IBM Application Security Solution - Sogeti Finland · IBM AppScan uses various techniques to find...

22
© 2015 IBM Corporation Manage your application security risk Charles Tostain Application Security Sales Leader for Europe Victor Grane Application Security Technical Specialist IBM Security May 12, 2016 IBM Application Security Solution

Transcript of IBM Application Security Solution - Sogeti Finland · IBM AppScan uses various techniques to find...

Page 1: IBM Application Security Solution - Sogeti Finland · IBM AppScan uses various techniques to find vulnerabilities Static Analysis - Analyze Source Code - Use during development -

© 2015 IBM Corporation

Manage your application security risk

Charles TostainApplication Security Sales Leader for Europe

Victor GraneApplication Security Technical Specialist

IBM Security

May 12, 2016

IBM Application Security Solution

Page 2: IBM Application Security Solution - Sogeti Finland · IBM AppScan uses various techniques to find vulnerabilities Static Analysis - Analyze Source Code - Use during development -

2© 2015 IBM Corporation

SQL injection: Still reliable for breaching applications

Attack types XSS Heart-

bleed

Physical

access

Brute

force

Misconfig. Watering

hole

Phishing SQLi DDoS Malware Un-

disclosed

Sampling of security incidents by attack type, time and impactJanuary February March April May June July August September October November December

Source: IBM X-Force Threat Intelligence Quarterly 1Q 2015

SQL injection accounted for 8.1% of attacks

Page 3: IBM Application Security Solution - Sogeti Finland · IBM AppScan uses various techniques to find vulnerabilities Static Analysis - Analyze Source Code - Use during development -

3© 2015 IBM Corporation

Application security spending

Source: The State of Risk-Based Security Management, Research Study by Ponemon Institute, 2013

Where are your “security risks” versus your “spend”?

Security Risk

SpendingSpend ≠ Risk

35% -

30% -

25% -

20% -

15% -

10% -

5% -

Application

Layer

Data

Layer

Network

Layer

Human

Layer

Host

Layer

Physical

Layer

Many clients do not prioritize application security in their environments

Page 4: IBM Application Security Solution - Sogeti Finland · IBM AppScan uses various techniques to find vulnerabilities Static Analysis - Analyze Source Code - Use during development -

4© 2015 IBM Corporation

Find during

Development

$80/defect

Find during

Build

$240/defect

Find during QA/Test

$960/defect

Find in Production

$7,600 / defect

** Source: Ponemon Institute 2009-10* Source: National Institute of Standards and Technology

The Old Story – Still Valid But There’s More….

Page 5: IBM Application Security Solution - Sogeti Finland · IBM AppScan uses various techniques to find vulnerabilities Static Analysis - Analyze Source Code - Use during development -

5© 2015 IBM Corporation

IBM AppScan uses various techniques to find vulnerabilities

Static Analysis

- Analyze Source Code

- Use during

development

- Uses Taint Analysis /

Pattern Matching

Dynamic Analysis

- Correlate Dynamic and

Static results

- Assists remediation by

identification of line of code

Hybrid Analysis

- Analyze Live Web Application

- Use during testing

- Uses HTTP tampering

Client-Side Analysis

- Analyze downloaded Javascript

code which runs in client

- Unique in the industry

Run-Time Analysis

- Combines Dynamic Analysis

with run-time agent

- More results, better accuracy

Total Potential

Security Issues

Page 6: IBM Application Security Solution - Sogeti Finland · IBM AppScan uses various techniques to find vulnerabilities Static Analysis - Analyze Source Code - Use during development -

6© 2015 IBM Corporation

SaaS

Flexible AppScan deployment solutionsAdopt individually or combine to meet your unique needs ADAPTABLE

On-Premise Managed Service

Testing focus

• Simple

• Self service

• Quick results

Program management

• Skilled expertise

• Guided remediation

Custom program

• Scalable

• Customizable

• Comprehensive

IBM Security

AppScanIBM / Sogeti

IBM Application

Security on Cloud

Page 7: IBM Application Security Solution - Sogeti Finland · IBM AppScan uses various techniques to find vulnerabilities Static Analysis - Analyze Source Code - Use during development -

© 2015 IBM Corporation

But analysis is not enough…

Page 8: IBM Application Security Solution - Sogeti Finland · IBM AppScan uses various techniques to find vulnerabilities Static Analysis - Analyze Source Code - Use during development -

8© 2015 IBM Corporation

But analysis is not enough: It’s all about managing risk…

IT

Help

Online

Product Catalog

Employee

Travel Site

Online

Store

Business

Impact

Low Medium High Critical

Vulnerabilities

(2) Medium

Session identifier

not updated

(2) High

SQL

injection

(1) Medium

Open

redirect

(1) High

SQL

injection

Application

Security RiskLOW HIGH MEDIUM VERY HIGH

“Security has and will always be about understanding, managing,

and mitigating the risk to an organization’s most critical assets.”

Advanced Persistent Threat, Understanding the Danger and

How to Protect Your Organization, by Dr. Eric Cole, SANS Institute

Internal

External

Sensitive data

Page 9: IBM Application Security Solution - Sogeti Finland · IBM AppScan uses various techniques to find vulnerabilities Static Analysis - Analyze Source Code - Use during development -

9© 2015 IBM Corporation

Page 10: IBM Application Security Solution - Sogeti Finland · IBM AppScan uses various techniques to find vulnerabilities Static Analysis - Analyze Source Code - Use during development -

10© 2015 IBM Corporation

Utilize resources effectively to identify and mitigate risk

Database

Activity

Monitoring

Web

Application

FirewallSIEM

Mobile

Application

Protection

Monitor and ProtectDeployed Applications

Intrusion

Prevention

Static

Analysis

Dynamic

Analysis

Mobile

Application

Analysis

Interactive

Analysis

TestApplications in Development

Application Security Management

Business Impact

Assessment

Asset

InventoryCompliance

Determination

Status and Progress

Measurement

Vulnerability

Prioritization

IBM Application Security FrameworkHOLISTIC

Page 11: IBM Application Security Solution - Sogeti Finland · IBM AppScan uses various techniques to find vulnerabilities Static Analysis - Analyze Source Code - Use during development -

© 2015 IBM Corporation

Looking at application security in the Cloud

Page 12: IBM Application Security Solution - Sogeti Finland · IBM AppScan uses various techniques to find vulnerabilities Static Analysis - Analyze Source Code - Use during development -

12© 2015 IBM Corporation

IBM Application Security on CloudEasy as 1, 2, 3!

Simple

Does my application contain security vulnerabilities?

Enter URL /

upload application

Scan the

application

2

Review

the report

31

Page 13: IBM Application Security Solution - Sogeti Finland · IBM AppScan uses various techniques to find vulnerabilities Static Analysis - Analyze Source Code - Use during development -

13© 2015 IBM Corporation

Combine leading technology with the benefit of the cloud

IFA (Intelligent Findings Analytics,

reduce false positive)

IR(Intermediate Representation,

don’t send your code to cloud)

EASY (Simple configuration, Fast

Scans, Easy integration)

SDLC(Integration into SWG Dev

Lifecycle)

Page 14: IBM Application Security Solution - Sogeti Finland · IBM AppScan uses various techniques to find vulnerabilities Static Analysis - Analyze Source Code - Use during development -

14© 2015 IBM Corporation

IBM Application Security on Cloud – Analyzing a mobile application - Demo

Scan the

application

2

Upload a mobile

application

Review

the report

31

Page 15: IBM Application Security Solution - Sogeti Finland · IBM AppScan uses various techniques to find vulnerabilities Static Analysis - Analyze Source Code - Use during development -

15© 2015 IBM Corporation

IBM Application Security on Cloud - Video

Page 16: IBM Application Security Solution - Sogeti Finland · IBM AppScan uses various techniques to find vulnerabilities Static Analysis - Analyze Source Code - Use during development -

© 2015 IBM Corporation

Summary of Application Security at IBM and Sogeti

Page 17: IBM Application Security Solution - Sogeti Finland · IBM AppScan uses various techniques to find vulnerabilities Static Analysis - Analyze Source Code - Use during development -

17© 2015 IBM Corporation

The Forrester WaveTM:

Application Security, Tyler Shields

“IBM’s focus on the developer

integration leads to exceptional

results. The IBM product offering

provides extensive general features

on both on-premises and on-demand

application security solutions,

depending on customer needs.”

IBM positioned in “Leaders” category in The Forrester WaveTM

The Forrester Wave™ is copyrighted by Forrester Research, Inc. Forrester and Forrester Wave™ are trademarks of Forrester Research, Inc. The Forrester Wave™ is a graphical representation of Forrester's call

on a market and is plotted using a detailed spreadsheet with exposed scores, weightings, and comments. Forrester does not endorse any vendor, product, or service depicted in the Forrester Wave. Information is

based on best available resources. Opinions reflect judgment at the time and are subject to change.

Page 18: IBM Application Security Solution - Sogeti Finland · IBM AppScan uses various techniques to find vulnerabilities Static Analysis - Analyze Source Code - Use during development -

18© 2015 IBM Corporation

The benefits of IBM and Sogeti application security in three points

Save IT resources – Optimize the security work of Developers, QA and Security Analysts

thus lowering development cost

Business Operation Efficiency – Reduce the risk of application outages and loss of critical

information

Flexible solutions – Take advantage of solutions delivered as On-premises, Cloud and/or

Managed Services

Page 19: IBM Application Security Solution - Sogeti Finland · IBM AppScan uses various techniques to find vulnerabilities Static Analysis - Analyze Source Code - Use during development -

© 2015 IBM Corporation

Test Data Management andService Virtualization

Page 20: IBM Application Security Solution - Sogeti Finland · IBM AppScan uses various techniques to find vulnerabilities Static Analysis - Analyze Source Code - Use during development -

21© 2015 IBM Corporation

Test data Management Service Virtualization

JASON MICHAELS

ROBERT SMITH

Simulate interfaces so you can test when you

want.

Test Virtualization Server

Page 21: IBM Application Security Solution - Sogeti Finland · IBM AppScan uses various techniques to find vulnerabilities Static Analysis - Analyze Source Code - Use during development -

© Copyright IBM Corporation 2015. All rights reserved. The information contained in these materials is provided for informational purposes only, and is provided AS IS without warranty of any

kind, express or implied. IBM shall not be responsible for any damages arising out of the use of, or otherwise related to, these materials. Nothing contained in these materials is intended to, nor

shall have the effect of, creating any warranties or representations from IBM or its suppliers or licensors, or altering the terms and conditions of the applicable license agreement governing the use

of IBM software. References in these materials to IBM products, programs, or services do not imply that they will be available in all countries in which IBM operates. Product release dates and / or

capabilities referenced in these materials may change at any time at IBM’s sole discretion based on market opportunities or other factors, and are not intended to be a commitment to future product

or feature availability in any way. IBM, the IBM logo, and other IBM products and services are trademarks of the International Business Machines Corporation, in the United States, other countries

or both. Other company, product, or service names may be trademarks or service marks of others.

Statement of Good Security Practices: IT system security involves protecting systems and information through prevention, detection and response to improper access from within and outside

your enterprise. Improper access can result in information being altered, destroyed, misappropriated or misused or can result in damage to or misuse of your systems, including for use in attacks

on others. No IT system or product should be considered completely secure and no single product, service or security measure can be completely effective in preventing improper use or access.

IBM systems, products and services are designed to be part of a lawful, comprehensive security approach, which will necessarily involve additional operational procedures, and may require other

systems, products or services to be most effective. IBM DOES NOT WARRANT THAT ANY SYSTEMS, PRODUCTS OR SERVICES ARE IMMUNE FROM, OR WILL MAKE YOUR ENTERPRISE

IMMUNE FROM, THE MALICIOUS OR ILLEGAL CONDUCT OF ANY PARTY.

THANK YOUwww.ibm.com/security

Page 22: IBM Application Security Solution - Sogeti Finland · IBM AppScan uses various techniques to find vulnerabilities Static Analysis - Analyze Source Code - Use during development -

Information concerning non-IBM products was obtained from the suppliers of those products, their published announcements or other publicly available sources. IBM has not tested those products in connection with this publication and cannot confirm the accuracy of performance, compatibility or any other claims related to non-IBM products. Questions on the capabilities of non-IBM products should be addressed to the suppliers of those products. IBM does not warrant the quality of any third-party products, or the ability of any such third-party products to interoperate with IBM’s products. IBM EXPRESSLY DISCLAIMS ALL WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE.

The provision of the information contained herein is not intended to, and does not, grant any right or license under any IBM patents, copyrights, trademarks or other intellectual property right.

Other company, product, or service names may be trademarks or service marks of others. A current list of IBM trademarks is available at “Copyright and trademark information” www.ibm.com/legal/copytrade.shtml

Copyright © 2015 by International Business Machines Corporation (IBM). No part of this document may be reproduced or transmitted in any form without written permission from IBM.

U.S. Government Users Restricted Rights – Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM.

Information in these presentations (including information relating to products that have not yet been announced by IBM) has been reviewed for accuracy as of the date of initial publication and could include unintentional technical or typographical errors. IBM shall have no responsibility to update this information. THIS document is distributed "AS IS" without any warranty, either express or implied. In no event shall IBM be liable for any damage arising from the use of this information, including but not limited to, loss of data, business interruption, loss of profit or loss of opportunity.

IBM products and services are warranted according to the terms and conditions of the agreements under which they are provided.

Any statements regarding IBM’s future direction, intent or product plans are subject to change or withdrawal without notice. Performance data contained herein was generally obtained in a controlled, isolated environments. Customer examples are presented as illustrations of how those customers have used IBM products and the results they may have achieved. Actual performance, cost, savings or other results in other operating environments may vary. References in this document to IBM products, programs, or services does not imply that IBM intends to make such products, programs or services available in all countries in which IBM operates or does business.

Workshops, sessions and associated materials may have been prepared by independent session speakers, and do not necessarily reflect the views of IBM. All materials and discussions are provided for informational purposes only, and are neither intended to, nor shall constitute legal or other guidance or advice to any individual participant or their specific situation.

It is the customer’s responsibility to insure its own compliance with legal requirements and to obtain advice of competent legal counsel as to the identification and interpretation of any relevant laws and regulatory requirements that may affect the customer’s business and any actions the customer may need to take to comply with such laws. IBM does not provide legal advice or represent or warrant that its services or products will ensure that the customer is in compliance with any law.

Legal notices and disclaimers