Channels -> ISV
By: Bloor Research
Published: September 2010
The use of complex software is now part of daily business life. Unfortunately cyber criminals are taking advantage of this to spread malware and to attack systems with the aim of stealing information, money and intellectual property.
Information security specialists have been relatively successful in protecting networks and data systems from these cyber criminals but, to date, computer software has been an Achilles heel, open to attacks that take advantage of bugs and errors in computer code. Once a security bug is found it can be abused by cyber criminals whilst a business, in many cases, remains blissfully unaware that they are under attack. Computer software must therefore be checked for security related bugs—a process that has historically been very manually intensive and expensive, with limited scalability and needing access to the underlying source code.
With the approach that Veracode takes with their cloud-based SecurityReview service, software can be tested for security flaws quickly and efficiently, using industry standard measurements to evidence the relative quality of software under test without requiring source code. For internal software development teams, the Veracode solution is easily integrated into the software development lifecycle providing a software security testing service.
With the Veracode solution it really is a case of no software, no source code, no problem.
By downloading you agree to our Terms and Conditions. These include information regarding use of your personal data.
Published by: electronicdawn Ltd.