Veracode, Inc. Company SummaryWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
Company Summary
Veracode, Inc.

Overview: Veracode is the leader for on-demand application security testing solutions. Veracode provides organizations with the only automated and independent security assessment across your entire application portfolio without exposing a company's source code.

KnowledgeStorm's detailed company reports contain important information including: stock symbols, company size, addresses, and more. You may access this additional information about this company by viewing one of the detailed solution reports or research abstracts listed below.

Solutions offered by Veracode, Inc..
Research offered by Veracode, Inc.

Automating Your Code Review: Moving to a SaaS Model for Application Security by Veracode, Inc.. February 10, 2009 - Today’s application has become the enterprise’s ‘‘new perimeter’’. With better network‐level security technology hardening the network perimeter, malicious attackers are now focusing their efforts to strike at the least defended points ‐ the application. Read on to learn about automating code review for greater application security.

  View Automating Your Code Review: Moving to a SaaS Model for Application Security research abstract

Avoiding the SANS Top 25 Most Dangerous Programming Errors by Veracode, Inc.. February 01, 2010 - The SANS/CWE list of the Top 25 Most Dangerous Programming Errors is already becoming the "standard" for developing secure applications in many large enterprises. In this webcast, review the prevalence of attacks that use vulnerabilities listed in the Top 25 and learn how to safeguard your code to avoid the most dangerous programming errors.

  View Avoiding the SANS Top 25 Most Dangerous Programming Errors research abstract

Barclays Application Security Assurance Project by Veracode, Inc.. February 17, 2011 - As threats within the corporate information security landscape intensify, this award is geared to recognizing excellence in IT security projects within the financial sector.

  View Barclays Application Security Assurance Project research abstract

Basic Building Blocks: Preparing for PCI DSS 2.0 by Veracode, Inc.. October 04, 2010 - With their own reputation and brands at risk, merchants and service providers must secure applications from potential vulnerabilities to comply with PCI DSS standards.

  View Basic Building Blocks: Preparing for PCI DSS 2.0 research abstract

Dirty Little Secrets: Mobile Apps Invading Your Privacy by Veracode, Inc.. July 27, 2011 - Join Tyler Shields, Senior Security Researcher at Veracode, as he discusses the evolving mobile security threat landscape and shares real-world examples of how your data is being used (or misused) in some of the most popular mobile applications.

  View Dirty Little Secrets: Mobile Apps Invading Your Privacy research abstract

Disclosures 2012 - The Vulnerability of Publicly Traded Companies by Veracode, Inc.. May 23, 2012 - In a recently-released State of Software Security featured supplement, Veracode examines the software security posture of public companies and the material risks they face due to the weaknesses in their software applications. This webinar uses Veracode data to examine how public companies manage the risks inherited from software.

  View Disclosures 2012 - The Vulnerability of Publicly Traded Companies research abstract

Eradicate Cross-Site Scripting by Veracode, Inc.. February 28, 2011 - The rise of e-commerce has generated a concurrent surge of Internet crime into a multi-billion-a-year industry, as criminals follow the money, the countless potential online victims and the vulnerability of web applications to easy exploitation.

  View Eradicate Cross-Site Scripting research abstract

Expert guide to understanding SaaS and cloud computing issues by Veracode, Inc.. December 21, 2011 - This expert E-Guide discusses what is involved with a SaaS transition and how you can prepare. Uncover top considerations, potential cloud computing issues and how you can tackle them.

  View Expert guide to understanding SaaS and cloud computing issues research abstract

Five Steps to Secure Outsourced Application Development by Veracode, Inc.. February 10, 2009 - Application security has risen to the top of the agenda for security professionals striving to control their overall risk profile. According to US Computer Emergency Response Team (US-CERT) and Gartner, 75% of new attacks target the application layer and software vulnerabilities have reached...

  View Five Steps to Secure Outsourced Application Development research abstract

Five Steps to Secure Outsourced Application Development by Veracode, Inc.. May 10, 2010 - Application security has become a top concern for security professionals striving to control their company’s overall risk profile. Meanwhile, companies are also saving money by outsourcing more and more custom code creation. This white paper outlines five best practices that enterprises can use to secure their outsourced application development.

  View Five Steps to Secure Outsourced Application Development research abstract

IT Risk Management: Guide to Software Risk Assessments and Audits by Veracode, Inc.. June 07, 2010 - Risk is a function of the likelihood that a potential vulnerability will be exploited, and the resulting impact of that exploitation. In IT systems, risk can be introduced from the internet, servers, networks, malicious insiders, and even lapses in physical security. This whitepaper provides IT risk management best practices.

  View IT Risk Management: Guide to Software Risk Assessments and Audits research abstract

Magic Quadrant for Static Application Security Testing by Veracode, Inc.. February 17, 2011 - In this research, we analyze the evolution of the static application security testing market, and evaluate its vendors according to their business and technology vision, as well as their ability to execute against that vision in their products and services.

  View Magic Quadrant for Static Application Security Testing research abstract

Musings on the PSN Attack Vector by Veracode, Inc.. July 27, 2011 - Recently, there has been a lot of commentary around the breach of Sony’s PlayStation Network. Sadly, there has been no good discussion of how PSN was breached. Join Veracode's Security Researcher, Chris Lytle, as he explores the rumors in the marketplace regarding the Sony breach, and discusses the "probable vs. "possible" attack vectors.

  View Musings on the PSN Attack Vector research abstract

Protecting Your Applications from Backdoors: How Static Binary Analysis Helps Build High-Assurance Applications by Veracode, Inc.. May 10, 2010 - Backdoors pose operational risk to software that is too significant for organizations to ignore. Binary-level application testing (also called compiled-code analysis) makes it possible to examine the entire application in its final “as delivered” form. Read this white paper to learn more about protecting applications from backdoor vulnerabilities.

  View Protecting Your Applications from Backdoors: How Static Binary Analysis Helps Build High-Assurance Applications research abstract

State of Software Security Report by Veracode, Inc.. February 28, 2011 - The State of Software Security is a semi-annual report that draws on continuously updated information in Veracode’s cloud-based application risk management services platform. Unlike a survey, the data comes from actual code-level analysis of billions of lines of code and thousands of applications.

  View State of Software Security Report research abstract

State of Software Security Report Volume 4 by Veracode, Inc.. December 07, 2011 - Version 4 of the State of Software Security is a semi-annual report that analyzes and examines the emerging trends associated with vulnerabilities in applications, whether they are internally developed or procured from third parties such as outsourcers or commercial software vendors.

  View State of Software Security Report Volume 4 research abstract

The Mobile App Top 10 Risks by Veracode, Inc.. February 15, 2011 - This expert webcast reveals the top 10 mobile application risks facing organizations today.

  View The Mobile App Top 10 Risks research abstract

Top 10 Mobile Application Risks by Veracode, Inc.. May 11, 2012 -

In this presentation, Veracode’s Vice President of Security Research, Chris Eng, will outline the Top 10 Mobile Application Risks, designed to educate developers and security professionals about the mobile application behavior – both maliciously- designed or inadvertent – putting users at risk.

  View Top 10 Mobile Application Risks research abstract

Understanding the risks of mobile apps by Veracode, Inc.. May 11, 2012 - Many of the risks of moble devices are similar to those of traditional spyware, Trojan software, and insecurely designed apps. However, mobile devices are not just small computers. They are designed around personal and communication functionality which makes the top mobile applications risks different from the top traditional computing risks.

  View Understanding the risks of mobile apps research abstract

Veracode eLearning Subscription by Veracode, Inc.. May 07, 2010 - Veracode’s eLearning contains over 30 hours of secure training content in a web-based training module format. The program is designed specifically for developers and security personnel to meet formal training and competency testing requirements. It also contains a comprehensive knowledgebase on secure software development. Read on to learn more.

  View Veracode eLearning Subscription research abstract

  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts