SlideShare a Scribd company logo
Joost de Jong
January, 2017
Veracode Introduction
2
The world
is under
attack from
cybercrime
and nation
states
3
Description
Veracode is a U.S.-based, well-established and rapidly
growing provider of SAST and DAST cloud services, software
supply chain testing and mobile AST. For SAST, Veracode has
been a pioneer in the analysis of binary code, not requiring the
source code for testing. Its 2012 acquisition of Marvin security
accelerated its mobile AST capabilities where it was also an
early innovator. In 2014, Veracode added integrated software
composition analysis capabilities into its AST services for the
identification of vulnerable open source components.
Veracode's AST services will meet the requirements of
organizations looking for a broad set of AST services —
SAST, DAST and mobile AST — that want to delegate their
AST and SCA to a third-party expert with a strong reputation
for the quality of its services and demonstrated innovation in
application security.
The analyst view: Gartner
of breaches are through by web
applications
Applications are insecure
40%
61%
of apps do not pass OWASP top 10 on first
assessment
of Java applications contain a known
vulnerability in a third party component
97%
Sources::
Verizon Data Breech and Incident Report 2016
Veracode State of Software Security 2016
And companies aren’t equipped to address it
of the top 10 computer science universities
require students to take a cybersecurity class
for their degree in computer science
0
of developers could correctly answer what
helps to protect against cross-site scripting
in a recent survey by Denim Group
11%
is the ratio of InfoSec professionals to
InfoSec jobs on LinkedIn
4:3
Sources::
Dark Reading
Denim Group
The Questions We Hear From Customers
How Can We…
Build and deploy
applications faster
while reducing business
risk?
Reduce our risk even
as we build, buy and
integrate more
software than ever?
Defend applications in
production while
traditional security
erodes in effectiveness?
Spend our security
budget most efficiently
so we can focus more on
adding business value?
Shorten time to value
for the investments we
make?
Improve capabilities
without new hiring for
hard-to-find skillsets?
A Lifecycle Approach Reduces Cost, Risk
$15.4 million
*Verizon Breach Report, 2015
$
$
$
Application Lifecycle
Application Lifecycle
Application Security Transforms to Meet These
Needs
Unified Platform
Strong Ecosystem
Speed
Productivity
Seamlessness
Accuracy Stability
Integration
Develop QA
Speed
Actionability
Coverage
Operate
Automate & Integrate Throughout App Lifecycle
Code Commit Build Test Release Deploy Operate
Veracode
Greenlight
Veracode Static Analysis
Veracode Web Application Scanning
Veracode Runtime Protection
Veracode Software Composition Analysis
Veracode APIs for Custom Integrations
IDEs GRCs
SIEMs
WAFs
Build or Buy Test Operate
Bug TrackingCI/CD SystemsBuild Tools
DevOpsCI/CDAgile
Security AssuranceContinuous Testing & Integration Continuous Scanning & Protection
Covering Your Entire SDLC
SDLC
Veracode Runtime Protection
Veracode eLearning
Green Light
Veracode Static Analysis
Veracode Software Composition Analysis
Veracode DAST
VC/Partner Manual Penetration Testing
Veracode Web Application Perimeter Monitoring
VC/Partner Mitigation Proposal Review
VC/Partner Vendor Application Security Testing
Veracode Support Services
VC/Partner Program Management
VC/Partner Remediation Advisory Services
Automation
Services
12
END-TO-END
Single central platform
+ Central policies & metrics for
consistent controls across
global BUs & dev teams
+ Best solution for reducing
software supply chain risk
+ Easiest way to embed
appsec across dev,
security,ops
+ Broad coverage via multiple
techniques (SAST, DAST,
behavioral, web perimeter &
SCA) across web, mobile
and legacy apps
BUILT FOR SCALE
+ Shortest time to risk reduction
at scale
+ Purpose-built as automated
cloud-based service
+ Platform is continuously
learning to address new
threats & reduce false
positives
+ Fast turnaround & tight
integration with agile
development
workflows via APis
SYSTEMATIC
Reduced enterprise risk
+ Transform de-centralized
processes into structured
governance programs
+ Security development experts
to help fix security issues
+ Best practices learned from
securing the world’s largest
global enterprises
+ Single point of accountability
& focus on successful
outcomes
How we’re different
Cloud-based automation
13
MARKET LANDSCAPE
14
The analyst view: 451 Group
• 14
• Source: 451 Research, Voice of the Enterprise: Information Security, Q3 2015
Veracode Application Security
Software
WhiteHat Security Sentinel
Tenable Nessus
Qualys Web Application
Scanning (WAS)
HP Fortify
IBM Application Security
Open Source Solution
Other Vendors
60
65
70
75
80
85
60 65 70 75 80 85
Fulfillment
Promise
Circle Size Reflects Market Adoption
451 Research Vendor Window
Dynamic/Static Application Security Tools (DAST/SAST)
The Vendor Window plots enterprise adoption as well as Promise and Fulfillment Indices that compare a measure of perceptions of vendor’s promise prior to actual product/service
delivery with a measure of execution effectiveness. It is based on large sample surveys of existing customers that are currently using each vendors’ product. A vendor located in the
upper right quadrant — under-promising and over-delivering — is rated highly for both its promise and ability to fulfill relative to its peers. Conversely, a vendor in the lower left
quadrant rates lower than its peers on the same criteria. The Vendor Promise Index is designed as a measure of perceptions of vendor’s promise prior to actual product/service
delivery and use. The Vendor Fulfillment Index is designed as a measure of execution effectiveness criteria which are related to the physical product/service delivery and customer
experience of using the product or service.
The intersecting lines indicate the average vendor score.
Source: 451 Research, Voice of the Enterprise: Information Security, Q3 2015
Veracode Application Security Software, n=14; Whitehat Security Sentinel, n=11; Qualys Web Application Scanning (WAS), n=16; Tenable Nessus, n=32; IBM Application Security, n=34; HP Fortify, n=31; Open Source Solution (OpenVAS,
Burp Suite, etc.), n=29; Other Vendors, n=35; Total Respondents, n=202.
Vendor
Promise
Score
Fulfillment
Score
Average 73 72
Veracode Application Security
Software
80 77
WhiteHat Security Sentinel 73 75
Qualys Web Application
Scanning (WAS)
72 73
Tenable Nessus 72 73
IBM Application Security 73 69
HP Fortify 72 69
Open Source Solution
(OpenVAS, Burp Suite, etc.)
65 67
Other Vendors 77 77
Low Promise,
High Fulfillment
High Promise,
High Fulfillment
Low Promise, Low
Fulfillment
High Promise,
Low Fulfillment
Non-listed Vendors: Checkmarx CxSAST
Rapid7 AppSpider
Trustwave App Scanner Family (formerly Cenzic)
THANK YOU

More Related Content

PDF
Healthcare application-security-practices-survey-veracode
PPTX
Secure Code review - Veracode SaaS Platform - Saudi Green Method
PDF
Veracode - Overview
PDF
8 Patterns For Continuous Code Security by Veracode CTO Chris Wysopal
PPTX
Crafting Super-Powered Risk Assessments by Digital Defense Inc & Veracode
PPTX
Strengthening cyber resilience with Software Supply Chain Visibility
PDF
Veracode Corporate Overview - Print
PDF
SAST vs. DAST: What’s the Best Method For Application Security Testing?
Healthcare application-security-practices-survey-veracode
Secure Code review - Veracode SaaS Platform - Saudi Green Method
Veracode - Overview
8 Patterns For Continuous Code Security by Veracode CTO Chris Wysopal
Crafting Super-Powered Risk Assessments by Digital Defense Inc & Veracode
Strengthening cyber resilience with Software Supply Chain Visibility
Veracode Corporate Overview - Print
SAST vs. DAST: What’s the Best Method For Application Security Testing?

What's hot (20)

PDF
Application Security Management with ThreadFix
PDF
The Web AppSec How-To: The Defender's Toolbox
PDF
Risks in the Software Supply Chain
PDF
Pactera - App Security Assessment - Mobile, Web App, IoT - v2
PDF
7 measures to overcome cyber attacks of web application
PDF
Software security, secure software development in the age of IoT, smart thing...
PDF
Application Security Guide for Beginners
PDF
Tools & Techniques for Addressing Component Vulnerabilities for PCI Compliance
PPTX
WhiteSource Webinar-New Research Reveals Key Strategy to Manage Open Source S...
PPT
IBM Rational AppScan Product Overview
PPT
IBM AppScan Enterprise - The total software security solution
PPTX
Accelerating Innovation with Software Supply Chain Management
PPT
Discovering the Value of Verifying Web Application Security Using IBM Rationa...
PDF
Lawyers and Licenses in Open Source-based Development: How to Protect Your So...
PPTX
The Four(ish) Appsec Metrics You Can’t Ignore
PPTX
Secure Software Development Life Cycle
PPT
IBM AppScan Standard - The Web Application Security Solution
PPTX
Application Security at DevOps Speed and Portfolio Scale
PPTX
The State of Open Source Vulnerabilities - A WhiteSource Webinar
PDF
Snippets, Scans and Snap Decisions: How Component Identification Methods Impa...
Application Security Management with ThreadFix
The Web AppSec How-To: The Defender's Toolbox
Risks in the Software Supply Chain
Pactera - App Security Assessment - Mobile, Web App, IoT - v2
7 measures to overcome cyber attacks of web application
Software security, secure software development in the age of IoT, smart thing...
Application Security Guide for Beginners
Tools & Techniques for Addressing Component Vulnerabilities for PCI Compliance
WhiteSource Webinar-New Research Reveals Key Strategy to Manage Open Source S...
IBM Rational AppScan Product Overview
IBM AppScan Enterprise - The total software security solution
Accelerating Innovation with Software Supply Chain Management
Discovering the Value of Verifying Web Application Security Using IBM Rationa...
Lawyers and Licenses in Open Source-based Development: How to Protect Your So...
The Four(ish) Appsec Metrics You Can’t Ignore
Secure Software Development Life Cycle
IBM AppScan Standard - The Web Application Security Solution
Application Security at DevOps Speed and Portfolio Scale
The State of Open Source Vulnerabilities - A WhiteSource Webinar
Snippets, Scans and Snap Decisions: How Component Identification Methods Impa...
Ad

Viewers also liked (6)

PPTX
Scripts that automate OWASP ZAP as part of a continuous delivery pipeline
ODP
AllDayDevOps ZAP automation in CI
ODP
Automating OWASP ZAP - DevCSecCon talk
PPTX
The OWASP Zed Attack Proxy
PDF
Veracode Automation CLI (using Jenkins for SDL integration)
PDF
iOS Application Security
Scripts that automate OWASP ZAP as part of a continuous delivery pipeline
AllDayDevOps ZAP automation in CI
Automating OWASP ZAP - DevCSecCon talk
The OWASP Zed Attack Proxy
Veracode Automation CLI (using Jenkins for SDL integration)
iOS Application Security
Ad

Similar to Veracode - Inglês (20)

PDF
State of Software Security - Enterprise Testing of Software Supply Chain
PDF
Top Application Security Testing Tools for Enhanced Software Protection.pdf
PDF
Shifting Left…AND Right to Ensure Full Application Security Coverage
PDF
Shift Left Security
PDF
The CA Technologies | Veracode Platform: A 360-Degree View of Your Applicatio...
PDF
Filling your AppSec Toolbox - Which Tools, When to Use Them, and Why
PDF
state-software-security-report-june-2015-report
PDF
We are excited to announce that our new State of Software Security (SOSS) rep...
PDF
The State of Software Security 2022 SOSS - Solution
PPTX
[OPD 2019] AST Platform and the importance of multi-layered application secu...
PDF
PCI and Vulnerability Assessments - What’s Missing
PPTX
Static Application Security Testing Strategies for Automation and Continuous ...
PPTX
Trust but Verify: Strategies for managing software supplier risk
PPTX
Vulnerability management and threat detection by the numbers
PPTX
Vulnerability management and threat detection by the numbers
PDF
The complete guide to developer first application security By Github.Com
PPTX
Leverage DevOps & Agile Development to Transform Your Application Testing Pro...
PDF
Leverage DevOps & Agile Development to Transform Your Application Testing Pro...
PPTX
Leverage DevOps & Agile Development to Transform Your Application Testing Pro...
PDF
Analyst Resources for Chief Information Security Officers (CISOs)
State of Software Security - Enterprise Testing of Software Supply Chain
Top Application Security Testing Tools for Enhanced Software Protection.pdf
Shifting Left…AND Right to Ensure Full Application Security Coverage
Shift Left Security
The CA Technologies | Veracode Platform: A 360-Degree View of Your Applicatio...
Filling your AppSec Toolbox - Which Tools, When to Use Them, and Why
state-software-security-report-june-2015-report
We are excited to announce that our new State of Software Security (SOSS) rep...
The State of Software Security 2022 SOSS - Solution
[OPD 2019] AST Platform and the importance of multi-layered application secu...
PCI and Vulnerability Assessments - What’s Missing
Static Application Security Testing Strategies for Automation and Continuous ...
Trust but Verify: Strategies for managing software supplier risk
Vulnerability management and threat detection by the numbers
Vulnerability management and threat detection by the numbers
The complete guide to developer first application security By Github.Com
Leverage DevOps & Agile Development to Transform Your Application Testing Pro...
Leverage DevOps & Agile Development to Transform Your Application Testing Pro...
Leverage DevOps & Agile Development to Transform Your Application Testing Pro...
Analyst Resources for Chief Information Security Officers (CISOs)

More from DeServ - Tecnologia e Servços (20)

PDF
Apresentação - DeServ - Tecnologia e Serviços
PDF
O que é a Lei Geral de Proteção de Dados?
PDF
Arcserve UDP Cloud Direct - DeServ
PPTX
Sophos XG Next-Gen Firewall
PPTX
Webinar Arcserve UDP - Deserv
PDF
Sophos XG Firewall
PDF
Endpoint protection Advanced - Webinar Deserv
PPTX
Sophos central webinar
PDF
Mozy by EMC - Isto é Mozy
PDF
Apresentação - Deserv
PDF
Arcserve - Cloud Direct
PPTX
Sophos End User Protection
PDF
Sophos Cloud Advanced
PPTX
Sophos Cloud advanced
PPTX
Intercept X - Sophos Endpoint
Apresentação - DeServ - Tecnologia e Serviços
O que é a Lei Geral de Proteção de Dados?
Arcserve UDP Cloud Direct - DeServ
Sophos XG Next-Gen Firewall
Webinar Arcserve UDP - Deserv
Sophos XG Firewall
Endpoint protection Advanced - Webinar Deserv
Sophos central webinar
Mozy by EMC - Isto é Mozy
Apresentação - Deserv
Arcserve - Cloud Direct
Sophos End User Protection
Sophos Cloud Advanced
Sophos Cloud advanced
Intercept X - Sophos Endpoint

Recently uploaded (20)

PDF
HCSP-Presales-Campus Network Planning and Design V1.0 Training Material-Witho...
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PDF
CIFDAQ's Teaching Thursday: Moving Averages Made Simple
PDF
CIFDAQ's Token Spotlight: SKY - A Forgotten Giant's Comeback?
PPTX
breach-and-attack-simulation-cybersecurity-india-chennai-defenderrabbit-2025....
PDF
ai-archetype-understanding-the-personality-of-agentic-ai.pdf
PDF
Dell Pro 14 Plus: Be better prepared for what’s coming
PDF
creating-agentic-ai-solutions-leveraging-aws.pdf
PDF
Event Presentation Google Cloud Next Extended 2025
PPTX
ABU RAUP TUGAS TIK kelas 8 hjhgjhgg.pptx
PDF
Chapter 2 Digital Image Fundamentals.pdf
PPTX
Belt and Road Supply Chain Finance Blockchain Solution
PDF
Cloud-Migration-Best-Practices-A-Practical-Guide-to-AWS-Azure-and-Google-Clou...
PDF
Smarter Business Operations Powered by IoT Remote Monitoring
PPTX
CroxyProxy Instagram Access id login.pptx
PDF
Automating ArcGIS Content Discovery with FME: A Real World Use Case
PDF
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
PDF
Modernizing your data center with Dell and AMD
PDF
Google’s NotebookLM Unveils Video Overviews
HCSP-Presales-Campus Network Planning and Design V1.0 Training Material-Witho...
NewMind AI Weekly Chronicles - August'25 Week I
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
CIFDAQ's Teaching Thursday: Moving Averages Made Simple
CIFDAQ's Token Spotlight: SKY - A Forgotten Giant's Comeback?
breach-and-attack-simulation-cybersecurity-india-chennai-defenderrabbit-2025....
ai-archetype-understanding-the-personality-of-agentic-ai.pdf
Dell Pro 14 Plus: Be better prepared for what’s coming
creating-agentic-ai-solutions-leveraging-aws.pdf
Event Presentation Google Cloud Next Extended 2025
ABU RAUP TUGAS TIK kelas 8 hjhgjhgg.pptx
Chapter 2 Digital Image Fundamentals.pdf
Belt and Road Supply Chain Finance Blockchain Solution
Cloud-Migration-Best-Practices-A-Practical-Guide-to-AWS-Azure-and-Google-Clou...
Smarter Business Operations Powered by IoT Remote Monitoring
CroxyProxy Instagram Access id login.pptx
Automating ArcGIS Content Discovery with FME: A Real World Use Case
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
Modernizing your data center with Dell and AMD
Google’s NotebookLM Unveils Video Overviews

Veracode - Inglês

  • 1. Joost de Jong January, 2017 Veracode Introduction
  • 2. 2 The world is under attack from cybercrime and nation states
  • 3. 3 Description Veracode is a U.S.-based, well-established and rapidly growing provider of SAST and DAST cloud services, software supply chain testing and mobile AST. For SAST, Veracode has been a pioneer in the analysis of binary code, not requiring the source code for testing. Its 2012 acquisition of Marvin security accelerated its mobile AST capabilities where it was also an early innovator. In 2014, Veracode added integrated software composition analysis capabilities into its AST services for the identification of vulnerable open source components. Veracode's AST services will meet the requirements of organizations looking for a broad set of AST services — SAST, DAST and mobile AST — that want to delegate their AST and SCA to a third-party expert with a strong reputation for the quality of its services and demonstrated innovation in application security. The analyst view: Gartner
  • 4. of breaches are through by web applications Applications are insecure 40% 61% of apps do not pass OWASP top 10 on first assessment of Java applications contain a known vulnerability in a third party component 97% Sources:: Verizon Data Breech and Incident Report 2016 Veracode State of Software Security 2016
  • 5. And companies aren’t equipped to address it of the top 10 computer science universities require students to take a cybersecurity class for their degree in computer science 0 of developers could correctly answer what helps to protect against cross-site scripting in a recent survey by Denim Group 11% is the ratio of InfoSec professionals to InfoSec jobs on LinkedIn 4:3 Sources:: Dark Reading Denim Group
  • 6. The Questions We Hear From Customers How Can We… Build and deploy applications faster while reducing business risk? Reduce our risk even as we build, buy and integrate more software than ever? Defend applications in production while traditional security erodes in effectiveness? Spend our security budget most efficiently so we can focus more on adding business value? Shorten time to value for the investments we make? Improve capabilities without new hiring for hard-to-find skillsets?
  • 7. A Lifecycle Approach Reduces Cost, Risk $15.4 million *Verizon Breach Report, 2015 $ $ $ Application Lifecycle
  • 8. Application Lifecycle Application Security Transforms to Meet These Needs Unified Platform Strong Ecosystem Speed Productivity Seamlessness Accuracy Stability Integration Develop QA Speed Actionability Coverage Operate
  • 9. Automate & Integrate Throughout App Lifecycle Code Commit Build Test Release Deploy Operate Veracode Greenlight Veracode Static Analysis Veracode Web Application Scanning Veracode Runtime Protection Veracode Software Composition Analysis Veracode APIs for Custom Integrations IDEs GRCs SIEMs WAFs Build or Buy Test Operate Bug TrackingCI/CD SystemsBuild Tools DevOpsCI/CDAgile Security AssuranceContinuous Testing & Integration Continuous Scanning & Protection
  • 10. Covering Your Entire SDLC SDLC Veracode Runtime Protection Veracode eLearning Green Light Veracode Static Analysis Veracode Software Composition Analysis Veracode DAST VC/Partner Manual Penetration Testing Veracode Web Application Perimeter Monitoring VC/Partner Mitigation Proposal Review VC/Partner Vendor Application Security Testing Veracode Support Services VC/Partner Program Management VC/Partner Remediation Advisory Services Automation Services
  • 11. 12 END-TO-END Single central platform + Central policies & metrics for consistent controls across global BUs & dev teams + Best solution for reducing software supply chain risk + Easiest way to embed appsec across dev, security,ops + Broad coverage via multiple techniques (SAST, DAST, behavioral, web perimeter & SCA) across web, mobile and legacy apps BUILT FOR SCALE + Shortest time to risk reduction at scale + Purpose-built as automated cloud-based service + Platform is continuously learning to address new threats & reduce false positives + Fast turnaround & tight integration with agile development workflows via APis SYSTEMATIC Reduced enterprise risk + Transform de-centralized processes into structured governance programs + Security development experts to help fix security issues + Best practices learned from securing the world’s largest global enterprises + Single point of accountability & focus on successful outcomes How we’re different Cloud-based automation
  • 13. 14 The analyst view: 451 Group • 14 • Source: 451 Research, Voice of the Enterprise: Information Security, Q3 2015 Veracode Application Security Software WhiteHat Security Sentinel Tenable Nessus Qualys Web Application Scanning (WAS) HP Fortify IBM Application Security Open Source Solution Other Vendors 60 65 70 75 80 85 60 65 70 75 80 85 Fulfillment Promise Circle Size Reflects Market Adoption 451 Research Vendor Window Dynamic/Static Application Security Tools (DAST/SAST) The Vendor Window plots enterprise adoption as well as Promise and Fulfillment Indices that compare a measure of perceptions of vendor’s promise prior to actual product/service delivery with a measure of execution effectiveness. It is based on large sample surveys of existing customers that are currently using each vendors’ product. A vendor located in the upper right quadrant — under-promising and over-delivering — is rated highly for both its promise and ability to fulfill relative to its peers. Conversely, a vendor in the lower left quadrant rates lower than its peers on the same criteria. The Vendor Promise Index is designed as a measure of perceptions of vendor’s promise prior to actual product/service delivery and use. The Vendor Fulfillment Index is designed as a measure of execution effectiveness criteria which are related to the physical product/service delivery and customer experience of using the product or service. The intersecting lines indicate the average vendor score. Source: 451 Research, Voice of the Enterprise: Information Security, Q3 2015 Veracode Application Security Software, n=14; Whitehat Security Sentinel, n=11; Qualys Web Application Scanning (WAS), n=16; Tenable Nessus, n=32; IBM Application Security, n=34; HP Fortify, n=31; Open Source Solution (OpenVAS, Burp Suite, etc.), n=29; Other Vendors, n=35; Total Respondents, n=202. Vendor Promise Score Fulfillment Score Average 73 72 Veracode Application Security Software 80 77 WhiteHat Security Sentinel 73 75 Qualys Web Application Scanning (WAS) 72 73 Tenable Nessus 72 73 IBM Application Security 73 69 HP Fortify 72 69 Open Source Solution (OpenVAS, Burp Suite, etc.) 65 67 Other Vendors 77 77 Low Promise, High Fulfillment High Promise, High Fulfillment Low Promise, Low Fulfillment High Promise, Low Fulfillment Non-listed Vendors: Checkmarx CxSAST Rapid7 AppSpider Trustwave App Scanner Family (formerly Cenzic)

Editor's Notes

  • #4: We moved up in execution significantly!
  • #6: 4 actively employed information security professionals for every 3 new jobs posted in 2014. Unless 3 of those 4 people are going to jump ship every year, we are in an unsustainable situation where we need to find and develop more talent.