Scottrade Deploys Source-Code AnalysisScottrade Deploys Source-Code Analysis
Leading online brokerage Scottrade makes application security a priority with Fortify Software
June 4, 2007
PALO ALTO, Calif. -- Fortify Software Inc., the market-leading provider of security products that help companies identify, manage and remediate software vulnerabilities to mitigate risks in enterprise security, today announced that Scottrade, a leading online investment company, is deploying the industry's most proven and widely used source code security analysis solution, Fortify(r) SCA, to protect its trading platforms.
"In financial services, security is job one," said Grant Bourzikas, Scottrade's Director of Information Security and Business Continuity. "Fortify SCA provides executives with the reports needed to gauge application risk level while allowing development teams to fix potential security and quality issues earlier in the coding process."
Scottrade is deploying Fortify SCA as an auditing tool at the beginning of its development process. Scottrade selected Fortify over other competitors because of the depth and accuracy of Fortify SCA when compared during head-to-head test audits, as well as the wide variety of languages, frameworks and operating systems it supports.
"Application security will be a big hot button for the next 10 years and we were looking for a strategic vendor to work with," Bourzikas added. "Fortify's tool was the clear winner in our product evaluation, but we were also impressed with their leadership in this space."
About the Author(s)
You May Also Like
Hacking Your Digital Identity: How Cybercriminals Can and Will Get Around Your Authentication MethodsOct 26, 2023
Modern Supply Chain Security: Integrated, Interconnected, and Context-DrivenNov 06, 2023
How to Combat the Latest Cloud Security ThreatsNov 06, 2023
Reducing Cyber Risk in Enterprise Email Systems: It's Not Just Spam and PhishingNov 01, 2023
SecOps & DevSecOps in the CloudNov 06, 2023
Passwords Are Passe: Next Gen Authentication Addresses Today's Threats
How to Deploy Zero Trust for Remote Workforce Security
How to Use Threat Intelligence to Mitigate Third-Party Risk
Concerns Mount Over Ransomware, Zero-Day Bugs, and AI-Enabled Malware
Securing the Remote Worker: How to Mitigate Off-Site Cyberattacks