Risk
2/25/2014
09:04 AM
Dark Reading
Dark Reading
Products and Releases
Connect Directly
RSS
E-Mail
50%
50%

Cenzic Announces New Application Security Service For The Connected Enterprise

Cenzic PASS allows enterprises to define the criteria for acceptably safe partner applications

Campbell, CA – February 24, 2014– Cenzic, a leading provider of application security intelligence to reduce security risk, today announced the release of its Partner Application Security Certification Program, the first solution designed to manage and reduce online risk for enterprises connecting with third party applications. Offered via a combination of consulting and cloud-based vulnerability scanning as a service, theCenzic Partner-Application Security Scanning (Cenzic PASSTM)service helpsenterprises invite partners to test and certify any integrated application in a reliable, efficient and practical way to reduce online risk.

Powered by the Cenzic Hailstorm&trade engine with leading accuracy and comprehensive detection, Cenzic PASSTMoffers the best web application vulnerability detection service and remediationguidance for connecting partner applications.The service allows enterprises to define the criteria for acceptably safe partner applications to connect to the enterprise and meet compliance requirements, and directs partners and vendors to a Cenzic-hosted application scanning portal for workflow-driven self-service certification. By creating a custom scanning portal, Cenzic guides partners through the process of certifying the applications they integrate with on your website to ensure they meet pre-defined security standards.

"Virtually every enterprise is part of a vast supply chain that involves many participants. Yet, most of these organizations build their cyber security defenses as if they are islands," said Bala Venkat, Chief Marketing Officer (CMO) of Cenzic."Today, enterprises must go beyond their own internal firewalls and look more closely at the shared infrastructure. Cenzic PASSTMoffers enterprises a new,customizable approach to manage online risk and certify the security standards of their partner applications,benefiting both the enterprise and the partner in the face of malicious attacks."

Cenzic PASSTM offers a full suite of services including:

• Accurate cloud-based scanning servicesto test the vulnerabilities in integrated partner applications.

• Consulting Services to help definethe application security certification standards needed by partners.

• Customization of portal, policy, database, and all automated emails that usher application owners through certification.

• An Administration Dashboardthat displays the scanningstatus and allows you to efficiently manage outcomes.

• Detailed Vulnerability Reports sent to partners, who can then opt to work directly with Cenzic for any remediation.

Cenzic's partner and vendor application security service provides a cost-effective and efficient certification process ensuring that all third-party applications integrated with an enterprise have minimal vulnerabilities. As a result, business partners are able to maintain effective defenses, while interdependent systems and applications across the entire supply chain are completely secure.

Cenzic PASS is immediately available. For more information, please visit: https://www.cenzic.com/solutions/supply-chain-web-application-security/index.html

About Cenzic

Cenzic provides the leading application security intelligence platform to continuously assess Cloud, Mobile and Web applications to reduce online security risk. Cenzic's solutions scale from single applications to enterprise-level deployments with hybrid approaches that enable testing of applications at optimal levels. Cenzic helps brands of all sizes protect their reputation and manage security risk in the face of malicious attacks. Cenzic's solutions are used in all parts of the software development lifecycle, and most importantly in production, to protect against new threats even after the application has been deployed. Cenzic's application security intelligence platform is architected to handle web, cloud and mobile applications and is the first to provide risk reduction recommendations for business, application developers and specific applications. Today, Cenzic secures more than half a million online applications and trillions of dollars of commerce for Fortune 1000 companies, all major security companies, government agencies, universities and SMBs. More information about Cenzic can be found atwww.cenzic.com

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Flash Poll
Current Issue
Cartoon
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-6306
Published: 2014-08-22
Unspecified vulnerability on IBM Power 7 Systems 740 before 740.70 01Ax740_121, 760 before 760.40 Ax760_078, and 770 before 770.30 01Ax770_062 allows local users to gain Service Processor privileges via unknown vectors.

CVE-2014-0232
Published: 2014-08-22
Multiple cross-site scripting (XSS) vulnerabilities in framework/common/webcommon/includes/messages.ftl in Apache OFBiz 11.04.01 before 11.04.05 and 12.04.01 before 12.04.04 allow remote attackers to inject arbitrary web script or HTML via unspecified vectors, which are not properly handled in a (1)...

CVE-2014-3525
Published: 2014-08-22
Unspecified vulnerability in Apache Traffic Server 4.2.1.1 and 5.x before 5.0.1 has unknown impact and attack vectors, possibly related to health checks.

CVE-2014-3563
Published: 2014-08-22
Multiple unspecified vulnerabilities in Salt (aka SaltStack) before 2014.1.10 allow local users to have an unspecified impact via vectors related to temporary file creation in (1) seed.py, (2) salt-ssh, or (3) salt-cloud.

CVE-2014-3587
Published: 2014-08-22
Integer overflow in the cdf_read_property_info function in cdf.c in file through 5.19, as used in the Fileinfo component in PHP before 5.4.32 and 5.5.x before 5.5.16, allows remote attackers to cause a denial of service (application crash) via a crafted CDF file. NOTE: this vulnerability exists bec...

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Three interviews on critical embedded systems and security, recorded at Black Hat 2014 in Las Vegas.