Wednesday 28 August 2013

HP releases Fortify Static Code Analyzer 4.0 to help businesses respond to threats 10 times faster

HP logo
HP has unveiled a new Fortify Static Code Analyzer 4.0, claiming the tool will improve companies' software security assessment speeds tenfold.
HP said the new Fortify Static Code Analyzer improves on previous versions by using more accurate and parallelised static application security testing procedures and will offer a variety of cyber security improvements.
These include the ability to create better software security intelligence reports and a 20 percent reduction in false positive results compared with previous versions. The new reports will include key information offering IT administrators risk-ranked lists of issues for mobile, web, client and server applications, making it easier for them to spot serious vulnerabilities before they are exploited.
The new Fortify Static Code Analyzer can also reduce application development times, says HP, allowing full application scanning that runs in tangent with the app-development process. The service also features flexible deployment options with HP offering on-premise or on-demand access.
The news follows widespread warnings from within the security community that the threats facing companies is increasing. Most recently McAfee reported seeing a marked spike in the number of ransomware and mobile banking attacks active in the wild in its Second Quarter Threat Report.
HP vice president and general manager of Enterprise Security Products Mike Armistead, said businesses need analytics tools such as Fortify Static Code Analyzer 4.0 to deal with the new threats.
"Software security vulnerabilities are becoming more prevalent as the demand to support new technology needs escalates," he said.
"A holistic approach to software security is imperative, and with the HP Fortify portfolio, organisations have the ability to assess vulnerabilities across all of their software, assure security flaws are resolved before deployment, and protect applications from attacks once in production."

No comments:

Post a Comment