased, tamper-proof report with results in just days, regardless of application size.