Synopsys Redefines Interactive Application Security Testing with New Seeker Solution for DevSecOps

Continuously detects and verifies web app vulnerabilities at the speed of DevOps, identifies and tracks sensitive data for compliance

LONDON, UK., July 31, 2018Synopsys, Inc. (Nasdaq: SNPS) today announced the availability of the latest major Seeker® release, an interactive application security testing (IAST) solution redesigned to enable DevSecOps and continuous delivery of secure web applications. Seeker integrates seamlessly into CI/CD pipelines and monitors web applications during preproduction testing cycles. Using patented technology, Seeker is the only application security solution that detects and automatically verifies whether vulnerabilities are exploitable, providing developers with accurate, actionable information in real time.

http://brn.firetrench.com

 

Click to learn more about Seeker for interactive application security testing and register for our upcoming webinar on Aug. 28, 2018.

“With 34% of developers saying they build multiple times per day or during check-in, application security testing must run in these same time frames or risk grinding the development machine to a halt,” wrote Amy DeMartine, principal analyst at Forrester Research. “Dynamic application security testing (DAST) has long been a burden for organisations trying to test security at development speeds.”1

Seeker’s unique approach continuously mitigates application security risk in a tight feedback loop, complementing DAST scans and penetration tests that occur later in the development cycle and often require dedicated, out-of-band testing cycles and manual results verification and triage. To address software dependency risk, Seeker integrates Black Duck Binary Analysis (formerly Protecode SC) to automatically detect known vulnerabilities and license conflicts in open source components. Seeker is also the only IAST solution that provides sensitive-data tracking to help achieve compliance with standards and regulations like PCI DSS and GDPR. Seeker is easy to deploy out of the box and supports large-scale, cloud-based, and microservices-based application architectures.

“Seeker is designed specifically for organisations embracing DevOps and leveraging automation to deliver continuous software improvements to their customers,” said Andreas Kuehlmann, general manager of the Synopsys Software Integrity Group. “Due to its continuous monitoring, unrivaled accuracy, and contextualised remediation guidance, Seeker removes the manual elements of security testing and enables developers to take ownership of application risk.”

Key features of Seeker 2018.07 include:

  • Active vulnerability verification for unrivaled accuracy: Seeker is the only IAST solution that provides automated active verification to confirm that detected vulnerabilities are exploitable. This verification is achieved through patented technology that replays original HTTP(S) requests with tainted parameters and monitors the resulting application dataflow. The result is a near-zero false positive rate, which is significantly lower than that of other IAST and DAST solutions and reduces the cost of manual verification.
  • Sensitive-data tracking: Seeker is the only IAST tool that enables security teams to identify and track sensitive data, such as credit card numbers, usernames, and passwords, to ensure that it is handled securely and not stored in log files or databases with weak or no encryption. Sensitive-data tracking helps organizations comply with data security regulations including PCI DSS, HIPAA, and GDPR.
  • CI/CD integration and flexible deployment: Seeker can be deployed in virtually any type of automated or manual testing environment with minimal configuration required. Seeker fits seamlessly into CI/CD pipelines with native plugins and easy-to-use web APIs for bug tracking, build, and test automation tools. Seeker supports standard, microservices-based, and cloud-based application architectures and is scalable for large enterprise requirements.

Click to learn more about Seeker for interactive application security testing and register for our upcoming webinar on Aug. 28, 2018.

1. Amy DeMartine, Construct a Business Case for Interactive Application Security Testing, Forrester Research, Inc., Nov. 3, 2017.

About the Synopsys Software Integrity Platform

Synopsys helps development teams build secure, high-quality software, minimizing risks while maximizing speed and productivity. Synopsys, a recognized leader in application security, provides static analysis, software composition analysis, and dynamic analysis solutions that enable teams to quickly find and fix vulnerabilities and defects in proprietary code, open source components, and application behavior. With a combination of industry-leading tools, services, and expertise, only Synopsys helps organizations optimize security and quality in DevSecOps and throughout the software development life cycle. Learn more at www.synopsys.com/software.

About Synopsys

Synopsys, Inc. (Nasdaq: SNPS) is the Silicon to Software partner for innovative companies developing the electronic products and software applications we rely on every day. As the world’s 15th largest software company, Synopsys has a long history of being a global leader in electronic design automation (EDA) and semiconductor IP and is also growing its leadership in software security and quality solutions. Whether you’re a system-on-chip (SoC) designer creating advanced semiconductors, or a software developer writing applications that require the highest security and quality, Synopsys has the solutions needed to deliver innovative, high-quality, secure products. Learn more at www.synopsys.com.

Continue reading

NORAUTO gets set for the 37th Copa del Rey MAPFRE

GC32 Lagos Cup, Portugal. Day 4. Jesus Renedo/GC32 Racing Tour.
01 July, 2018.

Jesus Renedo/GC32 Racing Tour –

For the third event of the GC32 Racing Tour 2018, the GC32 flying catamarans have arrived in Palma de Mallorca to participate in the largest and most prestigious multi-class regatta in the Mediterranean: the Copa del Rey MAPFRE. The international sailing elite has come together for a week of intense racing. Heading the provisional ranking of the GC32 Racing Tour after two events, Franck Cammas and his sponsor Norauto are keyed up and ready for battle and hope to once again finish top of the podium.

http://bbn.firetrench.com

 

Continue reading

Spam Is Still the Choice of Online Criminals, 40 Years Later

Spam is the number one source of malware as criminals add a few new tricks to this classic method, new research from F-Secure and MWR InfoSecurity finds.

Helsinki, Finland – 31 July 2018: Online criminals have gotten savvier but they’re still relying on the same old tricks they’ve been using for decades. F-Secure research shows spam remains the most common method of spreading malicious URLs, scams and malware more than 40 years after the first email spam was sent.*

http://brn.firetrench.com

Continue reading