Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Risk

5/26/2009
06:10 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Veracode, SignaCert Partner For End-to-End Compliance

Collaboration provides organizations with insight into the authenticity, integrity, and security of software applications to implement centralized governance and controls to meet software compliance requirements

Portland, OR and Burlington, MA " May 21, 2009 " SignaCert, a leading provider of IT Compliance solutions based on whitelisting and Veracode, provider of the world's leading cloud-based Application Risk Management Platform, today announced a broad collaboration around their respective methods for code validation and security verification. This collaboration provides organizations with insight into the authenticity, integrity and security of software applications to implement centralized governance and controls to meet software compliance requirements.

"We have been focused with our partner, Veracode, on this for a long time," said SignaCert Founder Wyatt Starnes. "Software validation, based on best-of-breed code trust from our known-provenance attestation model, and Veracode's patented binary code security verification services are a natural fit. This is particularly important for our mutual government customers." In-February of 2009, a consortium of federal agencies and private organizations released the Consensus Audit Guidelines (CAG) that define the most critical security controls to protect federal information systems and implement continuous FISMA compliance. SignaCert and Veracode have seen strong traction in government markets and their joint solution provides federal agencies with a comprehensive solution to meet the CAG's whitelist and application software security requirements.

SignaCert recently announced a significant arrangement with Microsoft for whitelist, or software "allow lists" that has resulted in a standardized and extensible Data Exchange Format (DEF). With the addition of Veracode's security verification, SignaCert will extend the DEF to support software security ratings directly from the Veracode Application Risk Management Platform.

The SignaCert & Veracode collaboration will include:

  • An extended Data Exchange Format (DEF) that standardizes the protocol for combining integrity assurance and software security verification and ratings.

  • Roadmap inclusion by SignaCert and Veracode enabling the support and delivery of integrity assessment and code security qualitative rankings with a standardized data representation.

    "Software whitelisting and application security testing are key components in building a successful application risk management program," said Neil MacDonald, VP and Gartner Fellow. "Including security ratings as an attribute within software whitelist databases provides organizations with additional insight into an application for setting and enforcing application control policies."

    "Organizations don't want to deploy insecure software, but haven't had any insight into the validation or verification of their applications," said Matthew Moynahan, CEO of Veracode. "This partnership lets organizations know the security and authenticity of software before making important and expensive deployment decisions."

    About SignaCert SignaCert is the leading provider of end-to-end and partner-based IT compliance solutions based on known-provenance whitelist technology. These methods allow SignaCert's direct customers to rapidly achieve and prove continuous compliance for the systems that deliver critical business services. The SignaCert architecture is designed to seamlessly integrate with existing change processes and continuously monitor critical business services without disruption.

    Additionally, SignaCert's OEM and ISV Partners can supply to, or license content from, the SignaCert Global Trust Repository (GTR), adding new and important capabilities to their product offerings. All use cases are supported by a rich repository of vendor-independent software measurements. These "white" or "allow" list methods enable SignaCert's patented technology to be quickly deployed and provide immediate visibility into the actual state of IT infrastructure.

    Founded in 2004 by 34-year IT security and compliance industry veteran Wyatt Starnes, SignaCert has assembled a world-class team of industry leaders with hands-on IT experience for its executive team, board of directors, and advisory board. SignaCert's end-customers span a wide variety of industries, including financial services, government, and healthcare.

    For more general information visit: www.signacert.com. Media Contact: Dawn Glockler 503-227-2207 [email protected]

    About Veracode Veracode provides the world's leading Application Risk Management Platform. Veracode SecurityReview's patented and proven cloud-based capabilities allow customers to govern and mitigate software security risk across a single application or an enterprise portfolio with unmatched simplicity. Customers include the world's largest and most security aware organizations in every industry. Recognized as a Gartner "Cool Vendor," The Wall Street Journal's "Technology Innovation Award," The Banker's "Information Security Project of the Year" with Barclays, SC Magazine's "Best Vulnerability Assessment Solution," Information Security "Readers' Choice Award," and AlwaysOn Northeast's "Top 100 Private Company," Veracode is Software Security Simplified. For more information, visit www.veracode.com.

    Media Contact: Beth Cossette Lois Paul & Partners 781-782-5715 [email protected]

     

    Recommended Reading:

    Comment  | 
    Print  | 
    More Insights
  • Comments
    Newest First  |  Oldest First  |  Threaded View
    COVID-19: Latest Security News & Commentary
    Dark Reading Staff 7/14/2020
    Omdia Research Launches Page on Dark Reading
    Tim Wilson, Editor in Chief, Dark Reading 7/9/2020
    Why Cybersecurity's Silence Matters to Black Lives
    Tiffany Ricks, CEO, HacWare,  7/8/2020
    Register for Dark Reading Newsletters
    White Papers
    Video
    Cartoon
    Current Issue
    Special Report: Computing's New Normal, a Dark Reading Perspective
    This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
    Flash Poll
    The Threat from the Internetand What Your Organization Can Do About It
    The Threat from the Internetand What Your Organization Can Do About It
    This report describes some of the latest attacks and threats emanating from the Internet, as well as advice and tips on how your organization can mitigate those threats before they affect your business. Download it today!
    Twitter Feed
    Dark Reading - Bug Report
    Bug Report
    Enterprise Vulnerabilities
    From DHS/US-CERT's National Vulnerability Database
    CVE-2020-14499
    PUBLISHED: 2020-07-15
    Advantech iView, versions 5.6 and prior, has an improper access control vulnerability. Successful exploitation of this vulnerability may allow an attacker to obtain all user accounts credentials.
    CVE-2020-14501
    PUBLISHED: 2020-07-15
    Advantech iView, versions 5.6 and prior, has an improper authentication for critical function (CWE-306) issue. Successful exploitation of this vulnerability may allow an attacker to obtain the information of the user table, including the administrator credentials in plain text. An attacker may also ...
    CVE-2020-14503
    PUBLISHED: 2020-07-15
    Advantech iView, versions 5.6 and prior, has an improper input validation vulnerability. Successful exploitation of this vulnerability could allow an attacker to remotely execute arbitrary code.
    CVE-2020-14497
    PUBLISHED: 2020-07-15
    Advantech iView, versions 5.6 and prior, contains multiple SQL injection vulnerabilities that are vulnerable to the use of an attacker-controlled string in the construction of SQL queries. An attacker could extract user credentials, read or modify information, and remotely execute code.
    CVE-2020-14505
    PUBLISHED: 2020-07-15
    Advantech iView, versions 5.6 and prior, has an improper neutralization of special elements used in a command (“command injection�) vulnerability. Successful exploitation of this vulnerability may allow an attacker to send a HTTP GET or POST request that create...