IBM Delivers New Software to Advance Security Analysis
Organizations can now use multiple analysis techniques simultaneously to discover potential software vulnerabilities
Dec 3, 2010
ARMONK, N.Y., Dec. 03, 2010 /PRNewswire/ -- IBM (NYSE: IBM) today announced new software and analysis capabilities that provide a more efficient and accurate way to help organizations design, build and manage secure applications.
The new software consolidates software vulnerability analysis and reporting into a single view across the enterprise. Developers can now assess security threats across the entire software development lifecycle, enabling global development teams to easily identify and test security exposures, and help reduce the risks and costs associated with security and compliance concerns.
For example, organizations can use the software to automate application security audits and source code scanning to ensure that the network and Web-based applications are secure and compliant. This delivers improved accuracy of vulnerability identification and remediation.
The new security offerings include enhancements to the IBM Rational AppScan portfolio that further simplify security vulnerability analysis and identification for software developers. As part of the new features, IBM Research provided string analysis, a software development capability that helps simplify the security testing process by automatically detecting and verifying which Web application development input needs to be cleansed to remove security risks. This capability helps accelerate the accuracy and efficiency of security testing by the development community, regardless of their security expertise.
As cited in IBM's 2010 mid-year X-Force Trend Report, 55 percent of all vulnerabilities come from Web applications, making it the greatest source of risk for organizations. The research indicates that computer security threats rose by 36 percent in the first half of 2010, resulting in more than 4,000 new vulnerabilities being documented compared to last year.
Simplifying Adoption of End-to-End Application Security
Web applications are often vulnerable due to a lack of built-in security. To reduce these risks, organizations need to implement security strategies that ensure applications are designed securely across the entire development lifecycle, from start to finish. Finding ways to extend security analysis across more testers in the security process and employing multiple testing techniques will result in higher-quality and more secure applications.
"As vulnerabilities become more prevalent, testing across the entire development lifecycle without having to invest in additional development resources and skills is significant for the bottom line," said Steve Robinson, General Manager, IBM Security Solutions. "Through the ongoing value brought by the acquisitions of Ounce Labs and Watchfire Corp., combined with our R&D expertise, we can now provide more comprehensive security governance, collaboration and risk management solutions that further protect organizations from malicious attacks."
New Capabilities to Strengthen Security
The new advancements in the IBM Rational AppScan portfolio simplify and automate security scanning with new hybrid analysis capabilities, improving vulnerability identification and remediation. The hybrid analysis provides automated correlation of results from static code analysis and dynamic analysis to increase vulnerability identification in automated software.
New enhancements to the IBM Rational AppScan portfolio include:
In addition, IBM announced support for federal security protocol, CAC/PKI, for the IBM Rational Software portfolio. The CAC/PKI protocol enhances the ability of governments globally to prevent unauthorized access to physical and digital environments, which compromise the security of military and national initiatives. IBM provides a full range of services for the detailed design, development and implementation of smartcard/biometrics and CAC/PKI implementations as part of the efforts to deliver full software lifecycle support of CAC/PKI and other security protocols.
IBM Security Solutions include an extensive portfolio of hardware, software solutions, professional and managed services offerings covering the spectrum of IT and business security risks, including: people and identity, data and information, application and process, network, server and endpoint and physical infrastructure. IBM Security Solutions empowers clients to innovate and operate their businesses on highly secure infrastructure platforms.
For more information on IBM Security Solutions, visit: www.ibm.com/security.
|Powered by MediaRoom|