New Seeker release from Synopsys
- Auteur:Ella Cai
- Relâchez le:2018-08-01
Synopsys has announced availability of a new Seeker release, an interactive application security testing (IAST) solution redesigned to enable DevSecOps and continuous delivery of secure web applications.
Seeker integrates into CI/CD pipelines and monitors web applications during preproduction testing cycles.
It clams to be the only application security solution that detects and automatically verifies whether vulnerabilities are exploitable, providing developers with accurate, actionable information in real time.
Seeker’s approach continuously mitigates application security risk in a tight feedback loop, complementing DAST scans and penetration tests that occur later in the development cycle and often require dedicated, out-of-band testing cycles and manual results verification and triage.
To address software dependency risk, Seeker integrates Black Duck Binary Analysis (formerly Protecode SC) to automatically detect known vulnerabilities and license conflicts in open source components. Seeker is also the only IAST solution that provides sensitive-data tracking to help achieve compliance with standards and regulations like PCI DSS and GDPR.
Seeker supports large-scale, cloud-based, and microservices-based application architectures.
Key features include:
Seeker integrates into CI/CD pipelines and monitors web applications during preproduction testing cycles.
It clams to be the only application security solution that detects and automatically verifies whether vulnerabilities are exploitable, providing developers with accurate, actionable information in real time.
Seeker’s approach continuously mitigates application security risk in a tight feedback loop, complementing DAST scans and penetration tests that occur later in the development cycle and often require dedicated, out-of-band testing cycles and manual results verification and triage.
To address software dependency risk, Seeker integrates Black Duck Binary Analysis (formerly Protecode SC) to automatically detect known vulnerabilities and license conflicts in open source components. Seeker is also the only IAST solution that provides sensitive-data tracking to help achieve compliance with standards and regulations like PCI DSS and GDPR.
Seeker supports large-scale, cloud-based, and microservices-based application architectures.
Key features include:
- Active vulnerability verification for unrivaled accuracy: Seeker is the only IAST solution that provides automated active verification to confirm that detected vulnerabilities are exploitable. This verification is achieved through patented technology that replays original HTTP(S) requests with tainted parameters and monitors the resulting application dataflow. The result is a near-zero false positive rate, which is significantly lower than that of other IAST and DAST solutions and reduces the cost of manual verification.
- Sensitive-data tracking: Seeker is the only IAST tool that enables security teams to identify and track sensitive data, such as credit card numbers, usernames, and passwords, to ensure that it is handled securely and not stored in log files or databases with weak or no encryption. Sensitive-data tracking helps organizations comply with data security regulations including PCI DSS, HIPAA, and GDPR.
- CI/CD integration and flexible deployment: Seeker can be deployed in virtually any type of automated or manual testing environment with minimal configuration required. Seeker fits seamlessly into CI/CD pipelines with native plugins and easy-to-use web APIs for bug tracking, build, and test automation tools. Seeker supports standard, microservices-based, and cloud-based application architectures and is scalable for large enterprise requirements.