SlideShare a Scribd company logo
INTERNAL
IAST Tool
POC
Report
INTERNAL
© confidential 2
Objective
 Conduct Proof of Concept to evaluate IAST Tools against ELC centric
requirements as per ELC directions and along with ELC Team
 Perform Technical Evaluation against defined parameters
 Score each IAST tool against technical evaluation parameters
 Conclusion
INTERNAL
© confidential 3
Tool Evaluation Criteria
Evaluation Criteria Seeker(Synopsys) Checkmarx(IAST) AppScan(IAST)
Ease Of Installation
Configuration and
maintenance
Easy to install, configuration and
maintain tool.
Easy to install, configuration
and maintain tool.
Easy to install, configuration and
maintain tool.
Tools Hardware
Specification
• 32 GB RAM.
• CPU-8 Core.
• Operating system
CentOS/Ubuntu/Windows
• Free disk space-300GB.
• 32 GB RAM.
• CPU 4 Core
• Operating system –
Windows/Linux
• Free disk space-500GB
• 8 GB RAM.
• CPU 4 Core
• Operating system-
Windows
• Free disk space-200GB
In-build Tool Benefits
• IDE integrated Scan for easy
of remediation.
• Support Incremental and
Asynchronous scans
• IDE integrated Scan for
easy of remediation.
• Support Incremental and
Asynchronous scans
• Doesn't support IDE integration
• Support Incremental and
Asynchronous scans.
Tool Flavors
• Offers both UI and Command
line usage
• Offers only UI and
Command line usage • Offers only UI
INTERNAL
© confidential 4
Tool Evaluation Criteria
Evaluation Criteria Seeker(Synopsys) Checkmarx(IAST) AppScan(IAST)
Technology Support
ASPNET,C#,Clojure, Gosu,
Groovy, Java,
JavaScript (Node.js),
Scala (Inc. Lift),
VB.NET
Java,
JavaScript (Node.js),
ASPNET,C#
Java, .NET and Node.js
Integration and
Automation capabilities
Tool has good integration with
DevOps Orchestration and
support optimum automation
capabilities.
Tool has good integration with
DevOps Orchestration and
support optimum automation
capabilities
Tool has good integration with
DevOps Orchestration and
supports heavy automation
capabilities
Tool implementation
time frame
< 1 day to install and configure
the setup
<2 days to install and
configure the setup
<2 days to install and configure the
setup
Reporting
Excellent – easy to understand
report
Good – easy to understand
report
Moderate – report are not
comprehensive
Accuracy of security
Findings
Higher number of findings with
good accuracy
Higher number of findings
however lacks accuracy
Moderate number of findings
however lacks accuracy
INTERNAL
© confidential 5
Tool Evaluation Criteria
Evaluation Criteria Seeker(Synopsys) Checkmarx(IAST) AppScan(IAST)
Environments Development, QA, Production Development, QA, Production Development, QA an dProduction
Speed Instant (at runtime) Instant (at runtime) Instant to hours
How It Works Analyzes code and behavior of
running apps through
instrumentation
Analyzes code and behavior of
running apps through
instrumentation
Analyzes application during Manual
testing phase and identify
vulnerabilities
Allows Continuous
Security Testing
YES YES YES
CI/CD Integration YES YES YES
Vulnerable Coverage High Moderate Medium
Accuracy Score: 100% Score: 100% Low
Vulnerabilities
Detection on
Outsourced
Developments
YES YES NO
INTERNAL
© confidential 6
Tool Evaluation Criteria
Evaluation Criteria Seeker(Synopsys) Checkmarx(IAST) AppScan(IAST)
Licensing Model
a) License based on the
number of applications.
a) License based on number
of applications
a) License based on number of
applications.
INTERNAL
© confidential 7
IAST Tool Scoring
Sr.No Scoring Parameters Seeker(Synopsys) Checkmarx(IAST) AppScan(IAST)
Operational
1
Installation/Configuration and
Integration
8 6 6
2 In-build Tool Components 7 7 6
3 Tool Flavor 8 8 8
4 Licensing Model 7 7 6
5 Costing 8 6 6
6 Reporting and Scanning 8 8 7
Technical
7 Language/Technology Support 9 6 6
8 Overall Effectiveness of Tool 9 7 6
9 Report Comparision & Review 7 6 6
Overall Score 71 62 57
INTERNAL
© confidential 8
Summary
Seeker(Synopsys) Checkmarx(IAST) AppScan(IAST)
Technology Support Strong Technology support Strong Technology Support Moderate Technology Support
Integration for DevOps
Strong candidate for
Integration with DevOps
pipeline with ease of
deployment and configuration
Good candidate for Integration
with DevOps pipeline with ease
of deployment and configuration
Moderate candidate for
Integration with DevOps pipeline
with ease of deployment and
configuration
False Positive
Elimination
AI powered security assistant
allows elimination of False
Positive
Doesn’t offer any False Positive
elimination capability
Doesn’t offer any False Positive
elimination capability
Speed & Scanning
Accuracy
Strong candidate due to speed
and accuracy
Good candidate due to speed
and moderate accuracy
powered by Legacy CheckMarx
Technology[multiple data
structure scan]
Moderate candidate due to
speed and accuracy
Business Logic
Analysis
Capability to identify business
logic vulnerabilities during
development e.g. Privilege
Escalation, malicious code
detection
Capability to identify business
logic vulnerabilities during
development e.g. Privilege
Escalation, malicious code
detection
Doesn’t offer Business Logic
Analysis
INTERNAL
© confidential 9
Summary- Conclusion
Tool Evaluation :
 Tool that were evaluated are Seeker, Checkmarx and Appscan.
Summary of Finding :
 Considering overall DevSecOps requirements and IAST to be performed by developers our choice of tool
will be Seeker.
 The IAST tools in-scope cannot be compared apple-to-apple considering they have unique factor which
competitor tools wouldn’t possess.
INTERNAL
Thank You
for your time
Cybersecurity & Risk Services
Wipro Limited

More Related Content

PDF
Bridging the Security Testing Gap in Your CI/CD Pipeline
PDF
Webinar–AppSec: Hype or Reality
PDF
Security in CI/CD Pipelines: Tips for DevOps Engineers
PDF
RSA Conference Presentation–Creating a Modern AppSec Toolchain to Quantify Se...
PDF
Synopsys Security Event Israel Presentation: Making AppSec Testing Work in CI/CD
PDF
Datasheet app vulnerability_assess
PPTX
Static Application Security Testing Strategies for Automation and Continuous ...
PPTX
A software monitoring framework for quality verification
Bridging the Security Testing Gap in Your CI/CD Pipeline
Webinar–AppSec: Hype or Reality
Security in CI/CD Pipelines: Tips for DevOps Engineers
RSA Conference Presentation–Creating a Modern AppSec Toolchain to Quantify Se...
Synopsys Security Event Israel Presentation: Making AppSec Testing Work in CI/CD
Datasheet app vulnerability_assess
Static Application Security Testing Strategies for Automation and Continuous ...
A software monitoring framework for quality verification

Similar to IAST Tools POC Report for interactive testing (20)

PPT
Criteria For EA Tool Selection
PPTX
Ppt 3 tool support for testing
PDF
Ast in CI/CD by Ofer Maor
PPTX
What Good is this Tool? A Guide to Choosing the Right Application Security Te...
PPTX
tool support for testing
PPTX
Tool support for testing
PPTX
[OPD 2019] AST Platform and the importance of multi-layered application secu...
PDF
Security at the Speed of Software Development
PDF
Gemini Code Assist Evolution_ My Journey with AI Coding's Latest Breakthrough...
PPTX
How to Get Started with DevSecOps
PPTX
Tool Support For Testing (Chapter 6)
PDF
DevSecOps: Essential Tooling to Enable Continuous Security(25m ADDO)
PDF
A model of Test Driven Infrastructure
PDF
Accelerating Software Delivery [Decoding DevOps Conference - InfoSeption]
PPTX
What are DevSecOps Tools and Why Do You Need Them.pptx
PPTX
What are DevSecOps Tools and Why Do You Need Them?
PDF
The Ultimate IT Toolbox_ Essential Tools for Tech Professionals.pdf
PDF
Tool support for..
PDF
ITIL compliant Open Source tools
PDF
TechTalk 2021: Peran IT Security dalam Penerapan DevOps
Criteria For EA Tool Selection
Ppt 3 tool support for testing
Ast in CI/CD by Ofer Maor
What Good is this Tool? A Guide to Choosing the Right Application Security Te...
tool support for testing
Tool support for testing
[OPD 2019] AST Platform and the importance of multi-layered application secu...
Security at the Speed of Software Development
Gemini Code Assist Evolution_ My Journey with AI Coding's Latest Breakthrough...
How to Get Started with DevSecOps
Tool Support For Testing (Chapter 6)
DevSecOps: Essential Tooling to Enable Continuous Security(25m ADDO)
A model of Test Driven Infrastructure
Accelerating Software Delivery [Decoding DevOps Conference - InfoSeption]
What are DevSecOps Tools and Why Do You Need Them.pptx
What are DevSecOps Tools and Why Do You Need Them?
The Ultimate IT Toolbox_ Essential Tools for Tech Professionals.pdf
Tool support for..
ITIL compliant Open Source tools
TechTalk 2021: Peran IT Security dalam Penerapan DevOps
Ad

Recently uploaded (20)

PDF
Elevate Cleaning Efficiency Using Tallfly Hair Remover Roller Factory Expertise
PDF
MSPs in 10 Words - Created by US MSP Network
DOCX
unit 2 cost accounting- Tender and Quotation & Reconciliation Statement
PDF
20250805_A. Stotz All Weather Strategy - Performance review July 2025.pdf
PDF
Stem Cell Market Report | Trends, Growth & Forecast 2025-2034
PDF
COST SHEET- Tender and Quotation unit 2.pdf
PPTX
New Microsoft PowerPoint Presentation - Copy.pptx
PDF
Nidhal Samdaie CV - International Business Consultant
PPTX
ICG2025_ICG 6th steering committee 30-8-24.pptx
PDF
WRN_Investor_Presentation_August 2025.pdf
PPTX
HR Introduction Slide (1).pptx on hr intro
PDF
pdfcoffee.com-opt-b1plus-sb-answers.pdfvi
DOCX
Euro SEO Services 1st 3 General Updates.docx
PDF
kom-180-proposal-for-a-directive-amending-directive-2014-45-eu-and-directive-...
PPTX
AI-assistance in Knowledge Collection and Curation supporting Safe and Sustai...
PPTX
Belch_12e_PPT_Ch18_Accessible_university.pptx
DOCX
Business Management - unit 1 and 2
PDF
Types of control:Qualitative vs Quantitative
PPTX
Lecture (1)-Introduction.pptx business communication
PDF
Laughter Yoga Basic Learning Workshop Manual
Elevate Cleaning Efficiency Using Tallfly Hair Remover Roller Factory Expertise
MSPs in 10 Words - Created by US MSP Network
unit 2 cost accounting- Tender and Quotation & Reconciliation Statement
20250805_A. Stotz All Weather Strategy - Performance review July 2025.pdf
Stem Cell Market Report | Trends, Growth & Forecast 2025-2034
COST SHEET- Tender and Quotation unit 2.pdf
New Microsoft PowerPoint Presentation - Copy.pptx
Nidhal Samdaie CV - International Business Consultant
ICG2025_ICG 6th steering committee 30-8-24.pptx
WRN_Investor_Presentation_August 2025.pdf
HR Introduction Slide (1).pptx on hr intro
pdfcoffee.com-opt-b1plus-sb-answers.pdfvi
Euro SEO Services 1st 3 General Updates.docx
kom-180-proposal-for-a-directive-amending-directive-2014-45-eu-and-directive-...
AI-assistance in Knowledge Collection and Curation supporting Safe and Sustai...
Belch_12e_PPT_Ch18_Accessible_university.pptx
Business Management - unit 1 and 2
Types of control:Qualitative vs Quantitative
Lecture (1)-Introduction.pptx business communication
Laughter Yoga Basic Learning Workshop Manual
Ad

IAST Tools POC Report for interactive testing

  • 2. INTERNAL © confidential 2 Objective  Conduct Proof of Concept to evaluate IAST Tools against ELC centric requirements as per ELC directions and along with ELC Team  Perform Technical Evaluation against defined parameters  Score each IAST tool against technical evaluation parameters  Conclusion
  • 3. INTERNAL © confidential 3 Tool Evaluation Criteria Evaluation Criteria Seeker(Synopsys) Checkmarx(IAST) AppScan(IAST) Ease Of Installation Configuration and maintenance Easy to install, configuration and maintain tool. Easy to install, configuration and maintain tool. Easy to install, configuration and maintain tool. Tools Hardware Specification • 32 GB RAM. • CPU-8 Core. • Operating system CentOS/Ubuntu/Windows • Free disk space-300GB. • 32 GB RAM. • CPU 4 Core • Operating system – Windows/Linux • Free disk space-500GB • 8 GB RAM. • CPU 4 Core • Operating system- Windows • Free disk space-200GB In-build Tool Benefits • IDE integrated Scan for easy of remediation. • Support Incremental and Asynchronous scans • IDE integrated Scan for easy of remediation. • Support Incremental and Asynchronous scans • Doesn't support IDE integration • Support Incremental and Asynchronous scans. Tool Flavors • Offers both UI and Command line usage • Offers only UI and Command line usage • Offers only UI
  • 4. INTERNAL © confidential 4 Tool Evaluation Criteria Evaluation Criteria Seeker(Synopsys) Checkmarx(IAST) AppScan(IAST) Technology Support ASPNET,C#,Clojure, Gosu, Groovy, Java, JavaScript (Node.js), Scala (Inc. Lift), VB.NET Java, JavaScript (Node.js), ASPNET,C# Java, .NET and Node.js Integration and Automation capabilities Tool has good integration with DevOps Orchestration and support optimum automation capabilities. Tool has good integration with DevOps Orchestration and support optimum automation capabilities Tool has good integration with DevOps Orchestration and supports heavy automation capabilities Tool implementation time frame < 1 day to install and configure the setup <2 days to install and configure the setup <2 days to install and configure the setup Reporting Excellent – easy to understand report Good – easy to understand report Moderate – report are not comprehensive Accuracy of security Findings Higher number of findings with good accuracy Higher number of findings however lacks accuracy Moderate number of findings however lacks accuracy
  • 5. INTERNAL © confidential 5 Tool Evaluation Criteria Evaluation Criteria Seeker(Synopsys) Checkmarx(IAST) AppScan(IAST) Environments Development, QA, Production Development, QA, Production Development, QA an dProduction Speed Instant (at runtime) Instant (at runtime) Instant to hours How It Works Analyzes code and behavior of running apps through instrumentation Analyzes code and behavior of running apps through instrumentation Analyzes application during Manual testing phase and identify vulnerabilities Allows Continuous Security Testing YES YES YES CI/CD Integration YES YES YES Vulnerable Coverage High Moderate Medium Accuracy Score: 100% Score: 100% Low Vulnerabilities Detection on Outsourced Developments YES YES NO
  • 6. INTERNAL © confidential 6 Tool Evaluation Criteria Evaluation Criteria Seeker(Synopsys) Checkmarx(IAST) AppScan(IAST) Licensing Model a) License based on the number of applications. a) License based on number of applications a) License based on number of applications.
  • 7. INTERNAL © confidential 7 IAST Tool Scoring Sr.No Scoring Parameters Seeker(Synopsys) Checkmarx(IAST) AppScan(IAST) Operational 1 Installation/Configuration and Integration 8 6 6 2 In-build Tool Components 7 7 6 3 Tool Flavor 8 8 8 4 Licensing Model 7 7 6 5 Costing 8 6 6 6 Reporting and Scanning 8 8 7 Technical 7 Language/Technology Support 9 6 6 8 Overall Effectiveness of Tool 9 7 6 9 Report Comparision & Review 7 6 6 Overall Score 71 62 57
  • 8. INTERNAL © confidential 8 Summary Seeker(Synopsys) Checkmarx(IAST) AppScan(IAST) Technology Support Strong Technology support Strong Technology Support Moderate Technology Support Integration for DevOps Strong candidate for Integration with DevOps pipeline with ease of deployment and configuration Good candidate for Integration with DevOps pipeline with ease of deployment and configuration Moderate candidate for Integration with DevOps pipeline with ease of deployment and configuration False Positive Elimination AI powered security assistant allows elimination of False Positive Doesn’t offer any False Positive elimination capability Doesn’t offer any False Positive elimination capability Speed & Scanning Accuracy Strong candidate due to speed and accuracy Good candidate due to speed and moderate accuracy powered by Legacy CheckMarx Technology[multiple data structure scan] Moderate candidate due to speed and accuracy Business Logic Analysis Capability to identify business logic vulnerabilities during development e.g. Privilege Escalation, malicious code detection Capability to identify business logic vulnerabilities during development e.g. Privilege Escalation, malicious code detection Doesn’t offer Business Logic Analysis
  • 9. INTERNAL © confidential 9 Summary- Conclusion Tool Evaluation :  Tool that were evaluated are Seeker, Checkmarx and Appscan. Summary of Finding :  Considering overall DevSecOps requirements and IAST to be performed by developers our choice of tool will be Seeker.  The IAST tools in-scope cannot be compared apple-to-apple considering they have unique factor which competitor tools wouldn’t possess.
  • 10. INTERNAL Thank You for your time Cybersecurity & Risk Services Wipro Limited