SlideShare a Scribd company logo
IBM Security SolutionsIBM Rational Application Security
2AgendaCurrent Trends in Application SecurityThe SolutionStrategies for Customer SuccessRational AppScan SuiteIBM Application Security Coverage
Executive SummaryWeb applications are the greatest source of risk for organizationsRational Application Security enables organizations to address root cause of this riskAppScan leverages a mix of technologies (static & dynamic)AppScan is a key part of IBM Security’s full solution view of application security 3Rational AppScan SuiteenablesComprehensive Application Vulnerability Management
The Costs from Security Breaches are Staggering4285 Million records compromised in 2008Verizon 2009 data Breach Investigations Report$204 Cost per Compromised RecordPonemon 2009-2010 Cost of a data Breach ReportTranslates to $58.1BCost to CoRporations
Sources of Security Breach Costs5Unbudgeted Costs: Customer notification / care
 Government fines
 Litigation
 Reputational damage
 Brand erosion
 Cost to repair1,000,000x10x1xSecurity FlawDamage to EnterpriseFunctional FlawDevelopmentTestDeployment
Web Applications are the greatest risk to organizations6Web application vulnerabilities represented the largest category in vulnerability disclosures
In 2009, 49% of all vulnerabilities were Web application vulnerabilities
SQL injection and Cross-Site Scripting are neck and neck in a race for the top spotIBM Internet Security Systems  2009 X-Force®Year End Trend & Risk Report
Why are Web Applications so Vulnerable?7Developers are mandated to deliver functionality on-time and on-budget - but not to develop secure applicationsDevelopers are not generally educated in secure code practicesProduct innovation is driving development of increasingly complicated software for a Smarter PlanetNetwork scanners won’t find application vulnerabilities and firewalls/IPS don’t block application attacksVolumes of applications continue to be deployed that are riddled with security flaws… …and are non compliant with industry regulations
8Clients’ security challenges in a smarter planet Key drivers for security projectsIncreasing  ComplexityRising                       CostsEnsuring Compliance Spending by U.S. companies on governance, risk and compliance will grow to $29.8 billionin 2010Soon, there will be            1 trillionconnected devices in the world, constituting an “internet of things”The cost of a data breach increased to $204 per compromised customer record Source  http://searchcompliance.techtarget.com/news/article/0,289142,sid195_gci1375707,00.html
Market DriversRegulatory & Standards ComplianceeCommerce: PCI-DSS,  PA-DSSFinancial Services: GLBAEnergy: NERC / FERCGovernment: FISMAUser demand Rich application demand is pushing development to advanced code techniques – Web 2.0 introducing more exposuresCost cutting in current economic climate Demands increased efficienciesCyber Blitz Hits U.S., Korea Websites -WSJJuly 9th, 2009“Web-based malware up 400%, 68% hosted on legitimate sites”         — ZDnet, June 2008Hackers Break Into Virginia Health Website, Demand Ransom — Washington Post, May, 2009
10AgendaCurrent Trends in Application SecurityThe SolutionStrategies for Customer SuccessRational AppScan SuiteIBM Application Security Coverage
The Solution - Security for Smarter ProductsSmarter Products require secure applications
Security needs to be built into the development process and addressed throughout the development lifecycle
Providing security for smarter products requires comprehensive security solutions deployed in concert with application lifecycle management offerings that:
Provide integrated testing solutions for developers, QA, Security and Compliance stakeholders
Leveragemultiple appropriate testing technologies (static & dynamic analysis)
Provide effortless security that allows development to be part of the solution
Supportgovernance, reporting and dashboards
Can facilitate collaboration between development and security teams11

More Related Content

PPT
IBM Rational AppScan Product Overview
PPT
Business cases for software security
PPT
IBM AppScan Enterprise - The total software security solution
PPT
Software Security Initiatives
PDF
Healthcare application-security-practices-survey-veracode
PPT
Core.co.enterprise.deck.06.16.10
PDF
IBM Rational App Scan Tester Edition and Quality Manager
PPTX
Veracode - Inglês
IBM Rational AppScan Product Overview
Business cases for software security
IBM AppScan Enterprise - The total software security solution
Software Security Initiatives
Healthcare application-security-practices-survey-veracode
Core.co.enterprise.deck.06.16.10
IBM Rational App Scan Tester Edition and Quality Manager
Veracode - Inglês

What's hot (20)

PDF
Cybersecurity Best Practices for 3rd Party Supply Chain
PDF
Irv Badr: Managing Risk Safety and Security Compliance
PPT
IBM AppScan - the total software security solution
PDF
Applicaiton Security - Building The Audit Program
PPT
IBM AppScan Standard - The Web Application Security Solution
PDF
Veracode - Overview
PPTX
Strengthening cyber resilience with Software Supply Chain Visibility
PPTX
Intelligence on the Intractable Problem of Software Security
PPTX
What’s making way for secure sdlc
PPT
IBM Rational AppScan Technical Overview
PPTX
Secure Software Development Life Cycle
PPT
IBM AppScan Source - The SAST solution
PDF
Risks in the Software Supply Chain
PDF
Veracode State of Software Security vol 4
PDF
IRJET-A Review of Testing Technology in Web Application System
PDF
Security results of_the_wqr_2015_16
PDF
Applying Software Quality Models to Software Security
PDF
Qualitykiosk And Its Deliverables
PPTX
Lean and (Prepared for) Mean: Application Security Program Essentials
PPTX
Secure SDLC Framework
Cybersecurity Best Practices for 3rd Party Supply Chain
Irv Badr: Managing Risk Safety and Security Compliance
IBM AppScan - the total software security solution
Applicaiton Security - Building The Audit Program
IBM AppScan Standard - The Web Application Security Solution
Veracode - Overview
Strengthening cyber resilience with Software Supply Chain Visibility
Intelligence on the Intractable Problem of Software Security
What’s making way for secure sdlc
IBM Rational AppScan Technical Overview
Secure Software Development Life Cycle
IBM AppScan Source - The SAST solution
Risks in the Software Supply Chain
Veracode State of Software Security vol 4
IRJET-A Review of Testing Technology in Web Application System
Security results of_the_wqr_2015_16
Applying Software Quality Models to Software Security
Qualitykiosk And Its Deliverables
Lean and (Prepared for) Mean: Application Security Program Essentials
Secure SDLC Framework
Ad

Similar to Rational application-security-071411 (20)

PPTX
Digital Product Security
PDF
Unified application security analyser
PDF
Cyber security series Application Security
PPTX
Emphasizing Value of Prioritizing AppSec Meetup 11052023.pptx
PDF
Top 6 Web Application Security Best Practices.pdf
PPTX
Best Practices for a Mature Application Security Program Webinar - February 2016
PDF
Ibm עמרי וייסמן
PDF
Omri
PDF
Ibm עמרי וייסמן
PDF
Streamlining AppSec Policy Definition.pptx
PDF
Application security vision - John b
PDF
AppSec in an Agile World
PDF
application-security-fallacies-and-realities-veracode
PDF
Outpost24 Webinar - Creating a sustainable application security program to dr...
PPT
Software Security in the Real World
PPTX
Application Hackers Have A Handbook. Why Shouldn't You?
PDF
Web Application Security - Everything You Should Know
PDF
Giving your AppSec program the edge - using OpenSAMM for benchmarking and sof...
PDF
Application Security Testing for Software Engineers: An approach to build sof...
PPTX
Application Security TRENDS – Lessons Learnt- Firosh Ummer
Digital Product Security
Unified application security analyser
Cyber security series Application Security
Emphasizing Value of Prioritizing AppSec Meetup 11052023.pptx
Top 6 Web Application Security Best Practices.pdf
Best Practices for a Mature Application Security Program Webinar - February 2016
Ibm עמרי וייסמן
Omri
Ibm עמרי וייסמן
Streamlining AppSec Policy Definition.pptx
Application security vision - John b
AppSec in an Agile World
application-security-fallacies-and-realities-veracode
Outpost24 Webinar - Creating a sustainable application security program to dr...
Software Security in the Real World
Application Hackers Have A Handbook. Why Shouldn't You?
Web Application Security - Everything You Should Know
Giving your AppSec program the edge - using OpenSAMM for benchmarking and sof...
Application Security Testing for Software Engineers: An approach to build sof...
Application Security TRENDS – Lessons Learnt- Firosh Ummer
Ad

More from Scott Althouse (7)

PDF
Passing internal and external audits with reporting and dashboards nov 2011
PDF
Passing internal and external audits with reporting and dashboards nov 2011
PPT
Risk management in development of life critical systems
PDF
Rhapsody reverseengineering
PPTX
Saving resources with simulation webinar 092011
PDF
Ed Mayer- Getting from Good Requirements to Good Code
PDF
IBM Rational 8/16 Webinar Presentation
Passing internal and external audits with reporting and dashboards nov 2011
Passing internal and external audits with reporting and dashboards nov 2011
Risk management in development of life critical systems
Rhapsody reverseengineering
Saving resources with simulation webinar 092011
Ed Mayer- Getting from Good Requirements to Good Code
IBM Rational 8/16 Webinar Presentation

Recently uploaded (20)

PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PDF
KodekX | Application Modernization Development
PPTX
MYSQL Presentation for SQL database connectivity
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
cuic standard and advanced reporting.pdf
DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
PDF
Network Security Unit 5.pdf for BCA BBA.
PPTX
A Presentation on Artificial Intelligence
PDF
Review of recent advances in non-invasive hemoglobin estimation
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
Electronic commerce courselecture one. Pdf
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Diabetes mellitus diagnosis method based random forest with bat algorithm
Chapter 3 Spatial Domain Image Processing.pdf
“AI and Expert System Decision Support & Business Intelligence Systems”
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
The Rise and Fall of 3GPP – Time for a Sabbatical?
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
KodekX | Application Modernization Development
MYSQL Presentation for SQL database connectivity
NewMind AI Weekly Chronicles - August'25 Week I
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
Unlocking AI with Model Context Protocol (MCP)
cuic standard and advanced reporting.pdf
The AUB Centre for AI in Media Proposal.docx
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
Network Security Unit 5.pdf for BCA BBA.
A Presentation on Artificial Intelligence
Review of recent advances in non-invasive hemoglobin estimation
Digital-Transformation-Roadmap-for-Companies.pptx
Electronic commerce courselecture one. Pdf
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf

Rational application-security-071411

  • 1. IBM Security SolutionsIBM Rational Application Security
  • 2. 2AgendaCurrent Trends in Application SecurityThe SolutionStrategies for Customer SuccessRational AppScan SuiteIBM Application Security Coverage
  • 3. Executive SummaryWeb applications are the greatest source of risk for organizationsRational Application Security enables organizations to address root cause of this riskAppScan leverages a mix of technologies (static & dynamic)AppScan is a key part of IBM Security’s full solution view of application security 3Rational AppScan SuiteenablesComprehensive Application Vulnerability Management
  • 4. The Costs from Security Breaches are Staggering4285 Million records compromised in 2008Verizon 2009 data Breach Investigations Report$204 Cost per Compromised RecordPonemon 2009-2010 Cost of a data Breach ReportTranslates to $58.1BCost to CoRporations
  • 5. Sources of Security Breach Costs5Unbudgeted Costs: Customer notification / care
  • 10. Cost to repair1,000,000x10x1xSecurity FlawDamage to EnterpriseFunctional FlawDevelopmentTestDeployment
  • 11. Web Applications are the greatest risk to organizations6Web application vulnerabilities represented the largest category in vulnerability disclosures
  • 12. In 2009, 49% of all vulnerabilities were Web application vulnerabilities
  • 13. SQL injection and Cross-Site Scripting are neck and neck in a race for the top spotIBM Internet Security Systems 2009 X-Force®Year End Trend & Risk Report
  • 14. Why are Web Applications so Vulnerable?7Developers are mandated to deliver functionality on-time and on-budget - but not to develop secure applicationsDevelopers are not generally educated in secure code practicesProduct innovation is driving development of increasingly complicated software for a Smarter PlanetNetwork scanners won’t find application vulnerabilities and firewalls/IPS don’t block application attacksVolumes of applications continue to be deployed that are riddled with security flaws… …and are non compliant with industry regulations
  • 15. 8Clients’ security challenges in a smarter planet Key drivers for security projectsIncreasing ComplexityRising CostsEnsuring Compliance Spending by U.S. companies on governance, risk and compliance will grow to $29.8 billionin 2010Soon, there will be 1 trillionconnected devices in the world, constituting an “internet of things”The cost of a data breach increased to $204 per compromised customer record Source  http://searchcompliance.techtarget.com/news/article/0,289142,sid195_gci1375707,00.html
  • 16. Market DriversRegulatory & Standards ComplianceeCommerce: PCI-DSS, PA-DSSFinancial Services: GLBAEnergy: NERC / FERCGovernment: FISMAUser demand Rich application demand is pushing development to advanced code techniques – Web 2.0 introducing more exposuresCost cutting in current economic climate Demands increased efficienciesCyber Blitz Hits U.S., Korea Websites -WSJJuly 9th, 2009“Web-based malware up 400%, 68% hosted on legitimate sites” — ZDnet, June 2008Hackers Break Into Virginia Health Website, Demand Ransom — Washington Post, May, 2009
  • 17. 10AgendaCurrent Trends in Application SecurityThe SolutionStrategies for Customer SuccessRational AppScan SuiteIBM Application Security Coverage
  • 18. The Solution - Security for Smarter ProductsSmarter Products require secure applications
  • 19. Security needs to be built into the development process and addressed throughout the development lifecycle
  • 20. Providing security for smarter products requires comprehensive security solutions deployed in concert with application lifecycle management offerings that:
  • 21. Provide integrated testing solutions for developers, QA, Security and Compliance stakeholders
  • 22. Leveragemultiple appropriate testing technologies (static & dynamic analysis)
  • 23. Provide effortless security that allows development to be part of the solution
  • 25. Can facilitate collaboration between development and security teams11
  • 26. Cost is a Significant Driver80% of development costs are spent identifying and correcting defects!*Once released as a product $7,600/defect+Law suits, loss of customer trust,damage to brandDuring the QA/Testing phase$960/defectDuring the build phase $240/defectDuring the coding phase $80/defectThe increasing costs of fixing a defect….*National Institute of Standards & Technology Source: GBS Industry standard studyDefect cost derived in assuming it takes 8 hrs to find, fix and repair a defect when found in code and unit test. Defect FFR cost for other phases calculated by using the multiplier on a blended rate of $80/hr.
  • 27. Make Applications Secure, by DesignCycle of secure application developmentManage,Monitor& DefendDesign PhaseConsideration is given to security requirements of the application
  • 28. Issues such as required controls and best practices are documented on par with functional requirementsDevelopment PhaseSoftware is checked during coding for:
  • 30. Compliance with security requirementsBuild & Test PhaseTesting begins for errors and compliance with security requirements across the entire application
  • 31. Applications are also tested for exploitability in deployment scenarioDeployment PhaseConfigure infrastructure for application policies
  • 32. Deploy applications into productionOperational PhaseContinuously monitor applications for appropriate application usage, vulnerabilities and defend against attacksDesignFunctional SpecDevelopDeployBuild & TestOutsourcing PartnerSoftware13
  • 33. ROI Opportunity of Application Security TestingCost Savings – of testing early in the development process (ALM)80% of development costs are spent identifying and correcting defectsTesting for vulnerabilities earlier in the development process can help avoid that unnecessary expenseCost of finding & fixing problems:
  • 34. code stage is $80, QA/Testing is $960*
  • 35. Ex: 50 applications annually & 25 issues per application, testing at code stage saves $1.1M over testing at QA stage. Cost Savings – of automated vs. manual testingOutsourced audits can cost $10,000 to $50,000 per application
  • 36. At $20,000 an app, 50 audits will cost $1M.
  • 37. With 1 hire + 4 quarterly outsourced audits (ex: $120,000+$80,000), $800,000/yr can be saved (less the cost of testing software)Automated testing provides tremendous productivity savings over manual testingAutomated source code testing with periodic penetration testing allows for cost effective security analysis of applications Cost Avoidance – of a security breachThe cost to companies is $204per compromised record**The average cost per data breach is $6.6 Million**Costs as a result of a security breach can include (but are not limited to) audit fees, legal fees, regulatory fines, lost customer revenue and brand damage * Source: GBS Industry standard study ** Source: Ponemon Institute 2009-10
  • 38. 15AgendaCurrent Trends in Application SecurityThe SolutionStrategies for Customer SuccessRational AppScan SuiteIBM Application Security Coverage
  • 39. Application Security Maturity ModelCORRECTIVEBOLT ONBUILT INUNAWAREPHASEPHASEPHASESecurity testing before deploymentFully integrated security testingDoing nothingOutsourced testingView of application testing coverageTimeDuration 1-2 Years
  • 40. BuildCodingQASecurityProductionSecurity Testing Within the Software LifecycleSDLCMost Issues are found by security auditors prior to going live.% of Issue Found by Stage of SDLC
  • 41. BuildCodingQASecurityProductionSecurity Testing Within the Software LifecycleSDLCDesired Profile% of Issue Found by Stage of SDLC
  • 42. BuildCodingQASecurityProductionSecurity Testing Within the Software LifecycleSDLCDevelopersDevelopersDevelopersApplication Security Testing Maturity
  • 43. 20AgendaCurrent Trends in Application SecurityThe SolutionStrategies for Customer SuccessRational AppScan SuiteIBM Application Security Coverage
  • 44. Rational ALM IntegrationsRational AppScan:Source for Automation
  • 45. Standard EdApplication DeveloperBuildBuild ForgeDevelopmentRational AppScan: Source Ed Developer
  • 46. Source Ed Remediation
  • 47. Enterprise QuickScanQARational AppScan Tester Ed for RQMRational AppScan Enterprise portalRational AppScan Source Ed CoreQuality ManagerClearQuestRational AppScan:Standard Ed
  • 48. Source Ed for SecurityComplianceSecurity
  • 49. Security Testing Technologies... Combination Drives Greater Solution AccuracyStatic Code Analysis (Whitebox )Scanning source code for security issuesTotal PotentialSecurity IssuesDynamicAnalysisStaticAnalysisBest CoverageDynamic Analysis (Blackbox)Performing security analysis of a compiled application22
  • 50. 23AgendaCurrent Trends in Application SecurityThe SolutionStrategies for Customer SuccessRational AppScan SuiteIBM Application Security Coverage
  • 51. IBM Web application security for a smarter planetRational AppScanSecure code development and vulnerability managementIdentify vulnerabilities and malware
  • 52. Actionable information to correct the problemsTivoli I&AMManage secure Web applicationsProtect Web applications from potential attacksEnd-to-end Web application securityOngoing management and security with a suite of identity and access management solutions
  • 53. Block attacks that aim to exploit Web application vulnerabilities
  • 54. Integrate Web application security with existing network infrastructureDeliver security and performance in Web services and SOAISS IPSPurpose-built XML and SOA solutions for security and performanceWebSphereDatapower24
  • 55. 25

Editor's Notes

  • #4: Web applications are the greatest source of risk for organizations today. And Rational application security can allow organizations to address the root cause of this risk. That’s a significant statement because there are different application security solutions out there that are more protection and patch that don’t address the root case. recard).  We leverage a mix of technologies both static and dynamic to enable the right use cases. So not only do we speak to the technologies but we focus on building the right solution for the right stakeholder whether you’re talking to a security auditor, build manager, developer, QUA tester. We’ve built our portfolios to support these different - these cases.  And beyond that AppScan is the key part of IBM’s full solution view of application security so we’re not just a point solution like many of thetier two competitors that we see in the market. We’re a full solution for application vulnerability management but we’re also full solution for application security from vulnerability management to identity and access management to application firewalls and IPSs. So there’s a full story that we’ll get into shortly but in summary: we’re a comprehensive application vulnerability management solution.
  • #5: some new stats that may be new to your customer f they’re not already aware of the severity and prevalence. Verizon business report, in their report from 2009 they found that there were 285 million records that were compromised. We married this data point with Ponemon’s research that cost of a compromised record cost to an organization is $204 per record and that translates to over $58 billion cost to corporations. That’s a pretty significant problem and one that CIOs, (CSOs) can’t ignore
  • #6: There’re multiple sources of breach cost but the key point on this slide is that you should fix security issues early in the process. If that doesn’t happen, if this gets in the field and there’s a breach as a result, the cost of a security flaw is exponentially higher then what is typically seen for a functional flaw.  And these cost organizations come in in many different forms from government litigation, brand damage, revenue, cost repair and audits
  • #7: More data from IBM X source year end report. About half - Web application vulnerabilities is the largest category. Vulnerability disclosures represent about half of all vulnerabilities that exist for the organization.
  • #8: Why are applications so vulnerable? Developers are mandated to deliver functionality on time and on budget, not to develop secure applications. So security is not a priority for them.  They’re also not generally education in secure code practices. Additionally, product innovation, the whole smarter planet discussion is driving development of increasingly complex software. We’re all over that. When developers limits are being stretched, they’re focusing on the functionality of those applications, not the security, and increasing complexity generally increases risk within these applications.  And of course the discussion that we continue to see, network scanners don’t find application vulnerabilities and the firewall IPSs don’t block application attack.  So what’s happening is that we just continue to see volumes of applications that are deployed which are riddled with security flaws and they’re also non-compliant in industry regulations. 
  • #9: These new risks are significant drivers for security products. There’s increase in complexity. And then of course, compliance continues to be a main focal point in these discussions.
  • #12: Security should be build into the development process vs. bolted on. Testing for vulnerabilities should be a seamless part of development that happens throughout the development lifecycle.Integrated testing solution for developers, QA, Security and Compliance stakeholdersIntegrated solution that allows for testing at all steps of Software Delivery from coding, build, QA, audit to production. Leverage best of both leading testing technologiesSolutions leverage a combination of Blackbox + Whitebox technologiesEffortless Security Developers should not have to be security experts Tools should be easy to configure, results should be accurateGovernance, reporting and dashboardsCentral control over test policiesVisibility through dashboards and reportsFacilitate collaboration between development and security teamsIssues can be assigned and tracked