SlideShare a Scribd company logo
APPLICATION	
  SECURITY	
  MANAGEMENT	
  
How to efficiently identify and
remediate critical vulnerabilities
in SAP and other Business
Applications
Agenda
  Why measure the effectiveness of your Application Security
  Unified Platform
  Demo:
  Virtual Forge - Code Profiler
  Checkmarx - CxSAST
ThreadFix
  Q&A
3
Why measure the effectiveness of your Application
Security
  The state of Application Security
  Why traditional tactics of Application Security Management fail
  The need to orchestrate tons of security tools for different
purposes
4
A unified platform to manage risks in your business
applications
  Checkmarx and Virtual Forge provide customers with a feasible
solution based on ThreadFix:
  Developed by experienced security practitioners
  Combines reports from different code scanners
  Provides a landscape wide overview
  Easy control and monitoring of effort, timelines and
achievements
  Common Weakness Enumeration (CWE)
  Free Community Version available
5
Integration of CodeProfiler and CxSAST into ThreadFix
  Manage your findings from one common platform
  CWE Standard Ratings and Certified Integration
Source: ThreadFix by Denim Group
6
DEMO
Next Slide
FF >> 4:00 Min.
Key Takeaways
You have seen, how you can:
  Scan your SAP and other business applications for code
vulnerabilities using CodeProfiler and Checkmarx
  Control and monitor the projects overall application security state
  Evaluate and prioritize the vulnerabilities found
  Track the remediation of vulnerabilities with ThreadFix
8
Next Steps?
  Download the free ThreadFix Community Edition at www.threadfix.org
Sign up for the free SAP Risk Assessment at www.virtualforge.com
Sign up for a free secure code analysis by Checkmarx‘s CxSAST at
www.checkmarx.com
9
Disclaimer
© 2015 Virtual Forge GmbH. All rights reserved.
Information contained in this publication is subject to change without prior notice.
These materials are provided by Virtual Forge and serve only as information.
SAP, ABAP and other named SAP products and services as well as their respective logos are trademarks or registered trademarks
of SAP AG in Germany and other countries worldwide.
All other names of products and services are trademarks of their respective companies. The information in the text are approximate
and is only for information.
Virtual Forge accepts no liability or responsibility for errors or omissions in this publication. From the information contained in this
publication, no further liability is assumed. No part of this publication may be reproduced or transmitted in any form or for any
purpose without the express permission of Virtual Forge GmbH, Germany or Virtual Forge Inc., Philadelphia. The General Terms
and Conditions of Virtual Forge apply.
© 2015 Virtual Forge | www.virtualforge.com | All rights reserved.
10

More Related Content

What's hot (20)

PPTX
Veracode - Inglês
DeServ - Tecnologia e Servços
 
PDF
Application Security Risk Assessment
Thomas Kurian Ambattu,CRISC,ISLA-2011 (ISC)²
 
PPTX
Security in the Development Lifecycle - lessons learned
Boaz Shunami
 
PDF
Secure Coding and Threat Modeling
Miriam Celi, CISSP, GISP, MSCS, MBA
 
PDF
Security Development Lifecycle Tools
n|u - The Open Security Community
 
PDF
Application Security Testing(AST)
Arvind Bhardwaj [AB]
 
PDF
Software security, secure software development in the age of IoT, smart thing...
LabSharegroup
 
PDF
The CA Technologies | Veracode Platform: A 360-Degree View of Your Applicatio...
CA Technologies
 
PPTX
Secure Coding 2013
The eCore Group
 
PDF
10 Tips to Keep Your Software a Step Ahead of the Hackers
Checkmarx
 
PDF
Gloriolesoft Consulting Security and Privacy Offering
Debasis Chakraborty
 
PDF
Sumeet Mandloi: Robust Security Testing Framework
Anna Royzman
 
PDF
7 measures to overcome cyber attacks of web application
TestingXperts
 
PPTX
Mobile security recipes for xamarin
Nicolas Milcoff
 
PPTX
Application Security at DevOps Speed and Portfolio Scale
Jeff Williams
 
PDF
Pactera - App Security Assessment - Mobile, Web App, IoT - v2
Kyle Lai
 
PPTX
Microsoft Security Development Lifecycle
Razi Rais
 
PDF
Understanding & Addressing OWASP’s Newest Top Ten Threat: Using Components wi...
Sonatype
 
PPT
Discovering the Value of Verifying Web Application Security Using IBM Rationa...
Alan Kan
 
PDF
SAST vs. DAST: What’s the Best Method For Application Security Testing?
Cigital
 
Veracode - Inglês
DeServ - Tecnologia e Servços
 
Application Security Risk Assessment
Thomas Kurian Ambattu,CRISC,ISLA-2011 (ISC)²
 
Security in the Development Lifecycle - lessons learned
Boaz Shunami
 
Secure Coding and Threat Modeling
Miriam Celi, CISSP, GISP, MSCS, MBA
 
Security Development Lifecycle Tools
n|u - The Open Security Community
 
Application Security Testing(AST)
Arvind Bhardwaj [AB]
 
Software security, secure software development in the age of IoT, smart thing...
LabSharegroup
 
The CA Technologies | Veracode Platform: A 360-Degree View of Your Applicatio...
CA Technologies
 
Secure Coding 2013
The eCore Group
 
10 Tips to Keep Your Software a Step Ahead of the Hackers
Checkmarx
 
Gloriolesoft Consulting Security and Privacy Offering
Debasis Chakraborty
 
Sumeet Mandloi: Robust Security Testing Framework
Anna Royzman
 
7 measures to overcome cyber attacks of web application
TestingXperts
 
Mobile security recipes for xamarin
Nicolas Milcoff
 
Application Security at DevOps Speed and Portfolio Scale
Jeff Williams
 
Pactera - App Security Assessment - Mobile, Web App, IoT - v2
Kyle Lai
 
Microsoft Security Development Lifecycle
Razi Rais
 
Understanding & Addressing OWASP’s Newest Top Ten Threat: Using Components wi...
Sonatype
 
Discovering the Value of Verifying Web Application Security Using IBM Rationa...
Alan Kan
 
SAST vs. DAST: What’s the Best Method For Application Security Testing?
Cigital
 

Viewers also liked (12)

PDF
[ITAS.VN]CxSuite Enterprise Edition
ITAS VIETNAM
 
PPTX
Implementing an Application Security Pipeline in Jenkins
Suman Sourav
 
PDF
DevSecOps Singapore 2017 - Security in the Delivery Pipeline
James Wickett
 
PPTX
DevOps & Security: Here & Now
Checkmarx
 
PDF
Security Tests as Part of CI - Nir Koren, SAP - DevOpsDays Tel Aviv 2015
DevOpsDays Tel Aviv
 
PDF
A Successful SAST Tool Implementation
Checkmarx
 
PDF
Devops security-An Insight into Secure-SDLC
Suman Sourav
 
PDF
Happy New Year!
Checkmarx
 
PPTX
Graph Visualization - OWASP NYC Chapter
Checkmarx
 
PDF
DevSecOps in Baby Steps
Priyanka Aash
 
PPTX
DEVSECOPS: Coding DevSecOps journey
Jason Suttie
 
PDF
Bringing Security Testing to Development: How to Enable Developers to Act as ...
Achim D. Brucker
 
[ITAS.VN]CxSuite Enterprise Edition
ITAS VIETNAM
 
Implementing an Application Security Pipeline in Jenkins
Suman Sourav
 
DevSecOps Singapore 2017 - Security in the Delivery Pipeline
James Wickett
 
DevOps & Security: Here & Now
Checkmarx
 
Security Tests as Part of CI - Nir Koren, SAP - DevOpsDays Tel Aviv 2015
DevOpsDays Tel Aviv
 
A Successful SAST Tool Implementation
Checkmarx
 
Devops security-An Insight into Secure-SDLC
Suman Sourav
 
Happy New Year!
Checkmarx
 
Graph Visualization - OWASP NYC Chapter
Checkmarx
 
DevSecOps in Baby Steps
Priyanka Aash
 
DEVSECOPS: Coding DevSecOps journey
Jason Suttie
 
Bringing Security Testing to Development: How to Enable Developers to Act as ...
Achim D. Brucker
 
Ad

Similar to Application Security Management with ThreadFix (20)

PDF
Running a Comprehensive Application Security Program with Checkmarx and Threa...
Denim Group
 
PDF
RSA 2015 Blending the Automated and the Manual: Making Application Vulnerabil...
Denim Group
 
PDF
Managing Your Application Security Program with the ThreadFix Ecosystem
Denim Group
 
PDF
Best Practices for Ensuring SAP ABAP Code Quality and Security
Virtual Forge
 
PDF
How Pratt & Whitney Streamlined Their ABAP Security and Quality Code Review P...
Virtual Forge
 
PDF
Legacy-SecDevOps (AppSec Management Debrief)
Dinis Cruz
 
PDF
SC conference - Building AppSec Teams
Dinis Cruz
 
PDF
The importance of applying SAP patches (Joris van de Vis)
Twan van den Broek
 
PDF
SecDevOps: Development Tools for Security Pros
Denim Group
 
PDF
Assessing Business Operations Risk With Unified Vulnerability Management in T...
Denim Group
 
PPTX
Thread Fix Tour Presentation Final Final
Robin Lutchansky
 
PDF
Case Study: Ensuring the Quality and Security of Custom SAP Applications at t...
Virtual Forge
 
PDF
Running a Software Security Program with Open Source Tools
Denim Group
 
PDF
Application Asset Management with ThreadFix
Denim Group
 
PDF
A New View of Your Application Security Program with Snyk and ThreadFix
Denim Group
 
PDF
Cybersecurity Best Practices for 3rd Party Supply Chain
Anthony Braddy
 
PDF
Blending Automated and Manual Testing
Denim Group
 
PDF
Mobile Trends And The New Threats - Is Your SAP System Vulnerable to Cyber At...
Virtual Forge
 
PPT
Cyber Security integration
Carlo Dapino
 
PDF
Using Collaboration to Make Application Vulnerability Management a Team Sport
Denim Group
 
Running a Comprehensive Application Security Program with Checkmarx and Threa...
Denim Group
 
RSA 2015 Blending the Automated and the Manual: Making Application Vulnerabil...
Denim Group
 
Managing Your Application Security Program with the ThreadFix Ecosystem
Denim Group
 
Best Practices for Ensuring SAP ABAP Code Quality and Security
Virtual Forge
 
How Pratt & Whitney Streamlined Their ABAP Security and Quality Code Review P...
Virtual Forge
 
Legacy-SecDevOps (AppSec Management Debrief)
Dinis Cruz
 
SC conference - Building AppSec Teams
Dinis Cruz
 
The importance of applying SAP patches (Joris van de Vis)
Twan van den Broek
 
SecDevOps: Development Tools for Security Pros
Denim Group
 
Assessing Business Operations Risk With Unified Vulnerability Management in T...
Denim Group
 
Thread Fix Tour Presentation Final Final
Robin Lutchansky
 
Case Study: Ensuring the Quality and Security of Custom SAP Applications at t...
Virtual Forge
 
Running a Software Security Program with Open Source Tools
Denim Group
 
Application Asset Management with ThreadFix
Denim Group
 
A New View of Your Application Security Program with Snyk and ThreadFix
Denim Group
 
Cybersecurity Best Practices for 3rd Party Supply Chain
Anthony Braddy
 
Blending Automated and Manual Testing
Denim Group
 
Mobile Trends And The New Threats - Is Your SAP System Vulnerable to Cyber At...
Virtual Forge
 
Cyber Security integration
Carlo Dapino
 
Using Collaboration to Make Application Vulnerability Management a Team Sport
Denim Group
 
Ad

More from Virtual Forge (17)

PDF
How the U.S. Department of Defense Secures Its Custom ABAP Code
Virtual Forge
 
PDF
SAP HANA Security: New Technology, New Risks
Virtual Forge
 
PPTX
Stabile und performante Anwendungen für SAP HANA entwickeln
Virtual Forge
 
PDF
Develop Stable, High-Performance Applications for SAP HANA
Virtual Forge
 
PDF
ABAP Qualitäts-Benchmark: Eine Analyse von über 200 SAP Installationen
Virtual Forge
 
PDF
Is your SAP system vulnerable to cyber attacks?
Virtual Forge
 
PDF
How to assess the risks in your SAP systems at the push of a button
Virtual Forge
 
PDF
Uninvited Guests: Why do hackers love our SAP landscapes?
Virtual Forge
 
PDF
Ungebetene Gäste: Warum lieben Hacker aus aller Welt unsere SAP Landschaften?
Virtual Forge
 
PPTX
Case Study: Automated Code Reviews In A Grown SAP Application Landscape At EW...
Virtual Forge
 
PDF
Case Study: Automatisierte Code Reviews in einer gewachsenen SAP-Applikations...
Virtual Forge
 
PPTX
10 GOLDEN RULES FOR CODING AUTHORIZATION CHECKS IN ABAP
Virtual Forge
 
PDF
Risks of Hosted SAP Environments
Virtual Forge
 
PDF
Case Study: ABAP Development Life Cycle and Governance at THE GLOBE AND MAIL ...
Virtual Forge
 
PDF
Die Top 5 Mythen der SAP Sicherheit
Virtual Forge
 
PDF
ABAP Code Qualität - Best Practices
Virtual Forge
 
PDF
Case Study: Automating Code Reviews for Custom SAP ABAP Applications with Vir...
Virtual Forge
 
How the U.S. Department of Defense Secures Its Custom ABAP Code
Virtual Forge
 
SAP HANA Security: New Technology, New Risks
Virtual Forge
 
Stabile und performante Anwendungen für SAP HANA entwickeln
Virtual Forge
 
Develop Stable, High-Performance Applications for SAP HANA
Virtual Forge
 
ABAP Qualitäts-Benchmark: Eine Analyse von über 200 SAP Installationen
Virtual Forge
 
Is your SAP system vulnerable to cyber attacks?
Virtual Forge
 
How to assess the risks in your SAP systems at the push of a button
Virtual Forge
 
Uninvited Guests: Why do hackers love our SAP landscapes?
Virtual Forge
 
Ungebetene Gäste: Warum lieben Hacker aus aller Welt unsere SAP Landschaften?
Virtual Forge
 
Case Study: Automated Code Reviews In A Grown SAP Application Landscape At EW...
Virtual Forge
 
Case Study: Automatisierte Code Reviews in einer gewachsenen SAP-Applikations...
Virtual Forge
 
10 GOLDEN RULES FOR CODING AUTHORIZATION CHECKS IN ABAP
Virtual Forge
 
Risks of Hosted SAP Environments
Virtual Forge
 
Case Study: ABAP Development Life Cycle and Governance at THE GLOBE AND MAIL ...
Virtual Forge
 
Die Top 5 Mythen der SAP Sicherheit
Virtual Forge
 
ABAP Code Qualität - Best Practices
Virtual Forge
 
Case Study: Automating Code Reviews for Custom SAP ABAP Applications with Vir...
Virtual Forge
 

Recently uploaded (20)

PPTX
ChiSquare Procedure in IBM SPSS Statistics Version 31.pptx
Version 1 Analytics
 
PPTX
Customise Your Correlation Table in IBM SPSS Statistics.pptx
Version 1 Analytics
 
PPTX
iaas vs paas vs saas :choosing your cloud strategy
CloudlayaTechnology
 
PDF
[Solution] Why Choose the VeryPDF DRM Protector Custom-Built Solution for You...
Lingwen1998
 
PDF
IObit Driver Booster Pro 12.4.0.585 Crack Free Download
henryc1122g
 
PPTX
Agentic Automation: Build & Deploy Your First UiPath Agent
klpathrudu
 
PPTX
Agentic Automation Journey Series Day 2 – Prompt Engineering for UiPath Agents
klpathrudu
 
PDF
ERP Consulting Services and Solutions by Contetra Pvt Ltd
jayjani123
 
PPTX
Help for Correlations in IBM SPSS Statistics.pptx
Version 1 Analytics
 
PDF
4K Video Downloader Plus Pro Crack for MacOS New Download 2025
bashirkhan333g
 
PPTX
Home Care Tools: Benefits, features and more
Third Rock Techkno
 
PDF
UITP Summit Meep Pitch may 2025 MaaS Rebooted
campoamor1
 
PPTX
Get Started with Maestro: Agent, Robot, and Human in Action – Session 5 of 5
klpathrudu
 
PDF
Download Canva Pro 2025 PC Crack Full Latest Version
bashirkhan333g
 
PPTX
Empowering Asian Contributions: The Rise of Regional User Groups in Open Sour...
Shane Coughlan
 
PPTX
Smart Doctor Appointment Booking option in odoo.pptx
AxisTechnolabs
 
PDF
TheFutureIsDynamic-BoxLang witch Luis Majano.pdf
Ortus Solutions, Corp
 
PDF
SciPy 2025 - Packaging a Scientific Python Project
Henry Schreiner
 
PPTX
Function & Procedure: Function Vs Procedure in PL/SQL
Shani Tiwari
 
PPTX
In From the Cold: Open Source as Part of Mainstream Software Asset Management
Shane Coughlan
 
ChiSquare Procedure in IBM SPSS Statistics Version 31.pptx
Version 1 Analytics
 
Customise Your Correlation Table in IBM SPSS Statistics.pptx
Version 1 Analytics
 
iaas vs paas vs saas :choosing your cloud strategy
CloudlayaTechnology
 
[Solution] Why Choose the VeryPDF DRM Protector Custom-Built Solution for You...
Lingwen1998
 
IObit Driver Booster Pro 12.4.0.585 Crack Free Download
henryc1122g
 
Agentic Automation: Build & Deploy Your First UiPath Agent
klpathrudu
 
Agentic Automation Journey Series Day 2 – Prompt Engineering for UiPath Agents
klpathrudu
 
ERP Consulting Services and Solutions by Contetra Pvt Ltd
jayjani123
 
Help for Correlations in IBM SPSS Statistics.pptx
Version 1 Analytics
 
4K Video Downloader Plus Pro Crack for MacOS New Download 2025
bashirkhan333g
 
Home Care Tools: Benefits, features and more
Third Rock Techkno
 
UITP Summit Meep Pitch may 2025 MaaS Rebooted
campoamor1
 
Get Started with Maestro: Agent, Robot, and Human in Action – Session 5 of 5
klpathrudu
 
Download Canva Pro 2025 PC Crack Full Latest Version
bashirkhan333g
 
Empowering Asian Contributions: The Rise of Regional User Groups in Open Sour...
Shane Coughlan
 
Smart Doctor Appointment Booking option in odoo.pptx
AxisTechnolabs
 
TheFutureIsDynamic-BoxLang witch Luis Majano.pdf
Ortus Solutions, Corp
 
SciPy 2025 - Packaging a Scientific Python Project
Henry Schreiner
 
Function & Procedure: Function Vs Procedure in PL/SQL
Shani Tiwari
 
In From the Cold: Open Source as Part of Mainstream Software Asset Management
Shane Coughlan
 

Application Security Management with ThreadFix

  • 2. How to efficiently identify and remediate critical vulnerabilities in SAP and other Business Applications
  • 3. Agenda   Why measure the effectiveness of your Application Security   Unified Platform   Demo:   Virtual Forge - Code Profiler   Checkmarx - CxSAST ThreadFix   Q&A 3
  • 4. Why measure the effectiveness of your Application Security   The state of Application Security   Why traditional tactics of Application Security Management fail   The need to orchestrate tons of security tools for different purposes 4
  • 5. A unified platform to manage risks in your business applications   Checkmarx and Virtual Forge provide customers with a feasible solution based on ThreadFix:   Developed by experienced security practitioners   Combines reports from different code scanners   Provides a landscape wide overview   Easy control and monitoring of effort, timelines and achievements   Common Weakness Enumeration (CWE)   Free Community Version available 5
  • 6. Integration of CodeProfiler and CxSAST into ThreadFix   Manage your findings from one common platform   CWE Standard Ratings and Certified Integration Source: ThreadFix by Denim Group 6
  • 8. Key Takeaways You have seen, how you can:   Scan your SAP and other business applications for code vulnerabilities using CodeProfiler and Checkmarx   Control and monitor the projects overall application security state   Evaluate and prioritize the vulnerabilities found   Track the remediation of vulnerabilities with ThreadFix 8
  • 9. Next Steps?   Download the free ThreadFix Community Edition at www.threadfix.org Sign up for the free SAP Risk Assessment at www.virtualforge.com Sign up for a free secure code analysis by Checkmarx‘s CxSAST at www.checkmarx.com 9
  • 10. Disclaimer © 2015 Virtual Forge GmbH. All rights reserved. Information contained in this publication is subject to change without prior notice. These materials are provided by Virtual Forge and serve only as information. SAP, ABAP and other named SAP products and services as well as their respective logos are trademarks or registered trademarks of SAP AG in Germany and other countries worldwide. All other names of products and services are trademarks of their respective companies. The information in the text are approximate and is only for information. Virtual Forge accepts no liability or responsibility for errors or omissions in this publication. From the information contained in this publication, no further liability is assumed. No part of this publication may be reproduced or transmitted in any form or for any purpose without the express permission of Virtual Forge GmbH, Germany or Virtual Forge Inc., Philadelphia. The General Terms and Conditions of Virtual Forge apply. © 2015 Virtual Forge | www.virtualforge.com | All rights reserved. 10