Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Risk

1/25/2010
03:18 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

WhiteHat Partners With Aspect For Web App Security

On-demand assessment capabilities of WhiteHat Sentinel enable Aspect Security consultants to manage vulnerability analysis across a large portfolio of Web applications

SANTA CLARA, Calif. and COLUMBIA, MD " January 25, 2010 " WhiteHat Security, the leading provider of website risk management solutions, today announced its partnership with Aspect Security, an application security consulting company that enables companies to build, verify and manage secure applications. The combination of Aspect Security's service offerings and WhiteHat Sentinel's Software-as-a-Service (SaaS) website vulnerability management platform provides organizations the solution they need to build more secure Web applications and create a sound risk management program.

This relationship underscores the need to address an enterprise's application portfolio with a continuous, comprehensive risk program versus a series of one-off assessments. The on-demand assessment capabilities of WhiteHat Sentinel enable Aspect Security consultants to manage vulnerability analysis across a large portfolio of Web applications while developing a custom program to eliminate flaws from being introduced early in the software development lifecycle.

WhiteHat Sentinel's proven, proprietary methodology and highly accurate assessment results deliver the actionable information that developers need to effectively repair software code and lower the application development cost structure. With its technology platform providing a scalable foundation, WhiteHat Sentinel complements Aspect's consulting services, including code review and training, by providing detailed and verified application vulnerability information that links real-world operations to development activities.

Together, Aspect's services and WhiteHat Sentinel enable quick feedback to developers who introduce security vulnerabilities. Aspect will work with developers and ensure that they have everything they need to remediate problems and prevent them from recurring. Sentinel's continuous testing combined with Aspect's other metrics ensures visibility into the state of application security across the portfolio.

"WhiteHat's scalable vulnerability assessment platform fills a key need in any application security program because it provides continuous and concrete proof of the risk and the need to improve," said Jeff Williams, chief executive officer, Aspect Security. "WhiteHat Sentinel provides the infrastructure to pinpoint, prioritize and retest vulnerabilities, making it easier and faster for Aspect to build a business case for our customers. Customers quickly gain a better understanding of their application security posture and the combination of services that will improve it."

Built from the ground up to assess the largest, most complex sites on the Web, WhiteHat Sentinel delivers the visibility, flexibility and manageability organizations need to attain complete website risk management and prevent Web attacks. With more than 1,500 websites under management, WhiteHat executes rigorous and ongoing security testing of the world's leading websites, including many Fortune 500 companies.

"We are pleased to add a top-tier consulting firm like Aspect to our partner ecosystem, and look forward to working together to advance website security at customer organizations," said Jeremiah Grossman, founder and chief technology officer, WhiteHat Security. "Combining Aspect's respected code review, testing capabilities and application security training courses with our enterprise-class website vulnerability management solution allows companies to reduce the risk of attacks and successfully measure the outcome of their efforts in website security."

The WhiteHat Security partner program gives organizations a turnkey solution to offer world-class website security solutions, grow revenue and increase the value of their existing service offerings. With two levels " Reseller and Reference partners " the program is designed to provide technical and business support to a range of current and future partners, delivering benefits that will align with each partner's business model. For more information on WhiteHat's partner program please visit http://www.whitehatsec.com/home/partner/partner.html.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
How to Better Secure Your Microsoft 365 Environment
Kelly Sheridan, Staff Editor, Dark Reading,  1/25/2021
Attackers Leave Stolen Credentials Searchable on Google
Kelly Sheridan, Staff Editor, Dark Reading,  1/21/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
2020: The Year in Security
Download this Tech Digest for a look at the biggest security stories that - so far - have shaped a very strange and stressful year.
Flash Poll
Assessing Cybersecurity Risk in Today's Enterprises
Assessing Cybersecurity Risk in Today's Enterprises
COVID-19 has created a new IT paradigm in the enterprise -- and a new level of cybersecurity risk. This report offers a look at how enterprises are assessing and managing cyber-risk under the new normal.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-4682
PUBLISHED: 2021-01-28
IBM MQ 7.5, 8.0, 9.0, 9.1, 9.2 LTS, and 9.2 CD could allow a remote attacker to execute arbitrary code on the system, caused by an unsafe deserialization of trusted data. An attacker could exploit this vulnerability to execute arbitrary code on the system. IBM X-Force ID: 186509.
CVE-2020-4888
PUBLISHED: 2021-01-28
IBM QRadar SIEM 7.4.0 to 7.4.2 Patch 1 and 7.3.0 to 7.3.3 Patch 7 could allow a remote attacker to execute arbitrary commands on the system, caused by insecure deserialization of user-supplied content by the Java deserialization function. By sending a malicious serialized Java object, an attacker co...
CVE-2020-13569
PUBLISHED: 2021-01-28
A cross-site request forgery vulnerability exists in the GACL functionality of OpenEMR 5.0.2 and development version 6.0.0 (commit babec93f600ff1394f91ccd512bcad85832eb6ce). A specially crafted HTTP request can lead to the execution of arbitrary requests in the context of the victim. An attacker can...
CVE-2021-20620
PUBLISHED: 2021-01-28
Cross-site scripting vulnerability in Aterm WF800HP firmware Ver1.0.9 and earlier allows remote attackers to inject an arbitrary script via unspecified vectors.
CVE-2021-20621
PUBLISHED: 2021-01-28
Cross-site request forgery (CSRF) vulnerability in Aterm WG2600HP firmware Ver1.0.2 and earlier, and Aterm WG2600HP2 firmware Ver1.0.2 and earlier allows remote attackers to hijack the authentication of administrators via unspecified vectors.