Risk

4/2/2009
01:22 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Armorize To Provide Web Application Security Technology To New York PHP

Armorize Technologies' Static Source Code Analysis and Verification security service identifies vulnerable code statements that leave applications open to attacks

Santa Clara, April 2, 2009 -- Armorize Technologies and New York PHP, LLC (NYPHP) have announced a strategic partnership to provide PHP implementers with the latest in Web Application Security Technology.

Leveraging Armorize Technologies' position as industry-leader in Static Source Code Analysis and Verification, premier open source solution provider NYPHP is adding web application source code review as a security service. This service identifies vulnerable code statements that leave applications open to attacks such as Cross Site Scripting (XSS), SQL injection and Remote File Inclusion.

By adding proactive Web application security to its service offerings, NYPHP provides efficient remediation of web application vulnerabilities from the outset. This represents a cost-effective and risk-free alternative to the common build-first secure-later paradigm.

Explosive Growth in Web Application Attacks Compromising End-users Web 2.0 has resulted in dynamic technologies that provide businesses and end-users with ever greater capabilities. However it has also brought greater exposure, with hackers directly targeting vulnerable web applications. According to industry analysts at Gartner, by 2010, 80% of organizations will be compromised by such attacks. Instead of seeking to bypass perimeter security controls, hackers are now embedding zero-day attacks in traffic directed at web applications. Research from the Google Malware Analysis Team indicates that in many cases, these compromises are explicitly designed to direct malware at end-user computers for the purpose of stealing information such as stored passwords, banking details, and personal or corporate data.

Rather than the traditional software development practice of adding security after the fact, current trends require proactive and preventative measures, ensuring web applications are built on secure source code from the beginning.

Source Code Analysis offers Proactive Web Application Security Backed by Armorize CodeSecure Static Source Code Analysis and Verification platform, NYPHP's Security Audit Service identifies vulnerabilities in web application source code before deployment. This proactive approach provides significant advantages over the more traditional web application penetration testing model. By pinpointing vulnerable code statements and offering prioritized guidance on remediation, CodeSecure ensures cost-effective and risk-free vulnerability remediation at the root cause.

Under the guidance of an NYPHP professional, clients simply submit their source code through a secure server to receive a full report and analysis that details and prioritizes vulnerabilities. Additionally, clients can get direct expert assistance from a NYPHP senior developer for mitigation and removal of the identified risks.

NYPHP Adds Hosted Source Code Analysis for Open Source Platforms Founded in 2001, New York PHP, LLC is a leading provider of open source business solutions. Their Stackware AMP Platform addresses the disconnect between the application hosting service and the web application itself to assure secure, scalable, and production-ready web solutions.

Building on their experience in AMP development and hosting, recognized security best-practices, and now on Armorize's proven technology, NYPHP adds top-tier hosted source code analysis, providing the first complete solution stack for the AMP vertical.

New York PHP, LLC delivers unmatched service, strategy, and products. Backed by one of the world's strongest technical communities and selected IT professionals, NYPHP combines skill and stability to deliver the next generation of technology support, service and product. For more information, visit http://www.nyphp.com/security New York PHP, LLC

Phone: +1-646-706-7664 Email: [email protected]

About Armorize Technologies Armorize Technologies is a software security company focused on web application security. The company's flagship product, CodeSecure, identifies vulnerabilities in web application source code in order to prevent hacker attacks. In addition to PHP, CodeSecure supports analysis of Java, ASP.NET and Classic ASP programming languages.

From static source code analysis with CodeSecure, to real-time web application protection with SmartWAF and malware injection monitoring and detection with HackAlert, Armorize technologies' award-winning solutions provide security at key points in the web application lifecycle.

With deep roots in academia, the Armorize team garnered consecutive best paper nominations at the prestigious 2003 and 2004 International World Wide Web Conferences. Subsequent recognition for innovative technology and business practices include winning the Red Herring Asia 100 and Global Top 10 Innovators awards, and being invited to present at the Dow Jones Venture Wire Technology Showcase 2008.

With its headquarters in Santa Clara, CA, and its R&D center in the Nan Kang Software Park in Taipei, Taiwan, Armorize has a global customer base with clients from among finance, telecom, government and technology sector leaders.

For more information, visit http://www.armorize.com

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Crowdsourced vs. Traditional Pen Testing
Alex Haynes, Chief Information Security Officer, CDL,  3/19/2019
BEC Scammer Pleads Guilty
Dark Reading Staff 3/20/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: Well, at least it isn't Mobby Dick!
Current Issue
5 Emerging Cyber Threats to Watch for in 2019
Online attackers are constantly developing new, innovative ways to break into the enterprise. This Dark Reading Tech Digest gives an in-depth look at five emerging attack trends and exploits your security team should look out for, along with helpful recommendations on how you can prevent your organization from falling victim.
Flash Poll
The State of Cyber Security Incident Response
The State of Cyber Security Incident Response
Organizations are responding to new threats with new processes for detecting and mitigating them. Here's a look at how the discipline of incident response is evolving.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-4035
PUBLISHED: 2019-03-22
IBM Content Navigator 3.0CD could allow attackers to direct web traffic to a malicious site. If attackers make a fake IBM Content Navigator site, they can send a link to ICN users to send request to their Edit client directly. Then Edit client will download documents from the fake ICN website. IBM X...
CVE-2019-4052
PUBLISHED: 2019-03-22
IBM API Connect 2018.1 and 2018.4.1.2 apis can be leveraged by unauthenticated users to discover login ids of registered users. IBM X-Force ID: 156544.
CVE-2019-9648
PUBLISHED: 2019-03-22
An issue was discovered in the SFTP Server component in Core FTP 2.0 Build 674. A directory traversal vulnerability exists using the SIZE command along with a \..\..\ substring, allowing an attacker to enumerate file existence based on the returned information.
CVE-2019-9923
PUBLISHED: 2019-03-22
pax_decode_header in sparse.c in GNU Tar before 1.32 had a NULL pointer dereference when parsing certain archives that have malformed extended headers.
CVE-2019-9924
PUBLISHED: 2019-03-22
rbash in Bash before 4.4-beta2 did not prevent the shell user from modifying BASH_CMDS, thus allowing the user to execute any command with the permissions of the shell.