(Photo: http://photos.prnewswire.com/prnh/20130830/PH71785-INFO-a )
(Logo: http://photos.prnewswire.com/prnh/20130830/PH71785LOGO-b )
The first fact that arises from the study is that most of the big organizations interviewed currently have processes in place to test their web applications vulnerabilities. Most of them use penetration testing services, automated testing tools - mostly applications scanners or static code analyzers - or web application firewalls to secure their assets.
However, a majority of security managers are unsure of the current level of their application security state and do believe that a hacker could manage to exploit their applications. Also almost half do not have a clear view on the attacks currently performed against their organization.
One of the most interesting findings of this study is the gap between the efforts put into protecting applications and the actual state of the applications. While almost all organizations invest time, money and energy into protecting their infrastructure, using one or more types of service or technology, most applications remain vulnerable and are still being attacked.
The research and linked Infographic can be found at this address:
About Quotium Technologies
Quotium Technologies is a specialist in the development of innovative software solutions to guarantee the security and performance of business critical applications throughout their lifecycle. Quotium is an Interactive Application Security Testing (IAST) pioneer with the release of its application security testing software Seeker. Seeker's technology increases the accuracy of application testing by combining the detection of a potential vulnerability with verification through a real-time exploit attempt. With accuracy, clarity and simplicity, Seeker solution maximizes the return on investment applications.