arx

Results 1 - 25 of 34Sort Results By: Published Date | Title | Company Name
Published By: CheckMarx     Published Date: Mar 04, 2020
https://info.checkmarx.com/wp-financial-services-china?utm_source=madisonlogic&utm_medium=content%20syndication &utm_search_query=WP-CX-Financial-Services&utm_campaign=FinServAPAC
Tags : 
    
CheckMarx
Published By: CheckMarx     Published Date: Mar 04, 2020
https://info.checkmarx.com/wp-financial-services-japan?utm_source=madisonlogic&utm_medium=content%20syndication &utm_search_query=WP-CX-Financial-Services&utm_keyword=&utm_campaign=FinServAPAC
Tags : 
    
CheckMarx
Published By: CheckMarx     Published Date: Mar 04, 2020
https://info.checkmarx.com/wp-financial-services-korea?utm_source=madisonlogic&utm_medium=content%20syndication &utm_search_query=WP-CX-Financial-Services&utm_campaign=FinServAPAC
Tags : 
    
CheckMarx
Published By: CheckMarx     Published Date: May 11, 2020
http://mediaadvanceb2b.com/LandingPage/gartner/2.html
Tags : 
    
CheckMarx
Published By: CheckMarx     Published Date: May 11, 2020
http://mediaadvanceb2b.com/LandingPage/gartner/1.html
Tags : 
    
CheckMarx
Published By: CheckMarx     Published Date: May 11, 2020
http://mediaadvanceb2b.com/LandingPage/gartner/3.html
Tags : 
    
CheckMarx
Published By: CheckMarx     Published Date: Oct 29, 2019
https://technews.onlinetechreports.com/Technews/Checkmarx-TheWay.html
Tags : 
    
CheckMarx
Published By: CheckMarx     Published Date: Oct 29, 2019
https://technews.onlinetechreports.com/Technews/Checkmarx-SoftwareDevelopment.html
Tags : 
    
CheckMarx
Published By: CheckMarx     Published Date: May 11, 2020
This Critical Capabilities guide provides application security testing (AST) tool buyers with vendor rankings for five common use cases, based on relevant evaluation criteria. Buyers can view vendor rankings for each use case to help formulate lists of vendors that, based on Gartner assessments, are well-suited based on product capabilities to address a given use case. Using the online interactive tool, buyers can also formulate custom use cases, and corresponding vendor rankings, where predefined use cases do not offer an appropriate match to an organization’s specific requirements. Using scoring for specific capabilities, buyers can also identify vendors with a product offering that is well-suited for a specific function, such as analysis of mobile applications or APIs.
Tags : 
    
CheckMarx
Published By: CheckMarx     Published Date: Mar 04, 2020
Financial services organizations operate under a host of regulatory standards. This makes sense, as the assets and information managed by these firms are valuable, sensitive, and targeted by sophisticated cyber attackers daily. Compounding these challenges is the large volume of personally identifiable information (PII) that financial organizations handle regularly. PII is subject to many compliance regulations, notably the General Data Protection Regulation (GDPR), which regulates not only the processing of personal data, including PII, relating to individuals in the EU, for also any organization that processes personal data of EU residents. For US banking consumers, Section 5 (Unfair or Deceptive Acts or Practices) of the Federal Trade Commission Act and numerous state regulations enforce basic consumer protections, which financial organizations must also uphold.
Tags : 
    
CheckMarx
Published By: CheckMarx     Published Date: Mar 09, 2020
Finanzdienstleister unterliegen strengen regulatorischen Vorgaben – und das zu Recht: Die Assets und Informationen, die von ihnen verarbeitet werden, sind wertvoll und sensible und stehen täglich im Visier von Angreifern. Die von Fintech- Unternehmen verarbeiteten personenbezogenen Daten (PII) unterliegen daher strengen Compliance-Bestimmungen wie dem Gramm-Leach-Bliley Act (GLBA), den Payment Card Industry Data Security Standards (PCI DSS) und dem Sarbanes-Oxley Act. Von zentraler Bedeutung ist auch die Datenschutzgrundverordnung (DSGVO), die den Umgang mit personenbezogenen Daten von EU-Bürgern regelt. Finanzdienstleister, die für US-amerikanische Bankkunden tätig sind, müssen darüber hinaus die Einhaltung von Absatz 5 (Unfair or Deceptive Acts or Practices) des Federal Trade Commission Acts und weiterer Verbraucherschutzvorgaben auf US-bundesstaatlicher Ebene im Blick behalten.
Tags : 
    
CheckMarx
Published By: CheckMarx     Published Date: May 06, 2020
Download the May 2020 report to learn: Why Gartner placed Checkmarx in the Leaders’ quadrant Where Checkmarx placed among application security competitors and why Whether your organization has the right solutions in place to reduce software risk The Checkmarx Software Security Platform is used by more than 40% of Fortune 100 companies, and by government organizations around the globe.
Tags : 
    
CheckMarx
Published By: CheckMarx     Published Date: May 11, 2020
To be replaced with German-language summary once obtained: Download the May 2020 report to learn: Why Gartner placed Checkmarx in the Leaders’ quadrant Where Checkmarx placed among application security competitors and why Whether your organization has the right solutions in place to reduce software risk The Checkmarx Software Security Platform is used by more than 40% of Fortune 100 companies, and by government organizations around the globe.
Tags : 
    
CheckMarx
Published By: CheckMarx     Published Date: Jun 21, 2019
DevSecOps, modern web application design and high-profile breaches are expanding the scope of the AST market. Security and risk management leaders will need to meet tighter deadlines and test more complex applications by accelerating efforts to integrate and automate AST in the software life cycle.
Tags : 
    
CheckMarx
Published By: CheckMarx     Published Date: Nov 02, 2018
As DevOps continues to be widely adopted by fast-moving organizations, software security needs to keep pace to help accelerate software delivery and not slow it down. Is your software security program up to the challenge? By integrating security into the entire software development lifecycle, enterprises can manage their business risk and guarantee secure software delivery at the speed of DevOps. Check out these 10 Essential Best Practices for building and maintaining your modern-day software security program -- from your tools, to your processes, to your people. This eBook will cover the top 10 steps you can take today to help your organization move faster and more securely.
Tags : 
    
CheckMarx
Published By: CheckMarx     Published Date: Nov 02, 2018
In today’s era of digital transformation, time-to-market is the new name of the game, and DevOps is changing the way software is built. As developers have taken on a much larger role in the software development lifecycle, including developing secure code, building containers and ensuring quality, security cannot be separated from DevOps and engineering. Unfortunately, traditional software security testing tools have operated in isolation and have forced developers to change the way they work. Checkmarx, however, has developed a more agile and responsive solution: Checkmarx’ Software Exposure Platform. Taking a holistic, platform-centric approach, the platform builds security in from the beginning, supporting all stages of the software development lifecycle, allowing enterprises to deliver secure software at the speed of DevOps while mitigating their business risk. Download the white paper Delivering Secure Software at the Speed of DevOps to learn how Checkmarx provides the combinatio
Tags : 
    
CheckMarx
Published By: CheckMarx     Published Date: Nov 02, 2018
Dinosaurs are super cool, but there are some places where dinosaurs don’t belong, and one of those is in your fast-paced DevOps environment. We’re in a new world where traditional security solutions no longer make the cut. Software is increasingly complex, and when deployed at the speed of DevOps, it creates a new type of risk: Software Exposure. Legacy application security tools are too big, too slow, and too clunky to deliver the innovation needed to protect your customers in the 21st century. The Software Exposure Platform from Checkmarx is an entirely new species heralding the next generation of software security. The platform builds security in from the beginning, supporting all stages of the software development lifecycle, allowing enterprises to deliver secure software at the speed of DevOps while mitigating their business risk. Download the white paper The Demise of the AppSec Dinosaur to learn how Checkmarx provides the combination of integrations and automation required in
Tags : 
    
CheckMarx
Published By: CheckMarx     Published Date: Jun 07, 2019
Artificial Intelligence (AI) software is everywhere being leveraged by many industries such as healthcare, fintech, and e-commerce. But how does AI impact the security space? Join Maty Siman, Checkmarx Founder and CTO, to get both a white hat and black hat perspective to AI and security.
Tags : 
    
CheckMarx
Published By: CheckMarx     Published Date: Jun 07, 2019
Data breaches continuing to make the headlines and enterprises are no longer questioning "if" a breach will occur, but "when." With the organization's data assets and reputation at stake, having a breach response plan in place is becoming increasingly important. Join security thought leaders and experts for an interactive Q&A to learn more about: - Today’s cybersecurity threat landscape - The true costs of a breach - Preventing breaches: Key factors to consider - Why early breach detection is critical - How to develop an effective incident response plan and get C-Suite buy-in - How to keep your company secure in 2019"
Tags : 
    
CheckMarx
Published By: CheckMarx     Published Date: Apr 03, 2019
Following a paper released by the US Department of Homeland Security, software security is fundamentally a software engineering issue that must be addressed systematically throughout the software development lifecycle.
Tags : 
    
CheckMarx
Published By: CheckMarx     Published Date: Apr 03, 2019
We live in an era of digital transformation. Software is the backbone of this digital transformation. Mobile, cloud, open source, Internet of Things, microservices and AI have made software more complex. Over 80% of the code in today’s software applications is open source. Estimates show that there will be 30 billion connected IOT devices by 2020. Furthermore, 85% of customer interactions will be computer managed by 2020. Software is everywhere. While software has gotten more complex, timeto-market is the new name of the game and enterprises can’t risk security slowing this down.
Tags : 
    
CheckMarx
Published By: CheckMarx     Published Date: Apr 03, 2019
In the early years of software development, you would often design it, build it, and only then think about how to secure it. This was arguably fine in the days of monolithic applications and closed networks, when good perimeter-based protection and effective identity and access management would get you a long way towards minimising the risk. In today’s highly connected, API-driven application environments, however, any given software component or service can be invoked and potentially abused in so many different ways. Add to this the increasing pace of change through iterative ‘DevOps-style’ delivery and ever-faster release cycles, and many understandably assert that security management and assurance nowadays needs to be an ongoing and embedded part of the development and delivery process.
Tags : 
    
CheckMarx
Published By: CheckMarx     Published Date: Apr 03, 2019
Dinosaurs are super cool. That’s an indisputable fact. There are some places though, where dinosaurs don’t belong, and one of those is in your fast-paced DevOps environment. Early on, in the days before DevOps and Continuous Integration, one of the original players in the AppSec space produced an early SAST tool, offering a wide variety of supported languages, and they quickly built name recognition and a large install base of customers. Yet, 15 years and two acquisitions later, that company has become a software dinosaur – a mere relic – maintaining a product that is too big, too slow, and too clunky to deliver the innovation needed to protect its customers in the 21st century.
Tags : 
    
CheckMarx
Published By: CheckMarx     Published Date: Apr 03, 2019
As new code deployments accelerate through wider adoption of DevOps methodology, maintaining software security is crucial to you and your customers. Is your software security program up to the challenge? If you’re not getting the most out of your software security program, our security experts may be able to diagnose your difficulties. We’ve created a list of specific recommendations on how to improve your program for better, faster results. We present to you “How to make your software security program successful: 10 Essential Best Practices.”
Tags : 
    
CheckMarx
Published By: CheckMarx     Published Date: Sep 25, 2019
Looking for a new Application Security Testing vendor? See what customers have to say about Checkmarx and why we were named a June 2019 Customers’ Choice for Application Security Testing on Gartner Peer Insights!
Tags : 
    
CheckMarx
Previous   1 2    Next    
Search      

Add Research

Get your company's research in the hands of targeted business professionals.