View all newsletters
Receive our newsletter - data, insights and analysis delivered to you
  1. Technology
  2. Software
February 21, 2010

Fortify Software debuts hybrid security analysis technology

Allows users to improve visibility into security risks, increase test accuracy and produce secure web applications

By CBR Staff Writer

Fortify Software, a provider of Software Security Assurance (SSA) offerings, has debuted hybrid security analysis technology for testing web applications.

Fortify Software claims that the Hybrid 2.0, developed in collaboration with HP, enables teams across the application lifecycle to improve visibility into security risks, increase test accuracy and produce secure web applications through new advances in correlating static and dynamic testing results.

Using correlation techniques, the Hybrid 2.0 connects penetration test results directly to source code analysis results revealing hidden vulnerability relationships and exposing root cause within the application source code. It allows security professionals and development teams to identify and prioritise vulnerabilities, and investigate and remediate security defects in the source code.

The new technology is offered through the integrated offerings of HP Assessment Management Platform (AMP), Fortify Source Code Analysis (SCA) and Program Trace Analyser (PTA). It provides insight into application security by making visible the connection between issues discovered through dynamic and static testing mechanism, Fortify Software said.

Content from our partners
Scan and deliver
GenAI cybersecurity: "A super-human analyst, with a brain the size of a planet."
Cloud, AI, and cyber security – highlights from DTX Manchester

Barmak Meftah, chief products officer at Fortify Software, said: Our next generation hybrid analysis technology offers customers a dramatic step forward in achieving their software security assurance goals.

“While other vendors offer point solutions or first-generation capabilities, Fortify and HP are delivering integrated technologies that enable businesses to more effectively reduce risk associated with insecure web applications.

Websites in our network
Select and enter your corporate email address Tech Monitor's research, insight and analysis examines the frontiers of digital transformation to help tech leaders navigate the future. Our Changelog newsletter delivers our best work to your inbox every week.
  • CIO
  • CTO
  • CISO
  • CSO
  • CFO
  • CDO
  • CEO
  • Architect Founder
  • MD
  • Director
  • Manager
  • Other
Visit our privacy policy for more information about our services, how Progressive Media Investments may use, process and share your personal data, including information on your rights in respect of your personal data and how you can unsubscribe from future marketing communications. Our services are intended for corporate subscribers and you warrant that the email address submitted is your corporate email address.