<iframe src="//www.googletagmanager.com/ns.html?id=GTM-KXSCJR" height="0" width="0" style="display:none;visibility:hidden">

Using Runtime Visibility to Align Application Security with DevOps

Kunal Anand | Apr 5, 2017

 

Download Prevoty's Guide to RASP now!

Continue reading

Topics: Application Security, RASP, Signatures, Language Security, LANGSEC, Runtime Application Self-Protection, Runtime Application Security, information security, signatureless, no signatures, prevoty

How to mitigate vulnerabilities in production that can't be fixed immediately, featuring WhiteHat Security

Audrey Sunu | Sep 19, 2016

In a new webcast, Shift your Application Security Program into Overdrive, Michael Goldgolf of WhiteHat Security and Arpit Joshipura of Prevoty discuss the strains of time-to-remediation on vulnerability management and how to address gaps. The novel solution might surprise you.

Continue reading

Topics: Partnerships & Integrations, SAST, DAST, Runtime Application Self-Protection, Vulnerability remediation, Dynamic Application Security Testing, Static Application Security Testing, WhiteHat Security

What Questions Would a CISO Ask About Prevoty Runtime Security?

Audrey Sunu | Sep 12, 2016

Dr. Edward G. Amoroso, former CISO
of AT&T and now founding CEO of TAG Cyber, is dedicated to advancing the practice of information security and make best-in-class knowledge available to the community of security leaders. In this excerpt from his new three-part report, he interviews Julien Bellanger, CEO and Co-Founder of Prevoty about runtime technologies and the future of application security.

Continue reading

Topics: Application Security, RASP, Industry commentary, AppSec, Runtime Application Self-Protection, Runtime Application Security, TAG Cyber

IANS Helps You Get A Grasp On RASP

Audrey Sunu | Jul 20, 2016

The most frequent question we get about RASP is whether or not it is 'enterprise-grade'. With so much noise and fanfare in the cybersecurity industry, it’s hard to distinguish true, scalable innovation from the rest. New technologies undergo some growing pains and are often met with a healthy dose of skepticism before they are adopted as the norm. 

Prominent information security advisory and consulting firm IANS Research took on the challenge of evaluating the efficacy of Runtime Application Self-Protection (RASP) and recently released a research report called Getting A Grasp On RASP. The report, developed by IANS faculty Paul Asadoorian, provides a much-needed overview of the burgeoning space and parses the pros and cons of these new tools. 

Continue reading

Topics: Application Security, RASP, Runtime Application Self-Protection, Runtime Application Security, IANS Research

The Future of Application Security Depends On Our Infrastructure

Julien Bellanger | Jun 13, 2016

To say that the future of application security depends on our infrastructure may sound controversial -- especially coming from a runtime application security startup founder.

Don’t get me wrong. Our vision is still the same: application security has to be done at the application layer, and more so than ever, that security must be embedded in the application.

Continue reading

Topics: Application Security, RASP, Language Security, LANGSEC, AppSec, Runtime Application Self-Protection, Vulnerability remediation, Runtime Application Security, Infrastructure

Prevoty Turns Three Years Old and Gets a Web Lift

Julien Bellanger | May 9, 2016

Over the last three years, we went from brainstorming crazy ideas at a kitchen table to creating a new category for securing enterprises applications at runtime. We've captured our top 3 learnings in this blog post and have made some exciting new additions to our website. 

Continue reading

Topics: Company News, RASP, Prevoty Technology, DevOps, Language Security, LANGSEC, Runtime Application Self-Protection, Vulnerability remediation, DevSecOps, Runtime Application Security

Why RASP is the Third Pillar of Application Security

Arpit Joshipura | Apr 12, 2016

According to recent research we conducted with the Ponemon Institute, one in two enterprises today admit that they need better application security — demonstrating both the scope and the reality of the problem.

Continue reading

Topics: RASP, Tech Zone, SAST, LANGSEC, DAST, Pattern matching, Runtime Application Self-Protection, Dynamic Application Security Testing, Runtime Application Security, Static Application Security Testing

Why Security & DevOps Can’t Be Friends (Or Can They?)

Kunal Anand | Mar 16, 2016

football.jpegLegacy applications are a brush fire waiting to happen. But retrofitting custom code built in the early 2000's is just a small part of the application security problem.

Security hasn’t changed much in the last 10 years. Companies still use pattern matching and pattern-based defenses which aren’t enough to protect websites and company data from the bad guys. Hackers continuously find unique ways to create fuzzing techniques or to perform fuzzing to create new exploits, and a lot of companies can’t run regular expressions, and most can’t use pattern matching to defeat that. 

In order to protect against cross-site scripting (XSS) or SQL injection (SQLi), why not look at application security through the lens of a web browser or a database engine? What if there was a unique way to solve these problems instead of just solving it at the perimeter? Why don't companies protect from within the application where they have access to contacts and important contextual information? Most say it's lag time, or performance issues that inhibit this kind of solution. But I’m not so sure.

Continue reading

Topics: Application Security, Legacy Apps, DevOps, Language Security, xss, LANGSEC, Pattern matching, Cross-site Scripting, Runtime Application Self-Protection, Vulnerability remediation, Agile Security, fuzzing, DevSecOps, CVE Vulnerabilities, Runtime Application Security, SQL Injections, CSRF

Why LANGSEC for Runtime Application Security? Because Patterns Can't Keep Up

Arpit Joshipura | Mar 10, 2016

Age-old security is broken because it uses antique techniques 

Throughout the past ten years, security methods have remained relatively unchanged. These methods rely solely on signatures, heuristics and dataflow analysis and are focused on defending the networks. The problem is that hackers have learned how to work around predefined network controls. 

The majority of today's firewalls still have to run thousands of patterns to match for known attacks, and false positives and false negatives run high -- making it difficult to determine what is normal. These traditional methods rely on code that is constantly changing. The thing you’re trying to detect is changing because the application itself is always changing, causing solutions to be out of date as soon as they are created.

Continue reading

Topics: WAFs, Startups, Application Security, RASP, Prevoty Technology, Application Security Monitoring, Signatures, Language Security, Innovation, LANGSEC, Heuristics, AppSec, Pattern matching, Cross-site Scripting, Command Injection, Runtime Application Self-Protection, Data Flow Analysis, Vulnerability remediation, SQL Injections, CSRF

Subscribe to Email Updates