SlideShare a Scribd company logo
APPLICATION	
  SECURITY	
  MANAGEMENT	
  
How to efficiently identify and
remediate critical vulnerabilities
in SAP and other Business
Applications
Agenda
  Why measure the effectiveness of your Application Security
  Unified Platform
  Demo:
  Virtual Forge - Code Profiler
  Checkmarx - CxSAST
ThreadFix
  Q&A
3
Why measure the effectiveness of your Application
Security
  The state of Application Security
  Why traditional tactics of Application Security Management fail
  The need to orchestrate tons of security tools for different
purposes
4
A unified platform to manage risks in your business
applications
  Checkmarx and Virtual Forge provide customers with a feasible
solution based on ThreadFix:
  Developed by experienced security practitioners
  Combines reports from different code scanners
  Provides a landscape wide overview
  Easy control and monitoring of effort, timelines and
achievements
  Common Weakness Enumeration (CWE)
  Free Community Version available
5
Integration of CodeProfiler and CxSAST into ThreadFix
  Manage your findings from one common platform
  CWE Standard Ratings and Certified Integration
Source: ThreadFix by Denim Group
6
DEMO
Next Slide
FF >> 4:00 Min.
Key Takeaways
You have seen, how you can:
  Scan your SAP and other business applications for code
vulnerabilities using CodeProfiler and Checkmarx
  Control and monitor the projects overall application security state
  Evaluate and prioritize the vulnerabilities found
  Track the remediation of vulnerabilities with ThreadFix
8
Next Steps?
  Download the free ThreadFix Community Edition at www.threadfix.org
Sign up for the free SAP Risk Assessment at www.virtualforge.com
Sign up for a free secure code analysis by Checkmarx‘s CxSAST at
www.checkmarx.com
9
Disclaimer
© 2015 Virtual Forge GmbH. All rights reserved.
Information contained in this publication is subject to change without prior notice.
These materials are provided by Virtual Forge and serve only as information.
SAP, ABAP and other named SAP products and services as well as their respective logos are trademarks or registered trademarks
of SAP AG in Germany and other countries worldwide.
All other names of products and services are trademarks of their respective companies. The information in the text are approximate
and is only for information.
Virtual Forge accepts no liability or responsibility for errors or omissions in this publication. From the information contained in this
publication, no further liability is assumed. No part of this publication may be reproduced or transmitted in any form or for any
purpose without the express permission of Virtual Forge GmbH, Germany or Virtual Forge Inc., Philadelphia. The General Terms
and Conditions of Virtual Forge apply.
© 2015 Virtual Forge | www.virtualforge.com | All rights reserved.
10

More Related Content

PDF
The Web AppSec How-To: The Defender's Toolbox
PDF
Application Security Guide for Beginners
PPTX
Secure Code review - Veracode SaaS Platform - Saudi Green Method
PDF
Veracode - Overview
PDF
8 Patterns For Continuous Code Security by Veracode CTO Chris Wysopal
PPTX
Crafting Super-Powered Risk Assessments by Digital Defense Inc & Veracode
PDF
5 Important Secure Coding Practices
PPTX
Application security
The Web AppSec How-To: The Defender's Toolbox
Application Security Guide for Beginners
Secure Code review - Veracode SaaS Platform - Saudi Green Method
Veracode - Overview
8 Patterns For Continuous Code Security by Veracode CTO Chris Wysopal
Crafting Super-Powered Risk Assessments by Digital Defense Inc & Veracode
5 Important Secure Coding Practices
Application security

What's hot (20)

PPTX
Veracode - Inglês
PDF
Application Security Risk Assessment
PPTX
Security in the Development Lifecycle - lessons learned
PDF
Secure Coding and Threat Modeling
PDF
Security Development Lifecycle Tools
PDF
Application Security Testing(AST)
PDF
Software security, secure software development in the age of IoT, smart thing...
PDF
The CA Technologies | Veracode Platform: A 360-Degree View of Your Applicatio...
PPTX
Secure Coding 2013
PDF
10 Tips to Keep Your Software a Step Ahead of the Hackers
PDF
Gloriolesoft Consulting Security and Privacy Offering
PDF
Sumeet Mandloi: Robust Security Testing Framework
PDF
7 measures to overcome cyber attacks of web application
PPTX
Mobile security recipes for xamarin
PPTX
Application Security at DevOps Speed and Portfolio Scale
PDF
Pactera - App Security Assessment - Mobile, Web App, IoT - v2
PPTX
Microsoft Security Development Lifecycle
PDF
Understanding & Addressing OWASP’s Newest Top Ten Threat: Using Components wi...
PPT
Discovering the Value of Verifying Web Application Security Using IBM Rationa...
PDF
SAST vs. DAST: What’s the Best Method For Application Security Testing?
Veracode - Inglês
Application Security Risk Assessment
Security in the Development Lifecycle - lessons learned
Secure Coding and Threat Modeling
Security Development Lifecycle Tools
Application Security Testing(AST)
Software security, secure software development in the age of IoT, smart thing...
The CA Technologies | Veracode Platform: A 360-Degree View of Your Applicatio...
Secure Coding 2013
10 Tips to Keep Your Software a Step Ahead of the Hackers
Gloriolesoft Consulting Security and Privacy Offering
Sumeet Mandloi: Robust Security Testing Framework
7 measures to overcome cyber attacks of web application
Mobile security recipes for xamarin
Application Security at DevOps Speed and Portfolio Scale
Pactera - App Security Assessment - Mobile, Web App, IoT - v2
Microsoft Security Development Lifecycle
Understanding & Addressing OWASP’s Newest Top Ten Threat: Using Components wi...
Discovering the Value of Verifying Web Application Security Using IBM Rationa...
SAST vs. DAST: What’s the Best Method For Application Security Testing?
Ad

Viewers also liked (12)

PDF
[ITAS.VN]CxSuite Enterprise Edition
PPTX
Implementing an Application Security Pipeline in Jenkins
PDF
DevSecOps Singapore 2017 - Security in the Delivery Pipeline
PPTX
DevOps & Security: Here & Now
PDF
Security Tests as Part of CI - Nir Koren, SAP - DevOpsDays Tel Aviv 2015
PDF
A Successful SAST Tool Implementation
PDF
Devops security-An Insight into Secure-SDLC
PDF
Happy New Year!
PPTX
Graph Visualization - OWASP NYC Chapter
PDF
DevSecOps in Baby Steps
PPTX
DEVSECOPS: Coding DevSecOps journey
PDF
Bringing Security Testing to Development: How to Enable Developers to Act as ...
[ITAS.VN]CxSuite Enterprise Edition
Implementing an Application Security Pipeline in Jenkins
DevSecOps Singapore 2017 - Security in the Delivery Pipeline
DevOps & Security: Here & Now
Security Tests as Part of CI - Nir Koren, SAP - DevOpsDays Tel Aviv 2015
A Successful SAST Tool Implementation
Devops security-An Insight into Secure-SDLC
Happy New Year!
Graph Visualization - OWASP NYC Chapter
DevSecOps in Baby Steps
DEVSECOPS: Coding DevSecOps journey
Bringing Security Testing to Development: How to Enable Developers to Act as ...
Ad

Similar to Application Security Management with ThreadFix (20)

PDF
Running a Comprehensive Application Security Program with Checkmarx and Threa...
PDF
RSA 2015 Blending the Automated and the Manual: Making Application Vulnerabil...
PDF
Managing Your Application Security Program with the ThreadFix Ecosystem
PDF
Best Practices for Ensuring SAP ABAP Code Quality and Security
PDF
How Pratt & Whitney Streamlined Their ABAP Security and Quality Code Review P...
PDF
Legacy-SecDevOps (AppSec Management Debrief)
PDF
SC conference - Building AppSec Teams
PDF
The importance of applying SAP patches (Joris van de Vis)
PDF
SecDevOps: Development Tools for Security Pros
PDF
Assessing Business Operations Risk With Unified Vulnerability Management in T...
PPTX
Thread Fix Tour Presentation Final Final
PDF
Case Study: Ensuring the Quality and Security of Custom SAP Applications at t...
PDF
Running a Software Security Program with Open Source Tools
PDF
Application Asset Management with ThreadFix
PDF
A New View of Your Application Security Program with Snyk and ThreadFix
PDF
Cybersecurity Best Practices for 3rd Party Supply Chain
PDF
Blending Automated and Manual Testing
PDF
Mobile Trends And The New Threats - Is Your SAP System Vulnerable to Cyber At...
PPT
Cyber Security integration
PDF
Using Collaboration to Make Application Vulnerability Management a Team Sport
Running a Comprehensive Application Security Program with Checkmarx and Threa...
RSA 2015 Blending the Automated and the Manual: Making Application Vulnerabil...
Managing Your Application Security Program with the ThreadFix Ecosystem
Best Practices for Ensuring SAP ABAP Code Quality and Security
How Pratt & Whitney Streamlined Their ABAP Security and Quality Code Review P...
Legacy-SecDevOps (AppSec Management Debrief)
SC conference - Building AppSec Teams
The importance of applying SAP patches (Joris van de Vis)
SecDevOps: Development Tools for Security Pros
Assessing Business Operations Risk With Unified Vulnerability Management in T...
Thread Fix Tour Presentation Final Final
Case Study: Ensuring the Quality and Security of Custom SAP Applications at t...
Running a Software Security Program with Open Source Tools
Application Asset Management with ThreadFix
A New View of Your Application Security Program with Snyk and ThreadFix
Cybersecurity Best Practices for 3rd Party Supply Chain
Blending Automated and Manual Testing
Mobile Trends And The New Threats - Is Your SAP System Vulnerable to Cyber At...
Cyber Security integration
Using Collaboration to Make Application Vulnerability Management a Team Sport

More from Virtual Forge (17)

PDF
How the U.S. Department of Defense Secures Its Custom ABAP Code
PDF
SAP HANA Security: New Technology, New Risks
PPTX
Stabile und performante Anwendungen für SAP HANA entwickeln
PDF
Develop Stable, High-Performance Applications for SAP HANA
PDF
ABAP Qualitäts-Benchmark: Eine Analyse von über 200 SAP Installationen
PDF
Is your SAP system vulnerable to cyber attacks?
PDF
How to assess the risks in your SAP systems at the push of a button
PDF
Uninvited Guests: Why do hackers love our SAP landscapes?
PDF
Ungebetene Gäste: Warum lieben Hacker aus aller Welt unsere SAP Landschaften?
PPTX
Case Study: Automated Code Reviews In A Grown SAP Application Landscape At EW...
PDF
Case Study: Automatisierte Code Reviews in einer gewachsenen SAP-Applikations...
PPTX
10 GOLDEN RULES FOR CODING AUTHORIZATION CHECKS IN ABAP
PDF
Risks of Hosted SAP Environments
PDF
Case Study: ABAP Development Life Cycle and Governance at THE GLOBE AND MAIL ...
PDF
Die Top 5 Mythen der SAP Sicherheit
PDF
ABAP Code Qualität - Best Practices
PDF
Case Study: Automating Code Reviews for Custom SAP ABAP Applications with Vir...
How the U.S. Department of Defense Secures Its Custom ABAP Code
SAP HANA Security: New Technology, New Risks
Stabile und performante Anwendungen für SAP HANA entwickeln
Develop Stable, High-Performance Applications for SAP HANA
ABAP Qualitäts-Benchmark: Eine Analyse von über 200 SAP Installationen
Is your SAP system vulnerable to cyber attacks?
How to assess the risks in your SAP systems at the push of a button
Uninvited Guests: Why do hackers love our SAP landscapes?
Ungebetene Gäste: Warum lieben Hacker aus aller Welt unsere SAP Landschaften?
Case Study: Automated Code Reviews In A Grown SAP Application Landscape At EW...
Case Study: Automatisierte Code Reviews in einer gewachsenen SAP-Applikations...
10 GOLDEN RULES FOR CODING AUTHORIZATION CHECKS IN ABAP
Risks of Hosted SAP Environments
Case Study: ABAP Development Life Cycle and Governance at THE GLOBE AND MAIL ...
Die Top 5 Mythen der SAP Sicherheit
ABAP Code Qualität - Best Practices
Case Study: Automating Code Reviews for Custom SAP ABAP Applications with Vir...

Recently uploaded (20)

PDF
Internet Downloader Manager (IDM) Crack 6.42 Build 41
PDF
T3DD25 TYPO3 Content Blocks - Deep Dive by André Kraus
PDF
EN-Survey-Report-SAP-LeanIX-EA-Insights-2025.pdf
PDF
Adobe Premiere Pro 2025 (v24.5.0.057) Crack free
PPTX
VVF-Customer-Presentation2025-Ver1.9.pptx
PDF
Digital Strategies for Manufacturing Companies
PPTX
Agentic AI : A Practical Guide. Undersating, Implementing and Scaling Autono...
PPTX
L1 - Introduction to python Backend.pptx
PDF
top salesforce developer skills in 2025.pdf
PDF
AI in Product Development-omnex systems
PPTX
Reimagine Home Health with the Power of Agentic AI​
PDF
System and Network Administration Chapter 2
PDF
Nekopoi APK 2025 free lastest update
PDF
Understanding Forklifts - TECH EHS Solution
PPTX
history of c programming in notes for students .pptx
PPTX
Odoo POS Development Services by CandidRoot Solutions
PPTX
Operating system designcfffgfgggggggvggggggggg
PDF
How Creative Agencies Leverage Project Management Software.pdf
PDF
wealthsignaloriginal-com-DS-text-... (1).pdf
PPTX
Introduction to Artificial Intelligence
Internet Downloader Manager (IDM) Crack 6.42 Build 41
T3DD25 TYPO3 Content Blocks - Deep Dive by André Kraus
EN-Survey-Report-SAP-LeanIX-EA-Insights-2025.pdf
Adobe Premiere Pro 2025 (v24.5.0.057) Crack free
VVF-Customer-Presentation2025-Ver1.9.pptx
Digital Strategies for Manufacturing Companies
Agentic AI : A Practical Guide. Undersating, Implementing and Scaling Autono...
L1 - Introduction to python Backend.pptx
top salesforce developer skills in 2025.pdf
AI in Product Development-omnex systems
Reimagine Home Health with the Power of Agentic AI​
System and Network Administration Chapter 2
Nekopoi APK 2025 free lastest update
Understanding Forklifts - TECH EHS Solution
history of c programming in notes for students .pptx
Odoo POS Development Services by CandidRoot Solutions
Operating system designcfffgfgggggggvggggggggg
How Creative Agencies Leverage Project Management Software.pdf
wealthsignaloriginal-com-DS-text-... (1).pdf
Introduction to Artificial Intelligence

Application Security Management with ThreadFix

  • 2. How to efficiently identify and remediate critical vulnerabilities in SAP and other Business Applications
  • 3. Agenda   Why measure the effectiveness of your Application Security   Unified Platform   Demo:   Virtual Forge - Code Profiler   Checkmarx - CxSAST ThreadFix   Q&A 3
  • 4. Why measure the effectiveness of your Application Security   The state of Application Security   Why traditional tactics of Application Security Management fail   The need to orchestrate tons of security tools for different purposes 4
  • 5. A unified platform to manage risks in your business applications   Checkmarx and Virtual Forge provide customers with a feasible solution based on ThreadFix:   Developed by experienced security practitioners   Combines reports from different code scanners   Provides a landscape wide overview   Easy control and monitoring of effort, timelines and achievements   Common Weakness Enumeration (CWE)   Free Community Version available 5
  • 6. Integration of CodeProfiler and CxSAST into ThreadFix   Manage your findings from one common platform   CWE Standard Ratings and Certified Integration Source: ThreadFix by Denim Group 6
  • 8. Key Takeaways You have seen, how you can:   Scan your SAP and other business applications for code vulnerabilities using CodeProfiler and Checkmarx   Control and monitor the projects overall application security state   Evaluate and prioritize the vulnerabilities found   Track the remediation of vulnerabilities with ThreadFix 8
  • 9. Next Steps?   Download the free ThreadFix Community Edition at www.threadfix.org Sign up for the free SAP Risk Assessment at www.virtualforge.com Sign up for a free secure code analysis by Checkmarx‘s CxSAST at www.checkmarx.com 9
  • 10. Disclaimer © 2015 Virtual Forge GmbH. All rights reserved. Information contained in this publication is subject to change without prior notice. These materials are provided by Virtual Forge and serve only as information. SAP, ABAP and other named SAP products and services as well as their respective logos are trademarks or registered trademarks of SAP AG in Germany and other countries worldwide. All other names of products and services are trademarks of their respective companies. The information in the text are approximate and is only for information. Virtual Forge accepts no liability or responsibility for errors or omissions in this publication. From the information contained in this publication, no further liability is assumed. No part of this publication may be reproduced or transmitted in any form or for any purpose without the express permission of Virtual Forge GmbH, Germany or Virtual Forge Inc., Philadelphia. The General Terms and Conditions of Virtual Forge apply. © 2015 Virtual Forge | www.virtualforge.com | All rights reserved. 10