1 / 21

Sec2Pro

Sec2Pro. January 2008. BugSec Products. Sec 2 Code. Sec 2 Net. Challenges. Data security aspects become a critical elements in modern companies proceeding. Many organizations are required to comply with information security standards, such as PCI, BASEL II, HIPAA, SOX and more

kiele
Download Presentation

Sec2Pro

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Sec2Pro January 2008

  2. BugSec Products Sec2Code Sec2Net

  3. Challenges • Data security aspects become a critical elements in modern companies proceeding. • Many organizations are required to comply with information security standards, such as PCI, BASEL II, HIPAA, SOX and more • Because of these regulations and threats, implementation of a new software or system becomes very “painful” and takes a long time

  4. The Present Situation • Security problems may cause unnecessary costs and schedule delays • Systems must undergo penetration tests before production • At the final stage, the development of each solution necessitates the investment of extensive resources Conclusion: The implementation of security means during the development process saves time and money

  5. Fact NIST (National Institute of Standards and Technology): “…the cost of fixing defects after deployment is almost fifteen times greater than detecting and eliminating them during development”

  6. Sec2Pro Functions • Increases awareness to the importance of information security • Implements security best practices into development processes • Automates procedures, ensures their assimilation by programmers, keeps track of their implementation in practice • Receives feedback from programmers regarding adherence to guidelines • Produces control reports for management (Cont.)

  7. Sec2Pro Functions (cont.) Significantly reduces penetration testing times Verifies compliance with required standards and regulations Provides programmers with ongoing updates regarding threats and newly issued regulatory requirements

  8. Sec2Pro • Integrated hardware (appliance) / software system • Straightforward assimilation and operation • “Translation” of regulations and standards into specific instructions • Broad knowledge base for all development environments and infrastructure • Intuitive, efficient and accessible knowledge base • Ongoing updates regarding technological issues and regulatory requirements • Online communication among all project components through one system

  9. Sec2Pro • Sec2Code includes 2 configurations: • Notifier – tracks code writing and refers the programmer to relevant information in the knowledge base • Project Checklist– manages security aspects during programming • Sec2Net • Procedures and a checklist for hardening IT infrastructures

  10. Opening a New Project • Opening a new project includes the participants, software languages and regulations Click to enlarge

  11. Back

  12. Interrogation & Input Data • The system generates a checklist according to the project definitions Click to enlarge

  13. Back

  14. Programmer Support • The system provides the programmer with detailed explanations, including suggestions on how to resolve a variety of problems – from fundamental issues to examples of relevant codes Click to enlarge

  15. Back

  16. Reporting Tools • The system provides managers with on-line progress reports Click to enlarge

  17. Back

  18. Sec2Code Notifier • Subtle pop-up notification appears when an object requires attention • A hyperlink directs to the relevant page in the knowledge base • The application is transparent to the user Click to enlarge

  19. Sec2Code Notifier Back

  20. System Benefits • Unique “open architecture” module • Ability to add checklists of any kind • Organizations can independently construct tailored development environments meeting their specific needs • Shorter penetration testing times • Ability to set earlier project launch dates • Reduced dependency on external consulting services

  21. Thank You For more details cont us: 11 Moshe Levi St., Rishon le Zion 75070, Israel Tel: +972-3-9622655 | Fax: +972-3-9511433 | E-mail: info@bugsec.com Visit us at our website: www.bugsec.com

More Related