SlideShare a Scribd company logo
PT AI SSDL™
— product brief
PT APPLICATION INSPECTOR SSDL EDITION™
:
BUILDING THE PROCESS OF SECURE DEVELOPMENT
Every field of industry — from financial and manufacturing enterprises to telecoms, IT companies,
media, and government institutions — is increasingly reliant on applications for automation of
daily operations. Official websites, e-commerce and e-banking platforms, workflow and reporting
systems, and many other applications besides are designed to engage with customers, reduce the
effort involved in routine tasks, and jump start efficiency.
However, increased functionality brings additional application complexity, making it harder to fix
critical errors in the software. According to studies by Positive Technologies, as many as 70% of ap-
plications contain high severity vulnerabilities, and 100% are affected by medium severity flaws. Us-
ing the same techniques as hostile hackers, our white-hat experts have demonstrated how these
flaws can be exploited to gain access to corporate networks and confidential user data.
The main culprits behind these high levels of software flaws are insufficiently mature information
security processes, lack of security awareness, and the absence of convenient tools for developers
and IS services. These failings mean security audits happen rarely (if at all), and are typically left until
the applications are ready to launch. But patching flaws at this stage is far more expensive than
resolving them during the design and development phases.
PT Application Inspector SSDL Edition™
(PT AI SSDL™
) is an advanced Application Security Testing
solution that addresses the needs of the whole enterprise to resolve these problems. With transpar-
ent integration into existing development processes and tools, plus business intelligence features
for management reporting and data analytics, PT AI SSDL™
fosters an AppSec-aware culture and
supports high quality code testing at all stages of the application lifecycle.
BUSINESS BENEFITS
­­ Enhance software quality
levels. The secure software
development lifecycle (SSDL)
supports the creation of high
quality and sustainable ap-
plications. PT AI SSDL™
helps
organizations to implement
SSDL in both workflows and
corporate culture.
­­ Reduce development costs.
Automated vulnerability de-
tection and elimination saves
human resources, time, and
most importantly reduces
costs.
­­ Mitigate risk and damage.
Detecting and eliminating
vulnerabilities at every stage
of development dramatically
reduces the amount of errors
and the costs of patching.
This lowers risk and improves
usability which, in turn, en-
courages user loyalty.
­­ Drive operational effi-
ciency. PT AI SSDL™
helps
developers to develop more
secure software without be-
ing security experts, reducing
the need for narrow profile
specialists and encouraging
teamwork with smooth busi-
ness processes.
­­ Manage compliance with
regulatory requirements.
Many standards bodies now
require app developers to
detect and fix vulnerabilities
before they can achieve
certification. PT AI SSDL™
manages compliance with
the requirements of PA DSS,
PCI DSS and many other
leading standards.
HOW IT WORKS
At the heart of PT AI SSDL™
lies an advanced testing approach that combines the advantages of stat-
ic (SAST), dynamic (DAST), and interactive code analysis (IAST), and which has proven its efficiency
in PT AI Desktop Edition™
. The use of multiple testing technologies means application security can
remain a priority throughout all development stages — from the very first line of code to applica-
tion go-live.
The distinguishing feature of PT AI SSDL™
is its flexible integration with corporate IT infrastructure
and development and security tools such as Version Control Systems (VCS), Bug Trackers, Integrat-
ed Development Environments (IDE) and Continuous Integration (CI)/Build systems. Control panels
that are adjustable to a specific process, and graphic interfaces especially designed for separate
user roles support the implementation of SSDL processes from the ground up.
Positive Technologies experts are ready to provide methodological and practical assistance if
needed.
Developer: Java, C#, PHP
IS specialist: web console
Auditor: report
PT AI SSDL™
— product brief
PT-AI-SSDL_PB_A4.ENG.0001.02
INFORMTION SECURITY
BENEFITS
­­ Wide coverage and in-
depth analysis. PT AI SSDL™
has an embedded database
of software vulnerabilities
and third-party libraries.
Configuration verification
capabilities also ensure web
server settings are safe.
­­ Automated vulnerability
assessment. PT AI SSDL™
automatically generates
“exploits”— the most secure
test queries that demon-
strate exactly how hackers
could use each vulnerability
to attack an application.
These requests help in con-
firming vulnerabilities, creat-
ing tasks to fix the code and
following them up.
­­ Continuous protection.
Many large-scale compa-
nies employ PT Application
Inspector™
alongside
PT Application Firewall™
.
Exploits generated by PT AI™
allow the firewall to create
virtual patches and quickly
protect applications while
vulnerabilities are being
fixed.
­­ Simplified code acceptance.
PT AI SSDL™
is suitable for
rapid analysis of third party
or modified code. This dras-
tically reduces application
security testing expenses, as
there is no need for manual
operations.
DEVELOPMENT BENEFITS
The best interface is no interface. Developers interact with PT AI SSDL™
via fine-tuned develop-
ment tools and the source code itself. Seamless integration with version control systems allows
developers to transfer finished code for further analysis and view the results without leaving their
familiar IDE and bug tracking systems. This enables continuous integration and delivery. Devel-
opers don’t have to learn or access additional consoles or become distracted by outside systems.
All detected problems and remediation recommendations can be found as an annotation to the
source code.
PT AI SSDL™
: A SOLUTION FOR THE ENTIRE TEAM
­­ Role-based access control (RBAC). Each group of users (developers, security managers, au-
ditors, and administrators) is granted a suitable level of access to data and interacts with PT AI
SSDL™
via an interface that is relevant to their particular role.
­­ Analytics and business intelligence. Using PT AI SSDL™
, analysts can perform both qualita-
tive and quantitative code security assessments, discover trends, check theories, and perform
benchmarking between several projects. For their part, security managers and auditors are
able to measure the KPIs of the development process and control team efficiency.
­­ Flexible reporting and notifications. Every team member receives notifications and reports
that are tailored to their role. This functionality is powered by the PT AI SSDL™
query builder
that retrieves data based on a query, a schedule, or as a response to a certain event. Reports
are displayed in the control panel or sent by email.
­­ Manufacturer independence. PT AI SSDL™
adapts to the unique requirements of each or-
ganization or project without any need to submit frequent feature or change requests to the
vendor. New releases of PT AI SSDL™
will retain custom changes and ensure backward com-
patibility.
Microsoft Visual Studio IDE and code annotation with a detected vulnerability
info@ptsecurity.com ptsecurity.com
About Positive Technologies
Positive Technologies is a leading global provider of enterprise security solutions for vulnerability and
compliance management, incident and threat analysis, and application protection. Commitment to clients
and research has earned Positive Technologies a reputation as one of the foremost authorities on Industrial
Control System, Banking, Telecom, Web Application, and ERP security, supported by recognition from the
analyst community. Learn more about Positive Technologies at ptsecurity.com.
© 2016 Positive Technologies. Positive Technologies and the Positive Technologies logo are trademarks or registered trademarks of Positive
Technologies. All other trademarks mentioned herein are the property of their respective owners.

More Related Content

PDF
CAST Architecture Checker
PDF
Software security, secure software development in the age of IoT, smart thing...
PDF
CYBER SECURITY ANALYST - HOW TO BECOME, JOB DEMAND AND TOP CERTIFICATIONS
PDF
How to Become a Cyber Security Analyst in 2021..
PDF
Software Development Life Cycle – Managing Risk and Measuring Security
PPTX
Secure SDLC Framework
PPTX
Veracode - Inglês
PDF
Veracode - Overview
CAST Architecture Checker
Software security, secure software development in the age of IoT, smart thing...
CYBER SECURITY ANALYST - HOW TO BECOME, JOB DEMAND AND TOP CERTIFICATIONS
How to Become a Cyber Security Analyst in 2021..
Software Development Life Cycle – Managing Risk and Measuring Security
Secure SDLC Framework
Veracode - Inglês
Veracode - Overview

What's hot (20)

PPTX
Secure Software Development Life Cycle
PDF
Veritas Resiliency Platform
PDF
Security Development Lifecycle Tools
PDF
Validy netinc nsa_ops1_ops2_executive summary
PPTX
Secure Code review - Veracode SaaS Platform - Saudi Green Method
PPTX
Building an AppSec Team Extended Cut
PPT
六合彩香港-六合彩
PPT
OWASP - Building Secure Web Applications
PPTX
What’s making way for secure sdlc
PPTX
24may 1200 valday eric anklesaria 'secure sdlc – core banking'
PDF
CompTIA PenTest+: Everything you need to know about the exam
PDF
Application Security Management with ThreadFix
PDF
Arved sandstrom - the rotwithin - atlseccon2011
PPTX
PDF
A successful application security program - Envision build and scale
PDF
CSSLP & OWASP & WebGoat
PDF
Thinking of choosing Trend Micro?
PDF
The Web AppSec How-To: The Defender's Toolbox
PDF
Software risk management
PDF
Sumeet Mandloi: Robust Security Testing Framework
Secure Software Development Life Cycle
Veritas Resiliency Platform
Security Development Lifecycle Tools
Validy netinc nsa_ops1_ops2_executive summary
Secure Code review - Veracode SaaS Platform - Saudi Green Method
Building an AppSec Team Extended Cut
六合彩香港-六合彩
OWASP - Building Secure Web Applications
What’s making way for secure sdlc
24may 1200 valday eric anklesaria 'secure sdlc – core banking'
CompTIA PenTest+: Everything you need to know about the exam
Application Security Management with ThreadFix
Arved sandstrom - the rotwithin - atlseccon2011
A successful application security program - Envision build and scale
CSSLP & OWASP & WebGoat
Thinking of choosing Trend Micro?
The Web AppSec How-To: The Defender's Toolbox
Software risk management
Sumeet Mandloi: Robust Security Testing Framework
Ad

Viewers also liked (18)

PDF
PT Application Inspector SSDL Edition листовка
PPTX
Base wars roblox highest gamers
PDF
Текстовый контент интернет-магазинов: примеры и рекомендации
PDF
Ilitia Gallo Resume
PPTX
La tierra nuestro hogar
PDF
Dubai Family Tour Package 2012-13
DOC
raktim hazarika resume
PDF
Cuadro comparativo
DOC
Actividades de Aprendizaje 8
DOCX
Trabajo pràctico nº 1(agos y mari)
PPTX
Determine quanto do seu código é testado com Code Coverage
PDF
Особенности продвижения интернет-магазинов
PPTX
Acompañanos
PPTX
REG Child Health Working Group Meeting 26/09/15
PDF
Global Economics Update - December 2015
PDF
Ivanova s biznesna100_motivaciya_na_100_a_gde_j
PDF
RDSDataSource: App Thinning
PT Application Inspector SSDL Edition листовка
Base wars roblox highest gamers
Текстовый контент интернет-магазинов: примеры и рекомендации
Ilitia Gallo Resume
La tierra nuestro hogar
Dubai Family Tour Package 2012-13
raktim hazarika resume
Cuadro comparativo
Actividades de Aprendizaje 8
Trabajo pràctico nº 1(agos y mari)
Determine quanto do seu código é testado com Code Coverage
Особенности продвижения интернет-магазинов
Acompañanos
REG Child Health Working Group Meeting 26/09/15
Global Economics Update - December 2015
Ivanova s biznesna100_motivaciya_na_100_a_gde_j
RDSDataSource: App Thinning
Ad

Similar to PT Application Inspector SSDL Edition product brief (15)

PDF
Positive Technologies Application Inspector
PDF
Deploying Static Application Security Testing on a Large Scale
PDF
Security Testing: Myths, Challenges, and Opportunities - Experiences in Integ...
PDF
Application Inspector SSDL Edition product
PDF
Bringing Security Testing to Development: How to Enable Developers to Act as ...
PDF
How to Enable Developers to Deliver Secure Code
PDF
17 - Application Development Security Section PDF.pdf
PDF
Agile Secure Software Development in a Large Software Development Organisatio...
PPTX
Secure SDLC in mobile software development.
PDF
SAST for JavaScript: A Brief Overview of Commercial Tools
PDF
Selecting an App Security Testing Partner: An eGuide
PDF
Procuring an Application Security Testing Partner
PPTX
Security Culture from Concept to Maintenance: Secure Software Development Lif...
PDF
Unlock your core business assets for the hybrid cloud with addi webinar dec...
PPT
Application security and pa dss certification
Positive Technologies Application Inspector
Deploying Static Application Security Testing on a Large Scale
Security Testing: Myths, Challenges, and Opportunities - Experiences in Integ...
Application Inspector SSDL Edition product
Bringing Security Testing to Development: How to Enable Developers to Act as ...
How to Enable Developers to Deliver Secure Code
17 - Application Development Security Section PDF.pdf
Agile Secure Software Development in a Large Software Development Organisatio...
Secure SDLC in mobile software development.
SAST for JavaScript: A Brief Overview of Commercial Tools
Selecting an App Security Testing Partner: An eGuide
Procuring an Application Security Testing Partner
Security Culture from Concept to Maintenance: Secure Software Development Lif...
Unlock your core business assets for the hybrid cloud with addi webinar dec...
Application security and pa dss certification

More from Valery Boronin (8)

PPTX
Тренды кибербезопасности, угрозы и вызовы в 2018 году
PPT
SecDevOps. Разработка, DevOps и безопасность.
PPTX
Практика оформления проекта и презентаций
PPTX
SDL/SSDL для руководителей
PDF
Построение процесса безопасной разработки - Стачка 2016
PPT
Valery Boronin on DLP Russia 2010
PPTX
Humans Are The Weakest Link – How DLP Can Help
PPTX
Data Luxury Protection - защита данных с удовольствием!
Тренды кибербезопасности, угрозы и вызовы в 2018 году
SecDevOps. Разработка, DevOps и безопасность.
Практика оформления проекта и презентаций
SDL/SSDL для руководителей
Построение процесса безопасной разработки - Стачка 2016
Valery Boronin on DLP Russia 2010
Humans Are The Weakest Link – How DLP Can Help
Data Luxury Protection - защита данных с удовольствием!

Recently uploaded (20)

PPTX
Embracing Complexity in Serverless! GOTO Serverless Bengaluru
PDF
Odoo Companies in India – Driving Business Transformation.pdf
PPTX
Reimagine Home Health with the Power of Agentic AI​
PDF
System and Network Administraation Chapter 3
PDF
Adobe Premiere Pro 2025 (v24.5.0.057) Crack free
PDF
iTop VPN Free 5.6.0.5262 Crack latest version 2025
PDF
Why TechBuilder is the Future of Pickup and Delivery App Development (1).pdf
PDF
Which alternative to Crystal Reports is best for small or large businesses.pdf
PDF
Nekopoi APK 2025 free lastest update
PDF
Cost to Outsource Software Development in 2025
PDF
PTS Company Brochure 2025 (1).pdf.......
PDF
EN-Survey-Report-SAP-LeanIX-EA-Insights-2025.pdf
PPTX
Lecture 3: Operating Systems Introduction to Computer Hardware Systems
PDF
Softaken Excel to vCard Converter Software.pdf
PDF
wealthsignaloriginal-com-DS-text-... (1).pdf
PPTX
L1 - Introduction to python Backend.pptx
PDF
Upgrade and Innovation Strategies for SAP ERP Customers
PDF
T3DD25 TYPO3 Content Blocks - Deep Dive by André Kraus
PDF
Design an Analysis of Algorithms II-SECS-1021-03
PPTX
assetexplorer- product-overview - presentation
Embracing Complexity in Serverless! GOTO Serverless Bengaluru
Odoo Companies in India – Driving Business Transformation.pdf
Reimagine Home Health with the Power of Agentic AI​
System and Network Administraation Chapter 3
Adobe Premiere Pro 2025 (v24.5.0.057) Crack free
iTop VPN Free 5.6.0.5262 Crack latest version 2025
Why TechBuilder is the Future of Pickup and Delivery App Development (1).pdf
Which alternative to Crystal Reports is best for small or large businesses.pdf
Nekopoi APK 2025 free lastest update
Cost to Outsource Software Development in 2025
PTS Company Brochure 2025 (1).pdf.......
EN-Survey-Report-SAP-LeanIX-EA-Insights-2025.pdf
Lecture 3: Operating Systems Introduction to Computer Hardware Systems
Softaken Excel to vCard Converter Software.pdf
wealthsignaloriginal-com-DS-text-... (1).pdf
L1 - Introduction to python Backend.pptx
Upgrade and Innovation Strategies for SAP ERP Customers
T3DD25 TYPO3 Content Blocks - Deep Dive by André Kraus
Design an Analysis of Algorithms II-SECS-1021-03
assetexplorer- product-overview - presentation

PT Application Inspector SSDL Edition product brief

  • 1. PT AI SSDL™ — product brief PT APPLICATION INSPECTOR SSDL EDITION™ : BUILDING THE PROCESS OF SECURE DEVELOPMENT Every field of industry — from financial and manufacturing enterprises to telecoms, IT companies, media, and government institutions — is increasingly reliant on applications for automation of daily operations. Official websites, e-commerce and e-banking platforms, workflow and reporting systems, and many other applications besides are designed to engage with customers, reduce the effort involved in routine tasks, and jump start efficiency. However, increased functionality brings additional application complexity, making it harder to fix critical errors in the software. According to studies by Positive Technologies, as many as 70% of ap- plications contain high severity vulnerabilities, and 100% are affected by medium severity flaws. Us- ing the same techniques as hostile hackers, our white-hat experts have demonstrated how these flaws can be exploited to gain access to corporate networks and confidential user data. The main culprits behind these high levels of software flaws are insufficiently mature information security processes, lack of security awareness, and the absence of convenient tools for developers and IS services. These failings mean security audits happen rarely (if at all), and are typically left until the applications are ready to launch. But patching flaws at this stage is far more expensive than resolving them during the design and development phases. PT Application Inspector SSDL Edition™ (PT AI SSDL™ ) is an advanced Application Security Testing solution that addresses the needs of the whole enterprise to resolve these problems. With transpar- ent integration into existing development processes and tools, plus business intelligence features for management reporting and data analytics, PT AI SSDL™ fosters an AppSec-aware culture and supports high quality code testing at all stages of the application lifecycle. BUSINESS BENEFITS ­­ Enhance software quality levels. The secure software development lifecycle (SSDL) supports the creation of high quality and sustainable ap- plications. PT AI SSDL™ helps organizations to implement SSDL in both workflows and corporate culture. ­­ Reduce development costs. Automated vulnerability de- tection and elimination saves human resources, time, and most importantly reduces costs. ­­ Mitigate risk and damage. Detecting and eliminating vulnerabilities at every stage of development dramatically reduces the amount of errors and the costs of patching. This lowers risk and improves usability which, in turn, en- courages user loyalty. ­­ Drive operational effi- ciency. PT AI SSDL™ helps developers to develop more secure software without be- ing security experts, reducing the need for narrow profile specialists and encouraging teamwork with smooth busi- ness processes. ­­ Manage compliance with regulatory requirements. Many standards bodies now require app developers to detect and fix vulnerabilities before they can achieve certification. PT AI SSDL™ manages compliance with the requirements of PA DSS, PCI DSS and many other leading standards. HOW IT WORKS At the heart of PT AI SSDL™ lies an advanced testing approach that combines the advantages of stat- ic (SAST), dynamic (DAST), and interactive code analysis (IAST), and which has proven its efficiency in PT AI Desktop Edition™ . The use of multiple testing technologies means application security can remain a priority throughout all development stages — from the very first line of code to applica- tion go-live. The distinguishing feature of PT AI SSDL™ is its flexible integration with corporate IT infrastructure and development and security tools such as Version Control Systems (VCS), Bug Trackers, Integrat- ed Development Environments (IDE) and Continuous Integration (CI)/Build systems. Control panels that are adjustable to a specific process, and graphic interfaces especially designed for separate user roles support the implementation of SSDL processes from the ground up. Positive Technologies experts are ready to provide methodological and practical assistance if needed. Developer: Java, C#, PHP IS specialist: web console Auditor: report
  • 2. PT AI SSDL™ — product brief PT-AI-SSDL_PB_A4.ENG.0001.02 INFORMTION SECURITY BENEFITS ­­ Wide coverage and in- depth analysis. PT AI SSDL™ has an embedded database of software vulnerabilities and third-party libraries. Configuration verification capabilities also ensure web server settings are safe. ­­ Automated vulnerability assessment. PT AI SSDL™ automatically generates “exploits”— the most secure test queries that demon- strate exactly how hackers could use each vulnerability to attack an application. These requests help in con- firming vulnerabilities, creat- ing tasks to fix the code and following them up. ­­ Continuous protection. Many large-scale compa- nies employ PT Application Inspector™ alongside PT Application Firewall™ . Exploits generated by PT AI™ allow the firewall to create virtual patches and quickly protect applications while vulnerabilities are being fixed. ­­ Simplified code acceptance. PT AI SSDL™ is suitable for rapid analysis of third party or modified code. This dras- tically reduces application security testing expenses, as there is no need for manual operations. DEVELOPMENT BENEFITS The best interface is no interface. Developers interact with PT AI SSDL™ via fine-tuned develop- ment tools and the source code itself. Seamless integration with version control systems allows developers to transfer finished code for further analysis and view the results without leaving their familiar IDE and bug tracking systems. This enables continuous integration and delivery. Devel- opers don’t have to learn or access additional consoles or become distracted by outside systems. All detected problems and remediation recommendations can be found as an annotation to the source code. PT AI SSDL™ : A SOLUTION FOR THE ENTIRE TEAM ­­ Role-based access control (RBAC). Each group of users (developers, security managers, au- ditors, and administrators) is granted a suitable level of access to data and interacts with PT AI SSDL™ via an interface that is relevant to their particular role. ­­ Analytics and business intelligence. Using PT AI SSDL™ , analysts can perform both qualita- tive and quantitative code security assessments, discover trends, check theories, and perform benchmarking between several projects. For their part, security managers and auditors are able to measure the KPIs of the development process and control team efficiency. ­­ Flexible reporting and notifications. Every team member receives notifications and reports that are tailored to their role. This functionality is powered by the PT AI SSDL™ query builder that retrieves data based on a query, a schedule, or as a response to a certain event. Reports are displayed in the control panel or sent by email. ­­ Manufacturer independence. PT AI SSDL™ adapts to the unique requirements of each or- ganization or project without any need to submit frequent feature or change requests to the vendor. New releases of PT AI SSDL™ will retain custom changes and ensure backward com- patibility. Microsoft Visual Studio IDE and code annotation with a detected vulnerability info@ptsecurity.com ptsecurity.com About Positive Technologies Positive Technologies is a leading global provider of enterprise security solutions for vulnerability and compliance management, incident and threat analysis, and application protection. Commitment to clients and research has earned Positive Technologies a reputation as one of the foremost authorities on Industrial Control System, Banking, Telecom, Web Application, and ERP security, supported by recognition from the analyst community. Learn more about Positive Technologies at ptsecurity.com. © 2016 Positive Technologies. Positive Technologies and the Positive Technologies logo are trademarks or registered trademarks of Positive Technologies. All other trademarks mentioned herein are the property of their respective owners.