April 2017 Digital Edition

Click Here

March 2017 Digital Edition

Click Here

Feb. 2017 Digital Edition

Click Here

Nov/Dec 2016 Digital Edition

Click Here

Oct 2016 Digital Edition

Click Here

Technology Sectors

Market Sectors

Today's News

Advancing CyberSecurity Innovation in the Public Sector

Ankur Chadda, Director of Product Marketing, Gurucul - www.gurucul.com

I confess. I've read the book Borderless Behavior Analytics – Who’s Inside? What’re They Doing? three times. I keep discovering new insights on addressing the vanishing security perimeter based on what organizations are doing in response to this challenge.

In chapter five, Robert Rodriguez , Chairman and Founder of the Security Innovation NetworkTM (SINET) , describes a number of compelling developments. SINET is an international community building organization whose mission is to advance innovation and enable global collaboration between the public and private sectors to defeat cybersecurity threats. Rodriguez's observations are both authoritative and enlightening.

He observed that many CISOs have recognized the need to move from automation to orchestration of cyber security to enable centralized visibility and decision-making. This means putting in place an infrastructure to integrate all the monitoring, data collection, analysis, control and response components needed for a holistic and flexible model with the flexibility to adapt to future needs.

This orchestration capability can help assure comprehensive remediation of threats. Eventually, some form of attribution should be included because a number of industries and corporations are battling with this challenge. Nevertheless, in order to do proper attribution, it must become clearly mandated within the cybersecurity industry. That’s something to look forward to in the future.

In terms of other trends, Rodriguez notes that it is disappointing we’re not seeing more disruptive innovation in cybersecurity. He has not seen anyone inventing fire or the light bulb. Meanwhile, it’s a cat and mouse game. Sometimes we’re staying ahead of adversaries, and other times we’re not. What’s needed are intelligence-based solutions that can recognize the weakness in security defenses, attacker strengths and likely scenarios.

One of the inhibiting factors of dynamic innovation in cybersecurity, however, has been the rapid evolution and transformation of the Internet. Use cases rise in popularity, and quickly morph into something drastically new. Facebook is a good example. It is very different today, compared to its original incarnation. Multiply this phenomenon exponentially, and you have today’s Internet. From a cyber security standpoint, we’re trying to work backwards to fix a framework which is extremely porous. In many respects, we’re chasing a moving target.

The hope for productive change in cybersecurity lies inherently with risk takers and early adopters. These change agents are willing to take the leap of faith needed to implement next-generation security approaches, many of which are now drawing strength from analytics and machine learning models. Part of the challenge in the government sector, is that there’s no reward for taking risks. Primarily because there are no profit margins or shareholder value, no driving motivation to deliver more for less. The culture in government, therefore, is different than in the commercial world.

Nevertheless, government CISOs are increasingly looking to risk takers and early adopters in both the public and private sectors to inform their thinking and challenge their strategic planning assumptions. The book I mentioned earlier, Borderless Behavior Analytics – Who’s Inside? What’re They Doing? , is one resource where readers can hear first hand accounts of cyber security transformation projects from leading CIOs and CISOs that span a wide range of vertical industry perspectives.

 

 

 


WatchGuard’s New Fireboxes Chew Through Encrypted Traffic 94 Percent Faster Than Competitors

 

New Firebox M Series appliances help SMBs keep up with the rising tide of encrypted traffic with best-in-class performance and security

SEATTLE – August 15, 2017WatchGuard® Technologies, a leader in advanced network security solutions, today announced hardware upgrades to its Firebox® M Series to handle the rapid proliferation of encrypted web traffic and offer more flexibility with added copper and fiber ports. With the new M470, M570 and M670 appliances, users can add additional network modules to increase the number of copper or fiber ports available to support the growing use of 10G fiber in midsize enterprise data centers. The new Firebox M Series appliances also enable users to inspect encrypted traffic with industry-leading performance with all security services enabled. According to Miercom, an independent testing lab, the updated Firebox M370 performs full HTTPS inspection 94% faster than competing solutions.

Network defenses that don’t adequately process and inspect encrypted traffic leave employees, customers and partners vulnerable to cyber attacks. According to a 2016 Ponemon study, 41 percent of attacks in 2016 used encryption to either disguise their entry into the network or hide their connection to a Command and Control server. NSS Labs, Inc. forecasts that as adoption rates continue to climb, 75 percent of web traffic will be encrypted by 2019. A firewall that lacks the processing power necessary to inspect high volumes of encrypted traffic will either need to turn off some security services or compromise throughput in order to manage the burden.

KEY FEATURES:

  • Dramatically Improved Performance: As validated by Miercom, the new Firebox M Series offers approximately three times the performance of competing products.

  • Flexibility Through Increased Port Density: All new appliances (except the M370) have an expansion slot for additional ports. 4x10 Gb fiber, 8x1 Gb copper or 8x1 Gb fiber network modules are available as well.

  • Intel processors with AES-NI and CaveCreek crypto acceleration: New chipsets allow the new M Series appliances industry-leading performance in HTTPS content inspection and fast processing of traffic even with all security services enabled.


SUPPORTING QUOTES:

  • Brendan Patterson, Director of Product Management at WatchGuard Technologies:
    “As adoption rates for encryption continue to climb, organizations need to know that their UTM offers performance levels that can process the growing torrent of encrypted traffic, and the security services capable of detecting threats that might be lurking within that traffic. With the new M Series, we offer dramatic improvements in throughput to ensure our customers don’t have to choose between performance and security.”

  • Robert Smithers, CEO, Miercom:
    “Based on results of our testing, the WatchGuard Firebox M370 displayed exceptional performance, outperforming its competitors for stateless and stateful traffic throughput scenarios. Its high-rate, non-degrading performance with security features enabled earns it the Miercom Performance Verified certification.

About WatchGuard Technologies, Inc.

WatchGuard® Technologies, Inc. is a global leader in network security, secure Wi-Fi, and network intelligence products and services to more than 75,000 customers worldwide. The company’s mission is to make enterprise-grade security accessible to companies of all types and sizes through simplicity, making WatchGuard an ideal solution for distributed enterprises and SMBs. WatchGuard is headquartered in Seattle, Washington, with offices throughout North America, Europe, Asia Pacific, and Latin America. To learn more, visit WatchGuard.com.

Government Terminates Protection Program for At-Risk Central American Children

Photo by Lara604.

By by Katie Shepherd

The Trump administration announced on Wednesday that it was terminating the CAM (Central American Minors) Parole Program, a special program which allows certain at-risk children in Central America to enter the United States and be reunited with their legally residing parents. This is yet another example of the administration’s increasingly cruel disregard for vulnerable immigrant children and is at odds with their recent crackdown on human smuggling.

The CAM program was first implemented in December 2014 as a response to the uptick in violence facing Central Americans and served as an in-country processing program for minors. It sought to “provide a safe, legal and orderly alternative to the dangerous journey” that many children were taking attempting to reach safety in the United States. Thus the end of this program may lead to an increase in the number of children fleeing for their lives who fall into the hands of human traffickers.

The CAM Program entailed a thorough vetting process. The child and their family members underwent a series of detailed steps, including DNA testing, security checks, medical clearance, and a refugee interview to confirm the child’s eligibility for the program. Minors who qualified could enter the United States on a two-year, renewable parole, but it did not lead to a permanent status.

Those eligible for the program were children in Honduras, El Salvador, and Guatemala who were found to be ineligible for refugee processing but were determined to be “at risk of harm” by the Department of Homeland Security. The majority of the applications processed under the CAM program—about 70 percent—was for children who fell into this category.

Since the program’s inception in December 2014, almost 1,500 children have been paroled or allowed into the United States to reunite with their parents. Not only does the termination of the program prevent children from benefiting from this program in the future, but it also cancels the 2,714 applications for children who have been granted conditional parole and are waiting to enter the United States.

Ending the CAM Program is tantamount to delivering a death sentence to many unnamed children in Central America who are in fear for their lives. It’s bad enough that we’re locking kids in a burning building, but now we are taking away the key we gave them to get out.

SHARPEYE™ FOR THE EAST GREENLAND ICE-CORE PROJECT

On the 2nd of May, a Kelvin Hughes SharpEye™ SxV solid state Doppler surveillance radar arrived at the East Greenland Ice-core Project (EGRIP) camp. The radar was delivered on board a C-130 Hercules airplane together with the field party of scientists and field camp specialists manning the EGRIP research camp on the Greenland Ice Sheet.

The implementation of radar technology has brought about an increase in safety to the team of scientists and engineers at EGRIP by providing 24/7 situational awareness of the camp, the perimeter and the extended perimeter of more than three kilometres.

The East Greenland Ice-core Project aims to retrieve an ice core by drilling through the Northeast Greenland ice stream. Ice streams are responsible for draining a significant amount of the ice from the Greenland ice sheet. The EGRIP international project hopes to gain new and fundamental information on ice stream dynamics, thereby improving the understanding of how ice streams will contribute to future sea-level change. The drilled core will also provide a new record of past climatic conditions from the North Eastern part of the Greenland Ice Sheet.

The camp team is between ten and forty people working on the ice sheet, which is an area with few visual reference points. During whiteout conditions the visibility and contrast is low, and navigation is difficult.

SharpEye™ SxV is a small radome enclosed solid state radar providing superior detection performance of difficult to detect targets in the harshest environments. At EGRIP the radar is mounted on the top of the operations dome and is operational in temperatures as low as minus 30°C.

The SharpEye™ radar in conjunction with the Kelvin Hughes CxEye™ radar software provides a 360° extended perimeter. The software enables active and non-active alarm zones to be set up whereby movements within the camp does not trigger an alarm, however, the target tracking information is recorded and can be played back if required. The camp area has been defined in a 2.2 kilometre circle where alarm triggers are not active, while any movement in the ring between 2.2 and 3.5 kilometres away from the main dome triggers an alarm and sends a text message to the responsible person in camp automatically with position, velocity and direction information. This enables quick assessment of any issues or unexpected movements that may need investigating on the radar software including an approaching polar bear.

Crucially SharpEye™ SxV is an important addition to the Search and Rescue (SAR) capability to such an environment i.e. an open and sparse but potentially difficult area to monitor the whereabouts of people.

Bo Vinther (Associate Professor at the Niels Bohr Institute at University of Copenhagen, and Field Leader at EGRIP) said:
“The SharpEye™ SxV system at EGRIP is configured to transmit alarms to a portable device. This combination gives an additional layer of safety in the EGRIP camp, without dedicating personnel to monitor a radar screen. Crucially camp is promptly informed of personnel unexpectedly leaving the vicinity of camp in poor visibility. This enables the Field Leader to launch SAR in a timely manner, and use radar guidance directing the SAR effort to personnel in need. Furthermore, camp will have warning in the rare case of a polar bear encounter”.

As the radar information is recorded, if someone becomes lost or missing especially in low visibility conditions, even if they are not moving, the last known position can be identified quickly and easily and the GPS location information can be provided or a search party can be guided in. Tests conducted at EGRIP enabled chocolate bars to be located by a search team after these where placed by another person 2.1 kilometres away.

Mark Bown Group Marketing Manager at Kelvin Hughes said:
“This performance is testament to the unique combination of Doppler processing, pulse compression and Moving Target Detection (MTD) techniques employed by the SharpEye™ system that provides the ability to detect small or low Radar Cross Section (RCS) targets in severe weather conditions at longer ranges than other similar approaches to radar design”.

The radar is planned to be used every field season between April/May to August for the next four years.


San Diego Port Authority Announces 2017 Operation Clean Sweep

Operation Clean Sweep, an annual event that partners Port Tenants and volunteers to remove trash and debris from San Diego Bay will take place on Saturday, August 26, 2017.

Produced by the San Diego Port Tenants Association, this community service-oriented event covers various clean-up sites around the bay’s watershed and shoreline. Last year, 1,314 volunteers, including civilians, military, Harbor Police divers, Port Tenants and Port employees removed 13.37 tons of debris.

That debris included sunken dinghies, tires, household appliances, shopping carts, bicycles and more. A mollusk-encrusted toilet was also retrieved and earned the diver who found it first place in the event’s “Most Unique Trash” contest.

The public is invited to participate and all volunteers will be treated to an after-party featuring a free barbecue, refreshments, entertainment, raffles and prizes. The after party is at Cesar Chavez Park from 11 a.m. – 1 p.m, 1449 Cesar Chavez Parkway, San Diego (map)

For more information visit the San Diego Port Tenants Association


Sonardyne Sonars Installed to Protect New Middle East Energy Facility

Maritime security company, Sonardyne International Ltd, UK, has announced that its underwater intruder detection sonar technology, Sentinel, has been installed on the site of a new Critical National Infrastructure (CNI) facility in the Middle East to monitor unauthorised access from the sea. The programme of work included the supply of multiple in-water sonars and redundant control room equipment in order to provide uninterrupted situational awareness over a large waterfront. 

CNI facilities such as power plants, dams, gas storage terminals and offshore oil platforms represent attractive targets for sabotage. Many of these installations have comprehensive above-the-water security systems that can include physical barriers, access control, surface radar and long range opto-electrical sensors. However, many are vulnerable to intrusion from the water, and in particular, from below the surface.

Sonardyne’s Sentinel closes this gap in surveillance capability. It reliably detects, tracks and classifies divers and small underwater vehicles approaching a protected asset, alerting security personnel to the potential threat. With a track record spanning more than 10 years, Sentinel is widely regarded as the security industry’s most extensively deployed diver detection sonar.

The small, lightweight design of Sentinel’s in-water sonar unit makes it ideal for mobile security operations but for this contract, Sonardyne’s in-country partner installed the sonars on permanent seabed mounts placed in key locations around the shoreline.

Each sonar is designed to provide 360 degrees of coverage and provides long range warning of incoming targets for the local security personnel to intercept the threat. It is even able to determine, with a high degree of probability, what type of diving equipment they are wearing; open or closed circuit.

Due to the strategic importance of the new facility within the region, for the first time Sonardyne was requested to supply dual redundant control-room equipment to ensure uninterrupted service. All equipment was interfaced with the facility’s third party C2 (Command and Control) security system.

Speaking about the contract, Paul Rosewarne, Maritime Security for Sonardyne in the Middle East said, “Our announcement today marks the end of many months of planning and on-site activities with our local technical partners and end client to deliver, install and commission Sentinel at this important new facility.”  He added; “We’re confident that our diver detection technology will provide the same peace of mind as the many other Sentinel systems that are in service across the region.”

For more information on Sentinel, please click here


Port of Los Angeles and GE Transportation Build On Early Success of Pilot with Commercial Agreements Worth Up to $12 Million

Teams scale digital pilot, adding terminals and shipping lines throughout Port to help goods move more efficiently through America’s largest container port 

LOS ANGELES, Aug. 21, 2017 – (NYSE:GE) – Less than a year since launching a first-of-its kind digital solution to keep cargo flowing efficiently through America’s largest container port, the Port of Los Angeles and GE Transportation are expanding the program to include all container terminals and shipping lines at the Port.

Because of the pilot’s success, the Port of Los Angeles and GE Transportation have agreed to new commercial agreements worth up to nearly $12 million and extended their relationship for at least five years. The agreements, subject to review by the Los Angeles City Council, will be far reaching, supporting approximately nine million TEUs (20-foot shipping containers), more than 15,000 truck providers and thousands of cargo importers.

“With our container volumes at record highs, the GE digital shipping solution is critical to our future success,” said Gene Seroka, executive director of the Port of Los Angeles. “The GE portal is an investment in the long-term growth of the Port of Los Angeles and tells our stakeholders and customers that we take seriously our responsibility to find new ways to drive efficiencies and optimization. We believe this project will not only move the needle but could be a game changer.”

View Video

Based on the initial pilot results, the Port of Los Angeles anticipates efficiency gains of between eight and 12 percent as the enhanced solution is rolled out across the Port.

To inform the next phase of the collaboration, the Port of Los Angeles and GE Transportation surveyed users involved in the initial pilot. Results were overwhelmingly positive with most respondents agreeing the data in the portal is easy to understand and easy to access.

“This project has been a home run,” said John Ochs, senior director at APM Terminals, the site of the pilot project. “The Port of Los Angeles has transformed data into information that can be utilized by stakeholders to optimize their goods movement processes.”

“The Port of Los Angeles and GE Transportation have become the global leaders on trying to digitize the supply chain and bring efficiencies to the maritime industry,” said Weston LaBar, executive director of the Harbor Trucking Association. “A trucking dispatcher may visit up to 40 websites a day just to coordinate cargo movement into the port complex. Having a single portal, a single reference point, will create new levels of efficiency that we’ve been seeking for a long time.”

The survey also uncovered areas for improvement. For example, users said they would like to see more terminals and shipping lines integrated into the solution, which is reflected in the new commercial agreement. Additional areas for progression include improving the level of detail users can access about each shipment, and increasing their access to shipment data across the supply chain.

“The initial results of the pilot are resonating with partners and providing an opportunity for us to collaborate on expanding the work. It’s a major step toward exploring how a system like this could be developed and implemented for other ports in the U.S. and abroad,” said Jamie Miller, president and CEO at GE Transportation. “This is a game changing effort for business, the economy, investors and consumers.”

For ongoing updates about the partnership, visit http://getransportation.com/port-of-la.


Gatekeeper Security CEO, Christopher Millar, Describes Their Winning Product

Gatekeeper Security CEO Christopher Millar describes his company's only fully automatic (AUVIS) under vehicle inspection in the world capable of automatically inspecting all vehicles traveling on a road or rail. The AUVIS can work on either a one-to one basis when deploying Gatekeeper’s license plate readers system or on a one to many basis when using Gatekeeper’s pattern recognition software to find the same or similar vehicle in the system’s database using the only the undercarriage image as a reference.

Gatekeeper was the Winner in GSN’s recent 2017 Airport, Seaport, Border Security Awards in the Categories of “Border Security and Immigration” and “Best Physical/Logical Privileged Access Solution.” See Mr. Millar’s description of Gatekeeper Security below: 

Gatekeeper produces the only fully automatic under vehicle inspection system (AUVIS) in the world capable of automatically inspecting all vehicles traveling on road or rail. The Gatekeeper system produces virtual 3D images of the undercarriage looking forward and backward at 60 degrees to inspect on top of axles and cross beams. The AUVIS can work in a one to one basis when deploying Gatekeeper's license plate reading system or on a one to many basis by recovering a vehicle reference image from the system database based purely on the undercarriage image. AUVIS is the only under vehicle system that can automatically detect change to an undercarriage whether it is a foreign object or a change in configuration. The AUVIS is not susceptible to driver behavior such as a vehicle stopping on top of the scanner, speeding up or slowing down while being scanned or if drivers cross the scanner in different places (to the left or to the right of center) at each scan. The scanning system has an environmental rating of IP68 and operates as a stand alone platform or as a large multi scanner platform sharing references images and vehicle records via a central database. System are deploy in 30 countries from Russia to the Middle East to SE Asia.

To learn more about Gatekeeper products and the company, visit: 

www.gatekeepersecurity.com 

NSR Report Projects Satellite Ground Segment Reaching $158 Billion in Next Decade

Growth Driven by Explosion in Mobility and Consumer/VSAT Broadband Segments

 

NSR’s Commercial Satellite Ground Segment, 2nd Edition (CSGS2), released tomorrow, forecasts 2016-2026 cumulative global revenues for Commercial Satellite Ground Equipment to surpass $158 billion. Satellite TV continues to be the largest segment by shipments and revenues. Consequently, Set-Top-Boxes and Antennas generate the largest revenue shares. However, in terms of growth VSAT platforms (modems + baseband equipment), driven by verticals such as Consumer Broadband and Mobility, will exhibit the highest levels. RF chains will also see applications like Aeronautical Satcom booming, while other verticals, such as Satcom Earth Stations, will contract. This leads to overall flat revenues of approx. $1.3 billion per year.

“Satellite Ground Equipment is a very dynamic market with opportunities available across the board. However, technologies and business models are changing at a rapid pace and only the most adaptive actors will survive,” stated Lluc Palerm, NSR Senior Analyst and report author. “VSAT platforms will see spectacular developments from emerging verticals like Consumer Broadband and Cellular Backhaul, but to capture these growth opportunities, vendors will need to move platforms to the ‘cloud’ and closely integrate with the space segment.”

Satellite Ground Equipment is analyzed by equipment type, and forecasts are segmented by STB, modems, antennas, and RF equipment. Antenna manufacturers are falling into commoditization in the low-end, while highly specialized applications are witnessing a surge in demand. Flat Panel Antennas (FPAs) have the potential to disrupt these highly profitable opportunities. With segments such as Satcom Earth Stations shrinking, traditional RF equipment might experience a readjustment in revenues. Yet SSPA will see a bright future with applications, like mobility or cellular backhaul, moving to higher throughputs and performances continuously improving.

Baseband Equipment is witnessing skyrocketing demand from HTS platforms. The flexibility to serve multiple verticals, the need to scale to (V)HTS or the need to boost bandwidth efficiencies are essential success factors for the future. In the Satcom Earth Stations segment, demand for FSS Broadband and Video will encounter challenges, but HTS will spur growth. The Earth Observation Ground Segment will remain a relatively small market, but opportunities serving the small satellite revolution will stimulate demand.

About the Report
NSR’s Commercial Satellite Ground Segment, 2nd Edition is the only industry analysis and forecast of the commercial satellite ground equipment sector. The study leverages NSR’s extensive and in-depth satellite industry knowledge and provides shipments and equipment revenues for all key industry segments: Satellite TV, Consumer Broadband, Fixed Enterprise VSAT, Cellular Backhaul, Trunking, IP Content Distribution, Aeronautical Satcom, Land Mobile, Maritime, Baseband Equipment, SatCom Earth Stations and Earth Observation Ground Segment. It is the first and only report to segment equipment shipments and revenues into STB, modems, antennas and RF Equipment. The report covers shipments and equipment revenues in five regional markets, investigates trends impacting market growth and business models, and surveys technological trends shaping the future of the ground equipment and impacting the satellite industry as a whole. For additional information on this report, including a full table of contents, list of exhibits and executive summary, please visit www.nsr.com or call NSR at 617-674-7743.

Gartner Defines New Application Security Testing Orchestration Market and Mentions Code Dx

Gartner’s 2017 Hype Cycle for Application Security also Mentions Code Dx in Application Vulnerability Correlation Category

 

Code Dx, Inc., provider of an award-winning application security solution that automates and accelerates the discovery, prioritization and management of software vulnerabilities, was recognized by Gartner in its Hype Cycle for Application Security, 2017 report published July 28, 2017. Code Dx was identified by Gartner analysts as a sample vendor in its new category for Application Security Testing Orchestration (ASTO), and also in the Application Vulnerability Correlation (AVC) category.

According to Gartner, “Application security testing orchestration (ASTO) integrates security tooling across a software development life cycle (SDLC), typically as part of DevSecOps initiatives.” As stated in the report, “Application vulnerability correlation (AVC) tools are workflow and process management tools that streamline software development application vulnerability testing and remediation. They incorporate findings from various security-testing data sources (static and dynamic application security testing, software composition analysis, penetration testing, and code reviews) into a centralized tool. AVC tools correlate vulnerability findings to centralize data, perform analysis, prioritize remediation and coordinate application security activities.”

“Gartner is a respected thought leader in information technology, known for forecasting and assessing the potential impact of new security markets. We feel their mention of Code Dx, Inc. in two on-the-rise markets validates the direction we are taking Code Dx,” said Anita D’Amico, Ph.D., CEO of Code Dx. “As the Application Security Testing (AST) market continues to evolve and mature, comprehensive solutions that automate correlation and vulnerability management are becoming a necessity. These solutions not only speed the testing process and enable teams to focus on developing software, they also provide the peace of mind that comes from knowing the code being developed is secure. We believe Gartner clearly understands the current AST challenges and the need for tools that go beyond just testing code.”

In the report, Gartner discusses the business impact of ASTO solutions stating that they “aid security, development and operations teams in coordinating the many security tests that should be performed on code. As such, these solutions can be a significant enabler in implementing DevSecOps initiatives, and they promise substantial benefits to the organization in terms of more consistent testing and smoother operations. To the extent individual solutions provide them, additional capabilities – such as the ability to correlate, analyze, and assess defects and vulnerabilities – help improve the speed and effectiveness of vulnerability remediation efforts.”

For the Application Vulnerability Correlation (AVC) tools, the Hype Cycle report states that “the most important business impact is that application security testing programs can realize tangible operational efficiencies in their efforts to manage remediation workflows, and they can prioritize scarce resources for the most critical efforts. As noted, the sources of vulnerability data are growing, and managing and interpreting the data is increasingly challenging. By providing a single view into the wider range of vulnerabilities within an application portfolio, AVC tools can serve as a viewpoint into the relative risk posed by individual applications. By increasing the visibility of the vulnerabilities contained within applications, senior management also gains perspective and an understanding of this critical source of risk — which is likely to enhance overall risk management efforts and potentially lead to increased funding of and prioritization for application security efforts.”

Code Dx Enterprise is an automated application vulnerability correlation and management tool that enables multiple testing tools to work together to provide one set of correlated results, then helps users prioritize and manage those vulnerabilities — integrating with application lifecycle management tools so security and development teams work together for faster remediation.

Disclaimer

Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner's research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.

Pages

 

Recent Videos

HID Global is opening the door to a new era of security and convenience.  Powered by Seos technology, the HID Mobile Access solution delivers a more secure and convenient way to open doors and gates, access networks and services, and make cashless payments using phones and other mobile devices. ...
Mobile device forensics can make a difference in many investigations, but you need training that teaches you how to get the most out of your mobile forensics hardware and software, and certifies you to testify in court. Read this white paper to learn how to evaluate mobile forensics training...
PureTech Systems is a software company that develops and markets PureActiv, its geospatial analytics solution designed to protect critical perimeters and infrastructure.  Its patented video analytics leverage thermal cameras, radars and other perimeter sensors to detect, geo-locate, classify, and...
PureTech Systems is a technology leader in the use of geospatial video, focusing on perimeter security.  When combining geospatial capabilities with video analytics and PTZ camera control, managers of critical facilities can benefit by allowing the video management system to aid them in the process...