19.02.2015 Views

2014 Digital Yearbook of Homeland Security Awards

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

GSN <strong>2014</strong> <strong>Digital</strong> <strong>Yearbook</strong> <strong>of</strong> <strong>Homeland</strong> <strong>Security</strong> <strong>Awards</strong> Recipients<br />

Vendors <strong>of</strong> IT <strong>Security</strong> Products and Solutions<br />

Applied Visions, Inc. / Secure Decisions<br />

Division – <strong>2014</strong> Winner<br />

<strong>Awards</strong> Category:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Best Compliance/Vulnerability Assessment Solution<br />

Name <strong>of</strong> Nominated Product, Service,<br />

or Program:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Code Dx ®<br />

Reason this entry deserves to win:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Corporate and government enterprises are all potential<br />

victims <strong>of</strong> cyber-attacks that can adversely impact a<br />

company’s bottom line, damage public reputation,<br />

compromise sensitive government data, and diminish<br />

the public trust. Industry experts and the Department<br />

<strong>of</strong> <strong>Homeland</strong> <strong>Security</strong> (DHS) have traced most compromises<br />

to poorly written s<strong>of</strong>tware. 70-80% <strong>of</strong> security<br />

breaches occur because <strong>of</strong> poorly written code containing<br />

numerous security vulnerabilities. Consequently,<br />

s<strong>of</strong>tware development and acquisition organizations<br />

are under increased pressure to find and fix s<strong>of</strong>tware<br />

vulnerabilities before they are deployed. DHS, NASA,<br />

DoD and commercial businesses have begun to use<br />

static application security testing (SAST) tools to find<br />

s<strong>of</strong>tware vulnerabilities during the development cycle<br />

and as part <strong>of</strong> the acquisition process. One problem,<br />

however, is that no single source code analysis tool finds<br />

most <strong>of</strong> the vulnerabilities in an application. Different<br />

tools identify different vulnerabilities. Benchmark tests<br />

by NIST and NSA reveal that, on average, a single static<br />

analysis tool will detect only 14% <strong>of</strong> all <strong>of</strong> the s<strong>of</strong>tware<br />

weaknesses in code. Consequently, one needs to use<br />

multiple source code analysis tools to find a majority <strong>of</strong><br />

the vulnerabilities. A second problem is that each tool<br />

outputs its results in a different format with different<br />

severity scales, making it difficult to combine the results<br />

and present them in a unified report. A third problem<br />

is related to expense: each commercial tool added to<br />

the vulnerability analysis adds significant cost; and each<br />

open-source SAST tool requires additional resources to<br />

find and configure them. Code Dx ® finds, prioritizes,<br />

and visualizes s<strong>of</strong>tware vulnerabilities – fast and afford-<br />

38

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!