Veracode, Inc., a leader in securing the world’s software, acquired by CA Technologies (NASDAQ:CA), announced the evolution of CA Veracode Verified, a program that provides third-party validation of a company’s secure software developing processes.
With approximately 30 per cent of all breaches occurring as a result of a vulnerability at the application layer, software purchasers are demanding more insight into the security of the software they are buying. CA Veracode Verified empowers software vendors to demonstrate their commitment to creating secure software.
New research conducted with International Data Group (IDG) found that 84 per cent of software buyers include security requirements in new vendor contracts. Prospects and existing customers are more discerning than ever before when it comes to the security of the software being purchased, and without a means of demonstrating proof of security, organisations risk experiencing delayed or lost revenue. The CA Veracode Verified program provides several benefits to companies participating in the program, including:
• A road-map for adopting and maturing an application security program tied to practical outcomes and business value for the Modern Software Factory.
• Third-party attestation from an industry leader that an application has undergone security testing as part of the development process. This can help streamline the sales process to proactively address security concerns.
• A focus on the secure coding process, not just a point-in-time release, to embrace DevSecOps and the rapid delivery pace of DevOps and Agile development methods.
• A means of ensuring that third party software purchased or used meets a high standard of application security, to reduce enterprise risk.
“As software becomes a bigger component of value in all industries, every company is driven to become a modern software factory. Security becomes a competitive advantage as companies learn to create and buy high-quality, secure software. Too often we’re seeing security sacrificed to accommodate the speed of business,” said Chris Wysopal, chief technology officer, CA Veracode. “The result is insecure software that causes extraordinarily damaging breaches. The CA Veracode Verified program provides both a road-map towards secure software development and a quick means of determining the commitment to security made by potential software vendor. The program seal highlights organisations that make secure software development a competitive advantage by showing that they adopted a mature application security program that covers the entire SDLC.”
Successful application security is more than just scanning and fixing security flaws, it’s about a change in processes and procedures to embed security into the entire development process. CA Veracode Verified focuses on implementation of secure coding practices, not just recording point-in-time scans, which makes it ideal for today’s DevOps and Agile methods, where releases happen at very high frequency and security must be fully integrated throughout the lifecycle. The CA Veracode Verified program recognises three levels of maturity to help organisations and consumers understand the security posture of the software they purchase and use. The maturity levels are based on more than 12 years of software security trend data pulled from the CA Veracode Platform. This data provides best practices to help create a secure development process that minimizes vulnerabilities and reduces the risk of a breach.
To learn more about CA Veracode Verified, click here.
To read the full research report conducted in conjunction with IDG, click here.
About CA Veracode Veracode, CA Technologies application security business, is a leader in helping organizations secure the software that powers their world. Veracode’s SaaS platform and integrated solutions help security teams and software developers find and fix security-related defects at all points in the software development lifecycle, before they can be exploited by hackers. Our complete set of offerings help customers reduce the risk of data breaches, increase the speed of secure software delivery, meet compliance requirements, and cost effectively secure their software assets- whether that’s software they make, buy or sell.
Veracode serves over 1,600 customers across a wide range of industries, including nearly one-third of the Fortune 100, three of the top four U.S. commercial banks and more than 20 of Forbes’ 100 Most Valuable Brands. Learn more at www.veracode.com, on the Veracode blog, on Twitter and in the CA Veracode Community.
Legal notice Copyright © 2017 Veracode, Inc. All rights reserved. All other brand names, product names, or trademarks belong to their respective holders.
Media Contact: Helen Reiher Hill+Knowlton Strategies Ph: 02 9286 1294 M: 0408 774 766 E: email@example.com
Why nation-state attacks are everyone’s problem
Hear from Invictus Games Sydney 2019 CEO, Patrick Kidd OBE and Head of Technology, @James-d-smith -share their insights on how they partnered with Unisys to protect critical data over an open, public WiFi solution.
With so much change all the time, how can executives best prepare their businesses to meet the security challenges of the coming years? CSO Australia, in conjunction with Mimecast, explored this question in an interactive Webinar that looks at how the threat landscape has evolved – and what we can expect in 2019 and beyond.
An interview with CSO's David Braue and Ian Yip, Chief Technology Officer, McAffee.
According to new research conducted by the Ponemon Institute, Australia and New Zealand have the highest levels of data breaches out of the nine countries investigated. This was linked to heavy investment in security detection and an under-investment in security and vulnerability response capabilities