IBM Improves Security Analytics For Development Teams

IBM has tapped its Rational Software tools division to deliver software that advances security analysis. New software analysis capabilities provide a more efficient and accurate way to help organisations design, build and manage secure applications, the company said.

The offering, based on software IBM received through its acquisition of Ounce Labs, consolidates software vulnerability analysis and reporting into a single view across the enterprise. This allows developers to assess security threats across the entire software development lifecycle, enabling global teams to easily identify and test security exposures and help reduce the risks and costs associated with security and compliance concerns, IBM said.

For example, organisations can use the software to automate application security audits and source code scanning to ensure that the network and Web-based applications are secure and compliant. The company claims this delivers improved accuracy of vulnerability identification and remediation.

Automatic String Analysis

The added security offerings include enhancements to the IBM Rational AppScan portfolio that simplify security vulnerability analysis and identification for software developers, IBM said. Moreover, as part of the new features, IBM Research provided string analysis, a capability that helps the security testing process by automatically detecting and verifying which Web application development input needs to be cleansed to remove security risks. This helps accelerate the accuracy and efficiency of security testing by the development community, regardless of their security expertise.

According to IBM’s 2010 mid-year X-Force Trend Report, 55 percent of all vulnerabilities come from Web applications, making it the greatest source of risk for organisations. The research indicates that computer security threats rose by 36 percent in the first half of 2010, resulting in more than 4,000 new vulnerabilities being documented compared to last year.

Web applications are often vulnerable due to a lack of built-in security. To reduce these risks, organisations need to implement security strategies that ensure applications are designed securely across the entire development lifecycle, from start to finish, IBM said in a press release. Finding ways to extend security analysis across more testers in the security process and employing multiple testing techniques should result in higher-quality and more secure applications

“As vulnerabilities become more prevalent, testing across the entire development lifecycle without having to invest in additional development resources and skills is significant for the bottom line,” said Steve Robinson, general manager of IBM Security Solutions. “Through the ongoing value brought by the acquisitions of Ounce Labs and Watchfire, combined with our R&D expertise, we can now provide more comprehensive security governance, collaboration and risk management solutions that further protect organisations from malicious attacks.”

Meanwhile, the new advancements in the IBM Rational AppScan portfolio simplify and automate security scanning with new hybrid analysis capabilities, improving vulnerability identification and remediation. The hybrid analysis provides automated correlation of results from static code and dynamic analysis to increase vulnerability identification in automated software.

Enhancements to the IBM Rational AppScan portfolio include a consolidated view of vulnerabilities with hybrid analysis reporting, broader scanning access to identify blind spots, a simplified security assessment process, and support for multiple frameworks.

In addition, IBM announced support for federal security protocol, CAC/PKI, for the IBM Rational Software portfolio. The CAC/PKI protocol enhances the ability of governments to prevent unauthorised access to physical and digital environments, compromising the security of military and national initiatives. IBM provides a full range of services for the detailed design, development and implementation of smartcard/biometrics and CAC/PKI implementations as part of the efforts to deliver full software lifecycle support of CAC/PKI and other security protocols.

Darryl K. Taft

Darryl K. Taft covers IBM, big data and a number of other topics for TechWeekEurope and eWeek

Recent Posts

Apple, Google Mobile Ecosystems Should Be Investigated, CMA Told

CMA receives 'provisional recommendation' from independent inquiry that Apple,Google mobile ecosystem needs investigation

3 hours ago

Australia Rejects Elon Musk Claim About Social Media Ban For Under-16s

Government minister flatly rejects Elon Musk's “unsurprising” allegation that Australian government seeks control of Internet…

6 hours ago

Northvolt Files For Bankruptcy Protection In US

Northvolt files for Chapter 11 bankruptcy protection in the United States, and CEO and co-founder…

7 hours ago

UK’s CMA Readies Cloud Sector “Behavioural” Remedies – Report

Targetting AWS, Microsoft? British competition regulator soon to announce “behavioural” remedies for cloud sector

23 hours ago

Former Policy Boss At X, Nick Pickles, Joins Sam Altman Venture

Move to Elon Musk rival. Former senior executive at X joins Sam Altman's venture formerly…

1 day ago

Bitcoin Rises Above $96,000 Amid Trump Optimism

Bitcoin price rises towards $100,000, amid investor optimism of friendlier US regulatory landscape under Donald…

1 day ago