Code analysis and app security testing simplified
Posted on 28 April 2014.
Quotium announced the release of Seeker Enterprise 3.0, whose innovative technology correlates application behavior with simulated hacker's attacks to pinpoint vulnerable code.


Seeker is the run-time code & data analysis application security testing solution for the software development life-cycle (SDLC). It assists in vulnerability management by accurately demonstrating risks to business critical data. It can be fully automated and is very suitable for Agile and continuous integration environments.

Delivering an application security testing automation process in the development lifecycle, it allows organizations to secure every build, every release and every application without requiring manpower overhead or specific security knowledge.

With Enterprise Version 3.0, Seeker delivers new and unique capabilities that allow organizations to handle software cyber threats in fast-paced development environments.

Among the many new features that have been introduced in this version are:
  • Enhanced automation capabilities
  • Better cross-organizational security view and reporting
  • Assessment of cross-organizational compliance status
  • Team security performance metrics and more.
The new dashboards allow executives and managers to view their overall organizational security status, see which systems pose the most threat, which compliance requirements are met and which aren't.

The enhanced automation capabilities allow better integration in cloud environments, with the ability to fully orchestrate Seeker and automatically run security testing in private cloud settings. It performs automatic results triage via exploitation of vulnerabilities, eliminating the need for human effort as part of the process. This makes Seeker suitable for use by non-security personnel, and easy to place in the hands of developers or DevOps.

Quotium will showcase the solution at Infosecurity Europe 2014 this week.






Spotlight

Operation Pawn Storm: Varied targets and attack vectors, next-level spear-phishing tactics

Posted on 23 October 2014.  |  Targets of the spear phishing emails included staff at the Ministry of Defense in France, in the Vatican Embassy in Iraq, military officials from a number of countries, and more.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Fri, Oct 24th
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //