SlideShare a Scribd company logo
© 2019 Denim Group – All Rights Reserved
Assessing Business Operations
Risk with Unified Vulnerability
Management in ThreadFix 3.0
03/28/2019
Dan Cornell, CTO
Kyle Pippin, ThreadFix Product Manager
© 2019 Denim Group – All Rights Reserved 1
Advisory
Services
Assessment
Services
Remediation
Services
Vulnerability Resolution
Platform
Building a world where technology is trusted
• Since 2001, helping secure software
• Development background
• Tools + services model
© 2019 Denim Group – All Rights Reserved
ThreadFix Overview
• Create a consolidated view of your applications and
vulnerabilities
• Prioritize application risk decisions based on data
• Translate vulnerabilities to developers in the tools they are
already using
• Provide access to powerful analytics
2
44% Reduction
in Time-To-Fix
Vulnerabilities
Up To 5x Increase in
AppSec Assessment
Productivity
© 2019 Denim Group – All Rights Reserved
ThreadFix Data Flow
3
© 2019 Denim Group – All Rights Reserved
Who Benefits and How?
• Security Team
• Run more efficient and effective application security
programs
(200-500% increase in testing throughput, 15-35%
reduction in findings requiring triage)
• Development Teams
• Direct testing and receive results via tools and platforms
already in use (Jenkins, JIRA, etc)
• Risk-management Team
• Faster resolution of key vulnerabilities (up to 44%
reduction in mean-time-to-fix)
4
© 2019 Denim Group – All Rights Reserved
Test Result Consolidation
5
• Organizations typically
see a 15-35% reduction in
finding count due to
normalization and de-
duplication.
• Includes technology from
Denim Group patents:
• US 10,043,012 Method
of Correlating Static and
Dynamic Application
Security Testing Results
for Web Applications
• US 10,043,004 Method
of Correlating Static and
Dynamic Application
Security Testing Results
for a Web and Mobile
Application
© 2019 Denim Group – All Rights Reserved
Integrate & Automate
6
i.o.
SecurityCenter
De-Dup
Merge
Correlate
History
Settings
Policy
False Positives
Risk Triage
Consolidate
Remediation
Profiles
Templates
Actionable
Tracked
Insights
Verification
HotSpots
Alerting
Findings & Vulnerability Management Pipeline
Automated/Orchestrated
Pre-Processing
Reduce Vulns to Manage
Manage by Policy & Settings
Single Portal
for:
ITAO’s
Dev’s
SME’s
SecChamps
Dev’s & SME’s
Work in daily
tools, and
existing
workflows
Security
Program &
Policy
Management
and reporting
Tableau
Business
Object
Power BI
Archer
Custom
Reporting
External
System
Integration
Manual
© 2019 Denim Group – All Rights Reserved
Orchestrate
7
Build Sec into DevOps:
• Integrate automated Sec
into CI/CD
• Orchestrate scans
• Rapid pass/fail/warn
based on predefined
policies
• Auto creation of bugs for
Dev Team
ScannersBug
Trackers
Dev (CI/CD) Sec
Auto build
Sec check
Sec pass/fail/warn
Bugs (Sec Vulns)
Auto
execute
scanners
An example of ThreadFix’s security orchestration
© 2019 Denim Group – All Rights Reserved
Defect Tracker Integration
8
• Bi-directional
integration: bundle
vulnerabilities into
software defects,
track development
team progress
resolving them
• Reduction of Mean
Time To Fix (MTTF)
up to 44%
© 2019 Denim Group – All Rights Reserved
Outsource Testing via ThreadFix
• Make service requests from ThreadFix and
receive and view results directly within the
platform
• Gives organizations both strategic and
tactical flexibility:
• Strategic: “What technologies and capabilities do
we want to manage in-house, and what do we
want to outsource?”
• Tactical: Provides surge access to delivery
capabilities when needed
9
© 2019 Denim Group – All Rights Reserved
Demo
© 2019 Denim Group – All Rights Reserved
Demo AppSec
© 2019 Denim Group – All Rights Reserved
Applications and Their Infrastructure
• Applications expose organizations to risk
• But applications run on infrastructure
• Servers, routers, NLBs
• Infrastructure also exposes organizations
to risk
• ThreadFix 3.0 treats network and
infrastructure assets as first-class items
12
© 2019 Denim Group – All Rights Reserved
Unified Vulnerability Management
• Define “networks”
• Import scanning results
• Tenable Nessus
• Qualys
• Rapid7 InsightVM
• Correlate applications with their infrastructure
• Provides a unified view into risk from
vulnerabilities
13
© 2019 Denim Group – All Rights Reserved
Bonus: New UI/UX
14
© 2019 Denim Group – All Rights Reserved
Demo InfoSec
15
© 2019 Denim Group – All Rights Reserved
Architectural Changes
• Microservices architecture
• Stream-based data ingestion
• Elastic Search-based reporting
• More powerful and flexible tuning and scaling
• Containerized
• Easy to install
• Easy to maintain
16
© 2019 Denim Group – All Rights Reserved
Demo Unified Environment
17
© 2019 Denim Group – All Rights Reserved
ThreadFix 3.0 Summary
• Network and infrastructure support and
correlation provides unified vulnerability
management
• Embedded outsourced testing allows for
strategic and tactical decisions about your
security program
• New architecture provides for easier
installation, maintenance, and scaling
18
© 2019 Denim Group – All Rights Reserved
www.threadfix.it
www.denimgroup.com
19
dan@denimgroup.com
kyle@denimgroup.com
threadfix.it

More Related Content

What's hot (20)

PPTX
Technologies for Security and Compliance by Ken McIntyre, Ercot
TheAnfieldGroup
 
PDF
Enabling Developers in Your Application Security Program With Coverity and Th...
Denim Group
 
PDF
Cyber security series administrative control breaches
Jim Kaplan CIA CFE
 
PDF
The Borderless Enterprise: Adapting Network Management to Mobility, Cloud, & ...
Enterprise Management Associates
 
PPTX
Delivering an Exceptional Wireless Classroom Experience - Dennis Holmes Sessi...
Internetwork Engineering (IE)
 
PPTX
Best Practices for Certificate Management
AppViewX
 
PDF
#OSSPARIS19 - Understanding Open Source Governance - Gilles Gravier, Wipro Li...
Paris Open Source Summit
 
PDF
Bridging the Gap Between Your Security Defenses and Critical Data
IBM Security
 
PPTX
Key Findings from the State of Application Delivery 2015
F5 Networks
 
PDF
The savvy security leader final dg ppt issa_la
ISSA LA
 
PPTX
A business driven approach to security policy management a technical perspec...
AlgoSec
 
PPTX
Reasons to choose cloud security
CloudOYE - Cloud Hosting Provider
 
PDF
IT Service & Asset Management Better Together
Ivanti
 
PPTX
2019 02-20 micro-segmentation based network security strategies (yoni geva)
AlgoSec
 
PPTX
Post Wannacry Update
Thomas Springer
 
PPTX
Datacenter 2014: Trend Micro - Bill MCGee
Mediehuset Ingeniøren Live
 
PDF
The Savvy Security Leader: Using Guerrilla Tactics to ID Security Program Res...
Denim Group
 
PDF
ePlus Managed Security Services
ePlus
 
PDF
2021 02-17 v mware-algo-sec securely accelerate your digital transformation w...
AlgoSec
 
PPTX
Webinar: How Greater Visibility of Software Assets is Saving Chicago Public ...
Flexera
 
Technologies for Security and Compliance by Ken McIntyre, Ercot
TheAnfieldGroup
 
Enabling Developers in Your Application Security Program With Coverity and Th...
Denim Group
 
Cyber security series administrative control breaches
Jim Kaplan CIA CFE
 
The Borderless Enterprise: Adapting Network Management to Mobility, Cloud, & ...
Enterprise Management Associates
 
Delivering an Exceptional Wireless Classroom Experience - Dennis Holmes Sessi...
Internetwork Engineering (IE)
 
Best Practices for Certificate Management
AppViewX
 
#OSSPARIS19 - Understanding Open Source Governance - Gilles Gravier, Wipro Li...
Paris Open Source Summit
 
Bridging the Gap Between Your Security Defenses and Critical Data
IBM Security
 
Key Findings from the State of Application Delivery 2015
F5 Networks
 
The savvy security leader final dg ppt issa_la
ISSA LA
 
A business driven approach to security policy management a technical perspec...
AlgoSec
 
Reasons to choose cloud security
CloudOYE - Cloud Hosting Provider
 
IT Service & Asset Management Better Together
Ivanti
 
2019 02-20 micro-segmentation based network security strategies (yoni geva)
AlgoSec
 
Post Wannacry Update
Thomas Springer
 
Datacenter 2014: Trend Micro - Bill MCGee
Mediehuset Ingeniøren Live
 
The Savvy Security Leader: Using Guerrilla Tactics to ID Security Program Res...
Denim Group
 
ePlus Managed Security Services
ePlus
 
2021 02-17 v mware-algo-sec securely accelerate your digital transformation w...
AlgoSec
 
Webinar: How Greater Visibility of Software Assets is Saving Chicago Public ...
Flexera
 

Similar to Assessing Business Operations Risk With Unified Vulnerability Management in ThreadFix 3.0 (20)

PDF
Optimize Your Security Program with ThreadFix 2.7
Denim Group
 
PDF
Managing Penetration Testing Programs and Vulnerability Time to Live with Thr...
Denim Group
 
PDF
A New View of Your Application Security Program with Snyk and ThreadFix
Denim Group
 
PDF
ThreadFix 2.5 Webinar
Denim Group
 
PDF
Enabling Developers in Your Application Security Program With Coverity and Th...
Denim Group
 
PDF
ThreadFix 2.4: Maximizing the Impact of Your Application Security Resources
Denim Group
 
PDF
Application Asset Management with ThreadFix
Denim Group
 
PPTX
Thread Fix Tour Presentation Final Final
Robin Lutchansky
 
PDF
ThreadFix 2.1 and Your Application Security Program
Denim Group
 
PDF
SecDevOps: Development Tools for Security Pros
Denim Group
 
PDF
Managing Your Application Security Program with the ThreadFix Ecosystem
Denim Group
 
PDF
ThreadFix 2.2 Preview Webinar with Dan Cornell
Denim Group
 
PDF
Secure DevOps with ThreadFix 2.3
Denim Group
 
PDF
Running a Comprehensive Application Security Program with Checkmarx and Threa...
Denim Group
 
PDF
Optimizing Your Application Security Program with Netsparker and ThreadFix
Denim Group
 
PDF
RSA 2015 Blending the Automated and the Manual: Making Application Vulnerabil...
Denim Group
 
PDF
AppSec Fast and Slow: Your DevSecOps CI/CD Pipeline Isn’t an SSA Program
Denim Group
 
PDF
ThreadFix and SD Elements Unifying Security Requirements and Vulnerability Ma...
Denim Group
 
PDF
Running a High-Efficiency, High-Visibility Application Security Program with...
Denim Group
 
PDF
The Self Healing Cloud: Protecting Applications and Infrastructure with Autom...
Denim Group
 
Optimize Your Security Program with ThreadFix 2.7
Denim Group
 
Managing Penetration Testing Programs and Vulnerability Time to Live with Thr...
Denim Group
 
A New View of Your Application Security Program with Snyk and ThreadFix
Denim Group
 
ThreadFix 2.5 Webinar
Denim Group
 
Enabling Developers in Your Application Security Program With Coverity and Th...
Denim Group
 
ThreadFix 2.4: Maximizing the Impact of Your Application Security Resources
Denim Group
 
Application Asset Management with ThreadFix
Denim Group
 
Thread Fix Tour Presentation Final Final
Robin Lutchansky
 
ThreadFix 2.1 and Your Application Security Program
Denim Group
 
SecDevOps: Development Tools for Security Pros
Denim Group
 
Managing Your Application Security Program with the ThreadFix Ecosystem
Denim Group
 
ThreadFix 2.2 Preview Webinar with Dan Cornell
Denim Group
 
Secure DevOps with ThreadFix 2.3
Denim Group
 
Running a Comprehensive Application Security Program with Checkmarx and Threa...
Denim Group
 
Optimizing Your Application Security Program with Netsparker and ThreadFix
Denim Group
 
RSA 2015 Blending the Automated and the Manual: Making Application Vulnerabil...
Denim Group
 
AppSec Fast and Slow: Your DevSecOps CI/CD Pipeline Isn’t an SSA Program
Denim Group
 
ThreadFix and SD Elements Unifying Security Requirements and Vulnerability Ma...
Denim Group
 
Running a High-Efficiency, High-Visibility Application Security Program with...
Denim Group
 
The Self Healing Cloud: Protecting Applications and Infrastructure with Autom...
Denim Group
 
Ad

More from Denim Group (20)

PDF
Long-term Impact of Log4J
Denim Group
 
PDF
Threat Modeling the CI/CD Pipeline to Improve Software Supply Chain Security ...
Denim Group
 
PDF
Threat Modeling the CI/CD Pipeline to Improve Software Supply Chain Security ...
Denim Group
 
PDF
Optimizing Security Velocity in Your DevSecOps Pipeline at Scale
Denim Group
 
PDF
OWASP San Antonio Meeting 10/2/20
Denim Group
 
PDF
Security Champions: Pushing Security Expertise to the Edges of Your Organization
Denim Group
 
PDF
The As, Bs, and Four Cs of Testing Cloud-Native Applications
Denim Group
 
PDF
An Updated Take: Threat Modeling for IoT Systems
Denim Group
 
PDF
AppSec in a World of Digital Transformation
Denim Group
 
PDF
The As, Bs, and Four Cs of Testing Cloud-Native Applications
Denim Group
 
PDF
AppSec in a World of Digital Transformation
Denim Group
 
PDF
Enumerating Enterprise Attack Surface
Denim Group
 
PDF
Enumerating Enterprise Attack Surface
Denim Group
 
PDF
An OWASP SAMM Perspective on Serverless Computing
Denim Group
 
PDF
Application Security Testing for a DevOps Mindset
Denim Group
 
PDF
Reducing Attack Surface in Budget Constrained Environments
Denim Group
 
PDF
Securing Voting Infrastructure before the Mid-Term Elections
Denim Group
 
PDF
Threat Modeling for IoT Systems
Denim Group
 
PDF
Understanding IoT Security: How to Quantify Security Risk of IoT Technologies
Denim Group
 
PDF
How to Integrate AppSec Testing into your DevOps Program
Denim Group
 
Long-term Impact of Log4J
Denim Group
 
Threat Modeling the CI/CD Pipeline to Improve Software Supply Chain Security ...
Denim Group
 
Threat Modeling the CI/CD Pipeline to Improve Software Supply Chain Security ...
Denim Group
 
Optimizing Security Velocity in Your DevSecOps Pipeline at Scale
Denim Group
 
OWASP San Antonio Meeting 10/2/20
Denim Group
 
Security Champions: Pushing Security Expertise to the Edges of Your Organization
Denim Group
 
The As, Bs, and Four Cs of Testing Cloud-Native Applications
Denim Group
 
An Updated Take: Threat Modeling for IoT Systems
Denim Group
 
AppSec in a World of Digital Transformation
Denim Group
 
The As, Bs, and Four Cs of Testing Cloud-Native Applications
Denim Group
 
AppSec in a World of Digital Transformation
Denim Group
 
Enumerating Enterprise Attack Surface
Denim Group
 
Enumerating Enterprise Attack Surface
Denim Group
 
An OWASP SAMM Perspective on Serverless Computing
Denim Group
 
Application Security Testing for a DevOps Mindset
Denim Group
 
Reducing Attack Surface in Budget Constrained Environments
Denim Group
 
Securing Voting Infrastructure before the Mid-Term Elections
Denim Group
 
Threat Modeling for IoT Systems
Denim Group
 
Understanding IoT Security: How to Quantify Security Risk of IoT Technologies
Denim Group
 
How to Integrate AppSec Testing into your DevOps Program
Denim Group
 
Ad

Recently uploaded (20)

PDF
GDG Cloud Southlake #44: Eyal Bukchin: Tightening the Kubernetes Feedback Loo...
James Anderson
 
PDF
Quantum AI Discoveries: Fractal Patterns Consciousness and Cyclical Universes
Saikat Basu
 
PDF
Kubernetes - Architecture & Components.pdf
geethak285
 
PDF
Hello I'm "AI" Your New _________________
Dr. Tathagat Varma
 
PDF
LLM Search Readiness Audit - Dentsu x SEO Square - June 2025.pdf
Nick Samuel
 
PDF
How to Visualize the ​Spatio-Temporal Data Using CesiumJS​
SANGHEE SHIN
 
PDF
“Scaling i.MX Applications Processors’ Native Edge AI with Discrete AI Accele...
Edge AI and Vision Alliance
 
PDF
Understanding AI Optimization AIO, LLMO, and GEO
CoDigital
 
PDF
DoS Attack vs DDoS Attack_ The Silent Wars of the Internet.pdf
CyberPro Magazine
 
PPTX
2025 HackRedCon Cyber Career Paths.pptx Scott Stanton
Scott Stanton
 
PDF
99 Bottles of Trust on the Wall — Operational Principles for Trust in Cyber C...
treyka
 
PDF
Plugging AI into everything: Model Context Protocol Simplified.pdf
Abati Adewale
 
PPTX
Enabling the Digital Artisan – keynote at ICOCI 2025
Alan Dix
 
PDF
The Future of Product Management in AI ERA.pdf
Alyona Owens
 
PPTX
Practical Applications of AI in Local Government
OnBoard
 
PDF
FME as an Orchestration Tool with Principles From Data Gravity
Safe Software
 
PDF
Automating the Geo-Referencing of Historic Aerial Photography in Flanders
Safe Software
 
PPTX
Smart Factory Monitoring IIoT in Machine and Production Operations.pptx
Rejig Digital
 
PDF
Enhancing Environmental Monitoring with Real-Time Data Integration: Leveragin...
Safe Software
 
PPTX
MARTSIA: A Tool for Confidential Data Exchange via Public Blockchain - Pitch ...
Michele Kryston
 
GDG Cloud Southlake #44: Eyal Bukchin: Tightening the Kubernetes Feedback Loo...
James Anderson
 
Quantum AI Discoveries: Fractal Patterns Consciousness and Cyclical Universes
Saikat Basu
 
Kubernetes - Architecture & Components.pdf
geethak285
 
Hello I'm "AI" Your New _________________
Dr. Tathagat Varma
 
LLM Search Readiness Audit - Dentsu x SEO Square - June 2025.pdf
Nick Samuel
 
How to Visualize the ​Spatio-Temporal Data Using CesiumJS​
SANGHEE SHIN
 
“Scaling i.MX Applications Processors’ Native Edge AI with Discrete AI Accele...
Edge AI and Vision Alliance
 
Understanding AI Optimization AIO, LLMO, and GEO
CoDigital
 
DoS Attack vs DDoS Attack_ The Silent Wars of the Internet.pdf
CyberPro Magazine
 
2025 HackRedCon Cyber Career Paths.pptx Scott Stanton
Scott Stanton
 
99 Bottles of Trust on the Wall — Operational Principles for Trust in Cyber C...
treyka
 
Plugging AI into everything: Model Context Protocol Simplified.pdf
Abati Adewale
 
Enabling the Digital Artisan – keynote at ICOCI 2025
Alan Dix
 
The Future of Product Management in AI ERA.pdf
Alyona Owens
 
Practical Applications of AI in Local Government
OnBoard
 
FME as an Orchestration Tool with Principles From Data Gravity
Safe Software
 
Automating the Geo-Referencing of Historic Aerial Photography in Flanders
Safe Software
 
Smart Factory Monitoring IIoT in Machine and Production Operations.pptx
Rejig Digital
 
Enhancing Environmental Monitoring with Real-Time Data Integration: Leveragin...
Safe Software
 
MARTSIA: A Tool for Confidential Data Exchange via Public Blockchain - Pitch ...
Michele Kryston
 

Assessing Business Operations Risk With Unified Vulnerability Management in ThreadFix 3.0

  • 1. © 2019 Denim Group – All Rights Reserved Assessing Business Operations Risk with Unified Vulnerability Management in ThreadFix 3.0 03/28/2019 Dan Cornell, CTO Kyle Pippin, ThreadFix Product Manager
  • 2. © 2019 Denim Group – All Rights Reserved 1 Advisory Services Assessment Services Remediation Services Vulnerability Resolution Platform Building a world where technology is trusted • Since 2001, helping secure software • Development background • Tools + services model
  • 3. © 2019 Denim Group – All Rights Reserved ThreadFix Overview • Create a consolidated view of your applications and vulnerabilities • Prioritize application risk decisions based on data • Translate vulnerabilities to developers in the tools they are already using • Provide access to powerful analytics 2 44% Reduction in Time-To-Fix Vulnerabilities Up To 5x Increase in AppSec Assessment Productivity
  • 4. © 2019 Denim Group – All Rights Reserved ThreadFix Data Flow 3
  • 5. © 2019 Denim Group – All Rights Reserved Who Benefits and How? • Security Team • Run more efficient and effective application security programs (200-500% increase in testing throughput, 15-35% reduction in findings requiring triage) • Development Teams • Direct testing and receive results via tools and platforms already in use (Jenkins, JIRA, etc) • Risk-management Team • Faster resolution of key vulnerabilities (up to 44% reduction in mean-time-to-fix) 4
  • 6. © 2019 Denim Group – All Rights Reserved Test Result Consolidation 5 • Organizations typically see a 15-35% reduction in finding count due to normalization and de- duplication. • Includes technology from Denim Group patents: • US 10,043,012 Method of Correlating Static and Dynamic Application Security Testing Results for Web Applications • US 10,043,004 Method of Correlating Static and Dynamic Application Security Testing Results for a Web and Mobile Application
  • 7. © 2019 Denim Group – All Rights Reserved Integrate & Automate 6 i.o. SecurityCenter De-Dup Merge Correlate History Settings Policy False Positives Risk Triage Consolidate Remediation Profiles Templates Actionable Tracked Insights Verification HotSpots Alerting Findings & Vulnerability Management Pipeline Automated/Orchestrated Pre-Processing Reduce Vulns to Manage Manage by Policy & Settings Single Portal for: ITAO’s Dev’s SME’s SecChamps Dev’s & SME’s Work in daily tools, and existing workflows Security Program & Policy Management and reporting Tableau Business Object Power BI Archer Custom Reporting External System Integration Manual
  • 8. © 2019 Denim Group – All Rights Reserved Orchestrate 7 Build Sec into DevOps: • Integrate automated Sec into CI/CD • Orchestrate scans • Rapid pass/fail/warn based on predefined policies • Auto creation of bugs for Dev Team ScannersBug Trackers Dev (CI/CD) Sec Auto build Sec check Sec pass/fail/warn Bugs (Sec Vulns) Auto execute scanners An example of ThreadFix’s security orchestration
  • 9. © 2019 Denim Group – All Rights Reserved Defect Tracker Integration 8 • Bi-directional integration: bundle vulnerabilities into software defects, track development team progress resolving them • Reduction of Mean Time To Fix (MTTF) up to 44%
  • 10. © 2019 Denim Group – All Rights Reserved Outsource Testing via ThreadFix • Make service requests from ThreadFix and receive and view results directly within the platform • Gives organizations both strategic and tactical flexibility: • Strategic: “What technologies and capabilities do we want to manage in-house, and what do we want to outsource?” • Tactical: Provides surge access to delivery capabilities when needed 9
  • 11. © 2019 Denim Group – All Rights Reserved Demo
  • 12. © 2019 Denim Group – All Rights Reserved Demo AppSec
  • 13. © 2019 Denim Group – All Rights Reserved Applications and Their Infrastructure • Applications expose organizations to risk • But applications run on infrastructure • Servers, routers, NLBs • Infrastructure also exposes organizations to risk • ThreadFix 3.0 treats network and infrastructure assets as first-class items 12
  • 14. © 2019 Denim Group – All Rights Reserved Unified Vulnerability Management • Define “networks” • Import scanning results • Tenable Nessus • Qualys • Rapid7 InsightVM • Correlate applications with their infrastructure • Provides a unified view into risk from vulnerabilities 13
  • 15. © 2019 Denim Group – All Rights Reserved Bonus: New UI/UX 14
  • 16. © 2019 Denim Group – All Rights Reserved Demo InfoSec 15
  • 17. © 2019 Denim Group – All Rights Reserved Architectural Changes • Microservices architecture • Stream-based data ingestion • Elastic Search-based reporting • More powerful and flexible tuning and scaling • Containerized • Easy to install • Easy to maintain 16
  • 18. © 2019 Denim Group – All Rights Reserved Demo Unified Environment 17
  • 19. © 2019 Denim Group – All Rights Reserved ThreadFix 3.0 Summary • Network and infrastructure support and correlation provides unified vulnerability management • Embedded outsourced testing allows for strategic and tactical decisions about your security program • New architecture provides for easier installation, maintenance, and scaling 18
  • 20. © 2019 Denim Group – All Rights Reserved www.threadfix.it www.denimgroup.com 19 [email protected] [email protected] threadfix.it