Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


06:10 PM
Dark Reading
Dark Reading
Products and Releases

Veracode, SignaCert Partner For End-to-End Compliance

Collaboration provides organizations with insight into the authenticity, integrity, and security of software applications to implement centralized governance and controls to meet software compliance requirements

Portland, OR and Burlington, MA " May 21, 2009 " SignaCert, a leading provider of IT Compliance solutions based on whitelisting and Veracode, provider of the world's leading cloud-based Application Risk Management Platform, today announced a broad collaboration around their respective methods for code validation and security verification. This collaboration provides organizations with insight into the authenticity, integrity and security of software applications to implement centralized governance and controls to meet software compliance requirements.

"We have been focused with our partner, Veracode, on this for a long time," said SignaCert Founder Wyatt Starnes. "Software validation, based on best-of-breed code trust from our known-provenance attestation model, and Veracode's patented binary code security verification services are a natural fit. This is particularly important for our mutual government customers." In-February of 2009, a consortium of federal agencies and private organizations released the Consensus Audit Guidelines (CAG) that define the most critical security controls to protect federal information systems and implement continuous FISMA compliance. SignaCert and Veracode have seen strong traction in government markets and their joint solution provides federal agencies with a comprehensive solution to meet the CAG's whitelist and application software security requirements.

SignaCert recently announced a significant arrangement with Microsoft for whitelist, or software "allow lists" that has resulted in a standardized and extensible Data Exchange Format (DEF). With the addition of Veracode's security verification, SignaCert will extend the DEF to support software security ratings directly from the Veracode Application Risk Management Platform.

The SignaCert & Veracode collaboration will include:

  • An extended Data Exchange Format (DEF) that standardizes the protocol for combining integrity assurance and software security verification and ratings.

  • Roadmap inclusion by SignaCert and Veracode enabling the support and delivery of integrity assessment and code security qualitative rankings with a standardized data representation.

    "Software whitelisting and application security testing are key components in building a successful application risk management program," said Neil MacDonald, VP and Gartner Fellow. "Including security ratings as an attribute within software whitelist databases provides organizations with additional insight into an application for setting and enforcing application control policies."

    "Organizations don't want to deploy insecure software, but haven't had any insight into the validation or verification of their applications," said Matthew Moynahan, CEO of Veracode. "This partnership lets organizations know the security and authenticity of software before making important and expensive deployment decisions."

    About SignaCert SignaCert is the leading provider of end-to-end and partner-based IT compliance solutions based on known-provenance whitelist technology. These methods allow SignaCert's direct customers to rapidly achieve and prove continuous compliance for the systems that deliver critical business services. The SignaCert architecture is designed to seamlessly integrate with existing change processes and continuously monitor critical business services without disruption.

    Additionally, SignaCert's OEM and ISV Partners can supply to, or license content from, the SignaCert Global Trust Repository (GTR), adding new and important capabilities to their product offerings. All use cases are supported by a rich repository of vendor-independent software measurements. These "white" or "allow" list methods enable SignaCert's patented technology to be quickly deployed and provide immediate visibility into the actual state of IT infrastructure.

    Founded in 2004 by 34-year IT security and compliance industry veteran Wyatt Starnes, SignaCert has assembled a world-class team of industry leaders with hands-on IT experience for its executive team, board of directors, and advisory board. SignaCert's end-customers span a wide variety of industries, including financial services, government, and healthcare.

    For more general information visit: www.signacert.com. Media Contact: Dawn Glockler 503-227-2207 [email protected]

    About Veracode Veracode provides the world's leading Application Risk Management Platform. Veracode SecurityReview's patented and proven cloud-based capabilities allow customers to govern and mitigate software security risk across a single application or an enterprise portfolio with unmatched simplicity. Customers include the world's largest and most security aware organizations in every industry. Recognized as a Gartner "Cool Vendor," The Wall Street Journal's "Technology Innovation Award," The Banker's "Information Security Project of the Year" with Barclays, SC Magazine's "Best Vulnerability Assessment Solution," Information Security "Readers' Choice Award," and AlwaysOn Northeast's "Top 100 Private Company," Veracode is Software Security Simplified. For more information, visit www.veracode.com.

    Media Contact: Beth Cossette Lois Paul & Partners 781-782-5715 [email protected]

    Comment  | 
    Print  | 
    More Insights
  • Comments
    Newest First  |  Oldest First  |  Threaded View
    Why Cyber-Risk Is a C-Suite Issue
    Marc Wilczek, Digital Strategist & CIO Advisor,  11/12/2019
    Black Hat Q&A: Hacking a '90s Sports Car
    Black Hat Staff, ,  11/7/2019
    The Cold Truth about Cyber Insurance
    Chris Kennedy, CISO & VP Customer Success, AttackIQ,  11/7/2019
    Register for Dark Reading Newsletters
    White Papers
    Cartoon Contest
    Current Issue
    7 Threats & Disruptive Forces Changing the Face of Cybersecurity
    This Dark Reading Tech Digest gives an in-depth look at the biggest emerging threats and disruptive forces that are changing the face of cybersecurity today.
    Flash Poll
    Rethinking Enterprise Data Defense
    Rethinking Enterprise Data Defense
    Frustrated with recurring intrusions and breaches, cybersecurity professionals are questioning some of the industrys conventional wisdom. Heres a look at what theyre thinking about.
    Twitter Feed
    Dark Reading - Bug Report
    Bug Report
    Enterprise Vulnerabilities
    From DHS/US-CERT's National Vulnerability Database
    PUBLISHED: 2019-11-14
    STMicroelectronics ST33TPHF2ESPI TPM devices before 2019-09-12 allow attackers to extract the ECDSA private key via a side-channel timing attack because ECDSA scalar multiplication is mishandled, aka TPM-FAIL.
    PUBLISHED: 2019-11-14
    SnowHaze before 2.6.6 is sometimes too late to honor a per-site JavaScript blocking setting, which leads to unintended JavaScript execution via a chain of webpage redirections targeted to the user's browser configuration.
    PUBLISHED: 2019-11-14
    In klibc 1.5.20 and 1.5.21, the DHCP options written by ipconfig to /tmp/net-$DEVICE.conf are not properly escaped. This may allow a remote attacker to send a specially crafted DHCP reply which could execute arbitrary code with the privileges of any process which sources DHCP options.
    PUBLISHED: 2019-11-14
    The SQLDriverConnect() function in unixODBC before 2.2.14p2 have a possible buffer overflow condition when specifying a large value for SAVEFILE parameter in the connection string.
    PUBLISHED: 2019-11-14
    A memory leak in rsyslog before 5.7.6 was found in the way deamon processed log messages are logged when $RepeatedMsgReduction was enabled. A local attacker could use this flaw to cause a denial of the rsyslogd daemon service by crashing the service via a sequence of repeated log messages sent withi...