once upon a time in application security land...a true story of how application security and...

19

Upload: debbie-rosen

Post on 22-Apr-2015

776 views

Category:

Technology


1 download

DESCRIPTION

Did you know that that today's software applications are predominately assembled from pre-built "building blocks" otherwise known as open source components? And research shows that 71% of these applications have at least one critical vulnerability (not to mention legal and licensing risks). While this dependence on 3rd party and open source components is one of any organizations' greatest exposures, the good news is that it is also one of the easiest to tackle.

TRANSCRIPT

Page 1: Once Upon A Time in Application Security land...A true story of how application security and development came together to fix the risk in open source
Page 2: Once Upon A Time in Application Security land...A true story of how application security and development came together to fix the risk in open source

There was a great battlebetween

SPEED and

SECURITY.

Once upon a time...

Page 3: Once Upon A Time in Application Security land...A true story of how application security and development came together to fix the risk in open source

Development wanted to GO FAST.

But, Security wanted toslow down and BE SAFE.

Page 4: Once Upon A Time in Application Security land...A true story of how application security and development came together to fix the risk in open source

For years... they endured the pain of late testing,

false positives...

and the added costs of getting the bad stuff out.

There HAD to be a better way!

Page 5: Once Upon A Time in Application Security land...A true story of how application security and development came together to fix the risk in open source

And then... there came... THE REVOLUTION!

The COMPONENT revolution.

Code became like Legos® -applications easily assembled

from thousands of freely available parts,

Developers ran even FASTER, and Security found it even

harder to SECURE.

Page 6: Once Upon A Time in Application Security land...A true story of how application security and development came together to fix the risk in open source

Together, they pondered...

"How can we keep SAFE at this even FASTER speed of development?"

"How can we SECURE this new Lego®

'software supply chain'?"

Page 7: Once Upon A Time in Application Security land...A true story of how application security and development came together to fix the risk in open source

After much self - reflection... the ANSWER revealed itself:

Bring SECURITY and SPEED together

by building component intelligence and governance in from the START...

using all the tools developers love to use today!

Page 8: Once Upon A Time in Application Security land...A true story of how application security and development came together to fix the risk in open source

And so it was.

The birth of a new way to secure the software supply chain...

where developers went FAST and applications were SAFE.

And this REVOLUTIONARY,yet SIMPLE

approachcame to be called...

Page 9: Once Upon A Time in Application Security land...A true story of how application security and development came together to fix the risk in open source
Page 10: Once Upon A Time in Application Security land...A true story of how application security and development came together to fix the risk in open source

AUTOMATE and

enforce GOVERNANCE

in the tools

you use today.

5 Policy, security and licensing information guides developers to select the best components in

their development environment.

A new way to...

Page 11: Once Upon A Time in Application Security land...A true story of how application security and development came together to fix the risk in open source

REMEDIATE RISK

early in the process

to reduce risk and cost.

5 Optimal components can be selected and application flaws can be remediated with a single click.

A new way to...

Page 12: Once Upon A Time in Application Security land...A true story of how application security and development came together to fix the risk in open source

CENTRALIZE POLICIES

that ensure license

and security risks are

managed throughout the

software lifecycle.

5 Security, licensing and architecture policies are easily defined and enforced throughout

the software lifecycle.

A new way to...

Page 13: Once Upon A Time in Application Security land...A true story of how application security and development came together to fix the risk in open source

PRECISELY IDENTIFY

and track all components

used in your organization,

from consumption to production.

5 Accurate and comprehensive component inventory provides visibility across the software lifecycle.

A new way to...

Page 14: Once Upon A Time in Application Security land...A true story of how application security and development came together to fix the risk in open source

TRULY ACHIEVE

defense-in-depth with

enforcement points

throughout the

software lifecycle.

5 The CLM model for component governance automates policy management and approvals

throughout the software lifecycle with enforcement points in the repository, IDE and CI Server.

A new way to...

Page 15: Once Upon A Time in Application Security land...A true story of how application security and development came together to fix the risk in open source

PROTECT your production

applications with proactive

alerts for newly discovered

vulnerabilities.

5 Newly discovered threats are continuously reported ensuring trust from design through production.

A new way to...

Page 16: Once Upon A Time in Application Security land...A true story of how application security and development came together to fix the risk in open source

ASSESS ENTERPRISE

RISK and support

your compliance and

regulatory initiatives.

5 Dashboards and reports provide a complete view of global risk

supporting regulatory and compliance initiatives.

A new way to...

Page 17: Once Upon A Time in Application Security land...A true story of how application security and development came together to fix the risk in open source

the people of the kingdom

ushered in a NEW ERA

of application security and

lived in HARMONY

ever more.

And so it came be to...

Page 18: Once Upon A Time in Application Security land...A true story of how application security and development came together to fix the risk in open source

The end.

Revolutionize your approach to software security!

Start with a FREE snapshot of your current application vulnerabilities: www.sonatype.com/go-fast-be-secure

Or learn more at: www.sonatype.com/clm/product-tour

Page 19: Once Upon A Time in Application Security land...A true story of how application security and development came together to fix the risk in open source

12501 Prosperity Drive, Suite 350 · Silver Spring, MD 20904 · 1.877.866.2836 · www.sonatype.com