SlideShare a Scribd company logo
© 2018 Synopsys, Inc. 1
Build Secure, High-Quality
Software Faster
Girish Janardhanudu, Vice President, Security Consulting,
Software Integrity Group
© 2018 Synopsys, Inc. 2
A solid foundation for long term stability and growth
1 Microsoft
2 Oracle
3 SAP
4 Symantec
5 VMware
6 Salesforce
7 Intuit
8 CA Technologies
9 Adobe
10 Teradata
11 Amdocs
12 Cerner
13 Citrix
14 Autodesk
15 Synopsys
16 Sage Group
17 Akamai Technologies
18 Nuance
19 Open Text
20 F5 Networks
Top 20 Global
Software Companies
Engineering Culture
Total Employees: ~12,000
Engineers: 50%
Software Integrity Group: ~1,500
Global Reach
30+ years
Market Cap:
~ $13B
2017 Revenue:
$2.7B
© 2018 Synopsys, Inc. 3
Application security
is in our DNA
The authority on open source
security & risk management
Published Thought Leadership
in software security
The team and technology that
found Heartbleed
Pioneer in Software Quality and
Software Security Static Analysis
Pioneer of IAST -
Interactive Application
Security Testing
© 2018 Synopsys, Inc. 4
Mobile / Consumer
Devices
Enterprise Networking
and Software
High Reliability
Systems Financial Services
Deep experience in software security and quality testing for many industries
© 2018 Synopsys, Inc. 5
A trusted partner to over 4,000 companies
16 of the top 20
commercial banks
9 of the top 10
ISVs
7 of the top 10
aerospace and defense firms
8 of the top 10
global brands
6 of the top 10
semiconductor companies
© 2018 Synopsys, Inc. 6
The recognized leader in end-to-end application security
Forrester Wave
Static Application Security Testing
Forrester Wave
Software Composition Analysis
Gartner Magic Quadrant
Application Security Testing
Synopsys is the only vendor recognized as the leader in both SAST and SCA
© 2018 Synopsys, Inc. 7
Major security trends
• Increased regulations
• Data manipulation vs data access
• Shortage of security resources
• Pace of attacks
• IOT (edge of the network)
• DevSecOpps, Cloud & CI/CD
• Secure by design or “shift left”
© 2018 Synopsys, Inc. 8
Major security trends
• Increased regulations
• Data manipulation vs data access
• Shortage of security resources
• Pace of attacks
• IOT (edge of the network)
• DevSecOpps, Cloud & CI/CD
• Secure by design or “shift left”
© 2018 Synopsys, Inc. 10
The Evolving Landscape of Software Development Impacts Software
Integrity
Embedded devices
Cloud (private,
hybrid, public)
Languages, open source
and frameworks
New tech stacks
and attack surfaces
Agile, DevOpsSec, CI/CD
Fit into toolchain eco-systems
Automation through toolchain
integration
New development
philosophies
and approaches
Comprehensive view into risk
Accuracy and speed of quality
defects and security
vulnerability feedback
Focus
Lack visibility into
evolving application
portfolio
Align with workflow timeframes
Security as a core component
of quality
Testing coverage and depth
Changing
testing
demands
© 2018 Synopsys, Inc. 11
To succeed, you need to take a multi-layer approach
Strategy
Programs
Services
Tools
© 2018 Synopsys, Inc. 12
We help teams build secure, high quality software faster
DevSecOps
Tools
Managed
Services
Strategy &
Planning
Professional
Services
Build Security In Maturity Model (BSIMM)
Coverity
Static Analysis
Black Duck
Software Composition Analysis
Seeker / Defensics
Dynamic Analysis
DevSecOps
Integration
Architecture
and Design
Security
Training
Cloud
Security
Industry
Solutions
Maturity Action Plan (MAP)
Mobile
Security Testing
SAST
Penetration
Testing
DAST
© 2018 Synopsys, Inc. 13
We help teams build secure, high quality software faster
DevSecOps
Tools
Managed
Services
Strategy &
Planning
Professional
Services
Build Security In Maturity Model (BSIMM)
Coverity
Static Analysis
Black Duck
Software Composition Analysis
Seeker / Defensics
Dynamic Analysis
DevSecOps
Integration
Architecture
and Design
Security
Training
Cloud
Security
Industry
Solutions
Maturity Action Plan (MAP)
Mobile
Security Testing
SAST
Penetration
Testing
DAST
© 2018 Synopsys, Inc. 14
Scale• Augmenting internal teams with external resources
for scalability
• Identify and prioritize vulnerabilities for remediation
• Integrating with DevOps
Software Security Initiatives are a Journey
Launch
• Pen testing to find vulnerabilities
• Compliance driven
• Low level testing
• Programmatically managing risk across your software release cycles
• Driving efficiencies through SDLC integration
• Purposeful blend of automated and manual testing processes
Optimize
OVERLAYINTEGRATE
REACT PREVENT
© 2018 Synopsys, Inc. 15
Know where your software security initiatives stand compared to your peers
BSIMM - Build Security In Maturity Model
• Base your SSI on industry best practices
• Compare your SSI against others using 200+ metrics
• Benchmark and track SSI growth
• Interact and learn from BSIMM community peers
Strategy & Planning
© 2018 Synopsys, Inc. 16
• Set objectives, outline a strategy, identify resources
• Equip staff to build and operate secure software
• Define how and when to address each software asset
• Plan activities to verify your software security program
Build, evolve, and maintain your software security initiatives
MAP – Maturity Action Plan
Strategy & Planning
© 2018 Synopsys, Inc. 17
What this means to our customers
Any test
Static, software composition,
or dynamic analysis
On any software
From legacy to mobile to cloud
to IoT and beyond
At any depth
From rapid automated scanning
to comprehensive analysis
With complete flexibility
From DevSecOps tools
to on-demand services
At any SDLC stage
From design & build
to integrate & deploy
With tools and services
From strategy & planning
to acceleration & integration
Thank You

More Related Content

PDF
Security Process in DevSecOps
PDF
Life as a SRE at Instana
PDF
A New View of Your Application Security Program with Snyk and ThreadFix
PPTX
Software Composition Analysis Deep Dive
PDF
Microsoft-CISO-Workshop-Security-Strategy-and-Program (1).pdf
PDF
Grafana Loki: like Prometheus, but for Logs
PDF
Serverless with IAC - terraform과 cloudformation 비교
PDF
Kubernetes雑にまとめてみた 2020年8月版
Security Process in DevSecOps
Life as a SRE at Instana
A New View of Your Application Security Program with Snyk and ThreadFix
Software Composition Analysis Deep Dive
Microsoft-CISO-Workshop-Security-Strategy-and-Program (1).pdf
Grafana Loki: like Prometheus, but for Logs
Serverless with IAC - terraform과 cloudformation 비교
Kubernetes雑にまとめてみた 2020年8月版

What's hot (20)

PDF
Elastic Security: Unified protection for everyone
PDF
[온라인교육시리즈] 네이버 클라우드 플랫폼 init script 활용법 소개(정낙수 클라우드 솔루션 아키텍트)
PDF
ArgoCD Meetup PPT final.pdf
PDF
Cluster-as-code. The Many Ways towards Kubernetes
PDF
Crossplane @ Mastering GitOps.pdf
PPTX
Meetup 23 - 03 - Application Delivery on K8S with GitOps
PDF
Succeeding with Secure Access Service Edge (SASE)
PDF
Security in CI/CD Pipelines: Tips for DevOps Engineers
PDF
PostgreSQLをKubernetes上で活用するためのOperator紹介!(Cloud Native Database Meetup #3 発表資料)
PDF
Yahoo! JAPANのIaaSを支えるKubernetesクラスタ、アップデート自動化への挑戦 #yjtc
PDF
DevSecOps: What Why and How : Blackhat 2019
PDF
GKE multi-cluster Ingress
PDF
Kubernetes Security with Calico and Open Policy Agent
PDF
[네전따] 네트워크 엔지니어에게 쿠버네티스는 어떤 의미일까요
PDF
オープンソースのAPIゲートウェイ Kong ご紹介
PDF
ゲームアーキテクチャパターン (Aurora Serverless / DynamoDB)
PDF
The Twelve-Factor Appで考えるAWSのサービス開発
PDF
CI:CD in Lightspeed with kubernetes and argo cd
PPTX
Getting Started with Runtime Security on Azure Kubernetes Service (AKS)
PPTX
Various Cloud offerings AWS/AZURE/GCP
Elastic Security: Unified protection for everyone
[온라인교육시리즈] 네이버 클라우드 플랫폼 init script 활용법 소개(정낙수 클라우드 솔루션 아키텍트)
ArgoCD Meetup PPT final.pdf
Cluster-as-code. The Many Ways towards Kubernetes
Crossplane @ Mastering GitOps.pdf
Meetup 23 - 03 - Application Delivery on K8S with GitOps
Succeeding with Secure Access Service Edge (SASE)
Security in CI/CD Pipelines: Tips for DevOps Engineers
PostgreSQLをKubernetes上で活用するためのOperator紹介!(Cloud Native Database Meetup #3 発表資料)
Yahoo! JAPANのIaaSを支えるKubernetesクラスタ、アップデート自動化への挑戦 #yjtc
DevSecOps: What Why and How : Blackhat 2019
GKE multi-cluster Ingress
Kubernetes Security with Calico and Open Policy Agent
[네전따] 네트워크 엔지니어에게 쿠버네티스는 어떤 의미일까요
オープンソースのAPIゲートウェイ Kong ご紹介
ゲームアーキテクチャパターン (Aurora Serverless / DynamoDB)
The Twelve-Factor Appで考えるAWSのサービス開発
CI:CD in Lightspeed with kubernetes and argo cd
Getting Started with Runtime Security on Azure Kubernetes Service (AKS)
Various Cloud offerings AWS/AZURE/GCP
Ad

Similar to Synopsys Security Event Israel Presentation: Keynote: Securing Your Software, Today and in the Future (20)

PPTX
Synopsys_site.pptx
PDF
SIG-product-overview.pdf
PDF
Webinar – Software Security 2019–Embrace Velocity
PDF
Webinar–Best Practices for DevSecOps at Scale
PDF
Webinar–That is Not How This Works
PDF
Webinar–Creating a Modern AppSec Toolchain to Quantify Service Risks
PDF
Emerging Trends in Application Security
PDF
Webinar–Building A Culture of Secure Programming in Your Organization
PDF
RSA Conference Presentation–Creating a Modern AppSec Toolchain to Quantify Se...
PDF
Analyst Resources for Chief Information Security Officers (CISOs)
PPTX
Reduce Third Party Developer Risks
PPTX
5 Ways to Reduce 3rd Party Developer Risk
PPTX
Information-security and best pracrices tools for the enhanced security of s...
PDF
Webinar – Streamling Your Tech Due Diligence Process for Software Assets
PDF
Webinar – Using Metrics to Drive Your Software Security Initiative
PPT
Software Security in the Real World
PPTX
New Synopsys research uncovers security's biggest challenges
PDF
Flight East 2018 Presentation–You've got your open source audit report, now w...
PDF
Don’t WannaCry? Here’s How to Stop Those Ransomware Blues
PDF
Webinar–You've Got Your Open Source Audit Report–Now What?
Synopsys_site.pptx
SIG-product-overview.pdf
Webinar – Software Security 2019–Embrace Velocity
Webinar–Best Practices for DevSecOps at Scale
Webinar–That is Not How This Works
Webinar–Creating a Modern AppSec Toolchain to Quantify Service Risks
Emerging Trends in Application Security
Webinar–Building A Culture of Secure Programming in Your Organization
RSA Conference Presentation–Creating a Modern AppSec Toolchain to Quantify Se...
Analyst Resources for Chief Information Security Officers (CISOs)
Reduce Third Party Developer Risks
5 Ways to Reduce 3rd Party Developer Risk
Information-security and best pracrices tools for the enhanced security of s...
Webinar – Streamling Your Tech Due Diligence Process for Software Assets
Webinar – Using Metrics to Drive Your Software Security Initiative
Software Security in the Real World
New Synopsys research uncovers security's biggest challenges
Flight East 2018 Presentation–You've got your open source audit report, now w...
Don’t WannaCry? Here’s How to Stop Those Ransomware Blues
Webinar–You've Got Your Open Source Audit Report–Now What?
Ad

More from Synopsys Software Integrity Group (20)

PDF
Webinar–Segen oder Fluch?
PDF
Webinar–Mobile Application Hardening Protecting Business Critical Apps
PDF
Webinar–The 2019 Open Source Year in Review
PDF
Webinar–OWASP Top 10 for JavaScript for Developers
PDF
Webinar–The State of Open Source in M&A Transactions
PDF
Webinar–5 ways to risk rank your vulnerabilities
PDF
Do Design Quality and Code Quality Matter in Merger and Acquisition Tech Due ...
PDF
Webinar–Using Evidence-Based Security
PDF
Webinar–Delivering a Next Generation Vulnerability Feed
PDF
Webinar–Financial Services Study Shows Why Investing in AppSec Matters
PDF
Webinar–What You Need To Know About Open Source Licensing
PDF
Webinar–Improving Fuzz Testing of Infotainment Systems and Telematics Units U...
PDF
Webinar–Why All Open Source Scans Aren't Created Equal
PDF
Webinar–Is Your Software Security Supply Chain a Security Blind Spot?
PDF
Webinar–Sécurité Applicative et DevSecOps dans un monde Agile
PDF
Webinar – Security Tool Misconfiguration and Abuse
PDF
Webinar - Developers Are Your Greatest AppSec Resource
PDF
Webinar – Risk-based adaptive DevSecOps
PDF
Webinar–Vulnerabilities in Containerised Production Environments
PDF
Webinar–AppSec: Hype or Reality
Webinar–Segen oder Fluch?
Webinar–Mobile Application Hardening Protecting Business Critical Apps
Webinar–The 2019 Open Source Year in Review
Webinar–OWASP Top 10 for JavaScript for Developers
Webinar–The State of Open Source in M&A Transactions
Webinar–5 ways to risk rank your vulnerabilities
Do Design Quality and Code Quality Matter in Merger and Acquisition Tech Due ...
Webinar–Using Evidence-Based Security
Webinar–Delivering a Next Generation Vulnerability Feed
Webinar–Financial Services Study Shows Why Investing in AppSec Matters
Webinar–What You Need To Know About Open Source Licensing
Webinar–Improving Fuzz Testing of Infotainment Systems and Telematics Units U...
Webinar–Why All Open Source Scans Aren't Created Equal
Webinar–Is Your Software Security Supply Chain a Security Blind Spot?
Webinar–Sécurité Applicative et DevSecOps dans un monde Agile
Webinar – Security Tool Misconfiguration and Abuse
Webinar - Developers Are Your Greatest AppSec Resource
Webinar – Risk-based adaptive DevSecOps
Webinar–Vulnerabilities in Containerised Production Environments
Webinar–AppSec: Hype or Reality

Recently uploaded (20)

PDF
How Creative Agencies Leverage Project Management Software.pdf
PDF
Why TechBuilder is the Future of Pickup and Delivery App Development (1).pdf
PPTX
Introduction to Artificial Intelligence
PPTX
Oracle E-Business Suite: A Comprehensive Guide for Modern Enterprises
PPTX
ai tools demonstartion for schools and inter college
PPTX
history of c programming in notes for students .pptx
PDF
Addressing The Cult of Project Management Tools-Why Disconnected Work is Hold...
PDF
Audit Checklist Design Aligning with ISO, IATF, and Industry Standards — Omne...
PDF
PTS Company Brochure 2025 (1).pdf.......
PDF
How to Choose the Right IT Partner for Your Business in Malaysia
PDF
Raksha Bandhan Grocery Pricing Trends in India 2025.pdf
PDF
Odoo Companies in India – Driving Business Transformation.pdf
PPTX
Agentic AI Use Case- Contract Lifecycle Management (CLM).pptx
PDF
Claude Code: Everyone is a 10x Developer - A Comprehensive AI-Powered CLI Tool
PPTX
Odoo POS Development Services by CandidRoot Solutions
PDF
Adobe Illustrator 28.6 Crack My Vision of Vector Design
PDF
medical staffing services at VALiNTRY
PDF
Design an Analysis of Algorithms II-SECS-1021-03
PPTX
ManageIQ - Sprint 268 Review - Slide Deck
PDF
Upgrade and Innovation Strategies for SAP ERP Customers
How Creative Agencies Leverage Project Management Software.pdf
Why TechBuilder is the Future of Pickup and Delivery App Development (1).pdf
Introduction to Artificial Intelligence
Oracle E-Business Suite: A Comprehensive Guide for Modern Enterprises
ai tools demonstartion for schools and inter college
history of c programming in notes for students .pptx
Addressing The Cult of Project Management Tools-Why Disconnected Work is Hold...
Audit Checklist Design Aligning with ISO, IATF, and Industry Standards — Omne...
PTS Company Brochure 2025 (1).pdf.......
How to Choose the Right IT Partner for Your Business in Malaysia
Raksha Bandhan Grocery Pricing Trends in India 2025.pdf
Odoo Companies in India – Driving Business Transformation.pdf
Agentic AI Use Case- Contract Lifecycle Management (CLM).pptx
Claude Code: Everyone is a 10x Developer - A Comprehensive AI-Powered CLI Tool
Odoo POS Development Services by CandidRoot Solutions
Adobe Illustrator 28.6 Crack My Vision of Vector Design
medical staffing services at VALiNTRY
Design an Analysis of Algorithms II-SECS-1021-03
ManageIQ - Sprint 268 Review - Slide Deck
Upgrade and Innovation Strategies for SAP ERP Customers

Synopsys Security Event Israel Presentation: Keynote: Securing Your Software, Today and in the Future

  • 1. © 2018 Synopsys, Inc. 1 Build Secure, High-Quality Software Faster Girish Janardhanudu, Vice President, Security Consulting, Software Integrity Group
  • 2. © 2018 Synopsys, Inc. 2 A solid foundation for long term stability and growth 1 Microsoft 2 Oracle 3 SAP 4 Symantec 5 VMware 6 Salesforce 7 Intuit 8 CA Technologies 9 Adobe 10 Teradata 11 Amdocs 12 Cerner 13 Citrix 14 Autodesk 15 Synopsys 16 Sage Group 17 Akamai Technologies 18 Nuance 19 Open Text 20 F5 Networks Top 20 Global Software Companies Engineering Culture Total Employees: ~12,000 Engineers: 50% Software Integrity Group: ~1,500 Global Reach 30+ years Market Cap: ~ $13B 2017 Revenue: $2.7B
  • 3. © 2018 Synopsys, Inc. 3 Application security is in our DNA The authority on open source security & risk management Published Thought Leadership in software security The team and technology that found Heartbleed Pioneer in Software Quality and Software Security Static Analysis Pioneer of IAST - Interactive Application Security Testing
  • 4. © 2018 Synopsys, Inc. 4 Mobile / Consumer Devices Enterprise Networking and Software High Reliability Systems Financial Services Deep experience in software security and quality testing for many industries
  • 5. © 2018 Synopsys, Inc. 5 A trusted partner to over 4,000 companies 16 of the top 20 commercial banks 9 of the top 10 ISVs 7 of the top 10 aerospace and defense firms 8 of the top 10 global brands 6 of the top 10 semiconductor companies
  • 6. © 2018 Synopsys, Inc. 6 The recognized leader in end-to-end application security Forrester Wave Static Application Security Testing Forrester Wave Software Composition Analysis Gartner Magic Quadrant Application Security Testing Synopsys is the only vendor recognized as the leader in both SAST and SCA
  • 7. © 2018 Synopsys, Inc. 7 Major security trends • Increased regulations • Data manipulation vs data access • Shortage of security resources • Pace of attacks • IOT (edge of the network) • DevSecOpps, Cloud & CI/CD • Secure by design or “shift left”
  • 8. © 2018 Synopsys, Inc. 8 Major security trends • Increased regulations • Data manipulation vs data access • Shortage of security resources • Pace of attacks • IOT (edge of the network) • DevSecOpps, Cloud & CI/CD • Secure by design or “shift left”
  • 9. © 2018 Synopsys, Inc. 10 The Evolving Landscape of Software Development Impacts Software Integrity Embedded devices Cloud (private, hybrid, public) Languages, open source and frameworks New tech stacks and attack surfaces Agile, DevOpsSec, CI/CD Fit into toolchain eco-systems Automation through toolchain integration New development philosophies and approaches Comprehensive view into risk Accuracy and speed of quality defects and security vulnerability feedback Focus Lack visibility into evolving application portfolio Align with workflow timeframes Security as a core component of quality Testing coverage and depth Changing testing demands
  • 10. © 2018 Synopsys, Inc. 11 To succeed, you need to take a multi-layer approach Strategy Programs Services Tools
  • 11. © 2018 Synopsys, Inc. 12 We help teams build secure, high quality software faster DevSecOps Tools Managed Services Strategy & Planning Professional Services Build Security In Maturity Model (BSIMM) Coverity Static Analysis Black Duck Software Composition Analysis Seeker / Defensics Dynamic Analysis DevSecOps Integration Architecture and Design Security Training Cloud Security Industry Solutions Maturity Action Plan (MAP) Mobile Security Testing SAST Penetration Testing DAST
  • 12. © 2018 Synopsys, Inc. 13 We help teams build secure, high quality software faster DevSecOps Tools Managed Services Strategy & Planning Professional Services Build Security In Maturity Model (BSIMM) Coverity Static Analysis Black Duck Software Composition Analysis Seeker / Defensics Dynamic Analysis DevSecOps Integration Architecture and Design Security Training Cloud Security Industry Solutions Maturity Action Plan (MAP) Mobile Security Testing SAST Penetration Testing DAST
  • 13. © 2018 Synopsys, Inc. 14 Scale• Augmenting internal teams with external resources for scalability • Identify and prioritize vulnerabilities for remediation • Integrating with DevOps Software Security Initiatives are a Journey Launch • Pen testing to find vulnerabilities • Compliance driven • Low level testing • Programmatically managing risk across your software release cycles • Driving efficiencies through SDLC integration • Purposeful blend of automated and manual testing processes Optimize OVERLAYINTEGRATE REACT PREVENT
  • 14. © 2018 Synopsys, Inc. 15 Know where your software security initiatives stand compared to your peers BSIMM - Build Security In Maturity Model • Base your SSI on industry best practices • Compare your SSI against others using 200+ metrics • Benchmark and track SSI growth • Interact and learn from BSIMM community peers Strategy & Planning
  • 15. © 2018 Synopsys, Inc. 16 • Set objectives, outline a strategy, identify resources • Equip staff to build and operate secure software • Define how and when to address each software asset • Plan activities to verify your software security program Build, evolve, and maintain your software security initiatives MAP – Maturity Action Plan Strategy & Planning
  • 16. © 2018 Synopsys, Inc. 17 What this means to our customers Any test Static, software composition, or dynamic analysis On any software From legacy to mobile to cloud to IoT and beyond At any depth From rapid automated scanning to comprehensive analysis With complete flexibility From DevSecOps tools to on-demand services At any SDLC stage From design & build to integrate & deploy With tools and services From strategy & planning to acceleration & integration