Enviar pesquisa
Carregar
Synopsys_site.pptx
•
0 gostou
•
300 visualizações
A
Arthur528009
Seguir
FCBR - https://www.fcbr.com.br
Leia menos
Leia mais
Tecnologia
Denunciar
Compartilhar
Denunciar
Compartilhar
1 de 12
Recomendados
KrishnaToolComparisionPPT.pdf
KrishnaToolComparisionPPT.pdf
QA or the Highway
Static Application Security Testing Strategies for Automation and Continuous ...
Static Application Security Testing Strategies for Automation and Continuous ...
Kevin Fealey
Software Composition Analysis Deep Dive
Software Composition Analysis Deep Dive
Ulisses Albuquerque
Synopsys Security Event Israel Presentation: Keynote: Securing Your Software,...
Synopsys Security Event Israel Presentation: Keynote: Securing Your Software,...
Synopsys Software Integrity Group
DevSecOps: Taking a DevOps Approach to Security
DevSecOps: Taking a DevOps Approach to Security
Alert Logic
SAST vs. DAST: What’s the Best Method For Application Security Testing?
SAST vs. DAST: What’s the Best Method For Application Security Testing?
Cigital
Static Analysis Security Testing for Dummies... and You
Static Analysis Security Testing for Dummies... and You
Kevin Fealey
API Security Survey
API Security Survey
Imperva
Recomendados
KrishnaToolComparisionPPT.pdf
KrishnaToolComparisionPPT.pdf
QA or the Highway
Static Application Security Testing Strategies for Automation and Continuous ...
Static Application Security Testing Strategies for Automation and Continuous ...
Kevin Fealey
Software Composition Analysis Deep Dive
Software Composition Analysis Deep Dive
Ulisses Albuquerque
Synopsys Security Event Israel Presentation: Keynote: Securing Your Software,...
Synopsys Security Event Israel Presentation: Keynote: Securing Your Software,...
Synopsys Software Integrity Group
DevSecOps: Taking a DevOps Approach to Security
DevSecOps: Taking a DevOps Approach to Security
Alert Logic
SAST vs. DAST: What’s the Best Method For Application Security Testing?
SAST vs. DAST: What’s the Best Method For Application Security Testing?
Cigital
Static Analysis Security Testing for Dummies... and You
Static Analysis Security Testing for Dummies... and You
Kevin Fealey
API Security Survey
API Security Survey
Imperva
Source Code Analysis with SAST
Source Code Analysis with SAST
Blueinfy Solutions
Secure Code Review 101
Secure Code Review 101
Narudom Roongsiriwong, CISSP
How to Replace Your Legacy Antivirus Solution with CrowdStrike
How to Replace Your Legacy Antivirus Solution with CrowdStrike
CrowdStrike
Vulnerability Assessment Report
Vulnerability Assessment Report
Harshit Singh Bhatia
Los 10 principales riesgos en aplicaciones web #CPMX5
Los 10 principales riesgos en aplicaciones web #CPMX5
SemanticWebBuilder
ISACA SV Chapter: Securing Software Supply Chains
ISACA SV Chapter: Securing Software Supply Chains
Jim Bugwadia
Web Application Security Testing
Web Application Security Testing
Marco Morana
Autosar Basics hand book_v1
Autosar Basics hand book_v1
Keroles karam khalil
DAST, SAST, Hybrid, Hybrid 2.0 & IAST - Methodology & Limitations
DAST, SAST, Hybrid, Hybrid 2.0 & IAST - Methodology & Limitations
iAppSecure Solutions
IBM AppScan - the total software security solution
IBM AppScan - the total software security solution
hearme limited company
Optimizing Security Operations: 5 Keys to Success
Optimizing Security Operations: 5 Keys to Success
Sirius
Security testing
Security testing
Rihab Chebbah
Strategies for Managing OT Cybersecurity Risk
Strategies for Managing OT Cybersecurity Risk
Mighty Guides, Inc.
Vulnerability and Patch Management
Vulnerability and Patch Management
n|u - The Open Security Community
Integrated Security Operations Center (ISOC) for Cybersecurity Collaboration
Integrated Security Operations Center (ISOC) for Cybersecurity Collaboration
Priyanka Aash
Secure Software Development Lifecycle - Devoxx MA 2018
Secure Software Development Lifecycle - Devoxx MA 2018
Imola Informatica
Governance of security operation centers
Governance of security operation centers
Brencil Kaimba
Mobile App Security Testing -2
Mobile App Security Testing -2
Krisshhna Daasaarii
MW_Arch Fastest_way_to_hunt_on_Windows_v1.01
MW_Arch Fastest_way_to_hunt_on_Windows_v1.01
Michael Gough
Threat Hunting with Splunk Hands-on
Threat Hunting with Splunk Hands-on
Splunk
Webinar–That is Not How This Works
Webinar–That is Not How This Works
Synopsys Software Integrity Group
Webinar – Risk-based adaptive DevSecOps
Webinar – Risk-based adaptive DevSecOps
Synopsys Software Integrity Group
Mais conteúdo relacionado
Mais procurados
Source Code Analysis with SAST
Source Code Analysis with SAST
Blueinfy Solutions
Secure Code Review 101
Secure Code Review 101
Narudom Roongsiriwong, CISSP
How to Replace Your Legacy Antivirus Solution with CrowdStrike
How to Replace Your Legacy Antivirus Solution with CrowdStrike
CrowdStrike
Vulnerability Assessment Report
Vulnerability Assessment Report
Harshit Singh Bhatia
Los 10 principales riesgos en aplicaciones web #CPMX5
Los 10 principales riesgos en aplicaciones web #CPMX5
SemanticWebBuilder
ISACA SV Chapter: Securing Software Supply Chains
ISACA SV Chapter: Securing Software Supply Chains
Jim Bugwadia
Web Application Security Testing
Web Application Security Testing
Marco Morana
Autosar Basics hand book_v1
Autosar Basics hand book_v1
Keroles karam khalil
DAST, SAST, Hybrid, Hybrid 2.0 & IAST - Methodology & Limitations
DAST, SAST, Hybrid, Hybrid 2.0 & IAST - Methodology & Limitations
iAppSecure Solutions
IBM AppScan - the total software security solution
IBM AppScan - the total software security solution
hearme limited company
Optimizing Security Operations: 5 Keys to Success
Optimizing Security Operations: 5 Keys to Success
Sirius
Security testing
Security testing
Rihab Chebbah
Strategies for Managing OT Cybersecurity Risk
Strategies for Managing OT Cybersecurity Risk
Mighty Guides, Inc.
Vulnerability and Patch Management
Vulnerability and Patch Management
n|u - The Open Security Community
Integrated Security Operations Center (ISOC) for Cybersecurity Collaboration
Integrated Security Operations Center (ISOC) for Cybersecurity Collaboration
Priyanka Aash
Secure Software Development Lifecycle - Devoxx MA 2018
Secure Software Development Lifecycle - Devoxx MA 2018
Imola Informatica
Governance of security operation centers
Governance of security operation centers
Brencil Kaimba
Mobile App Security Testing -2
Mobile App Security Testing -2
Krisshhna Daasaarii
MW_Arch Fastest_way_to_hunt_on_Windows_v1.01
MW_Arch Fastest_way_to_hunt_on_Windows_v1.01
Michael Gough
Threat Hunting with Splunk Hands-on
Threat Hunting with Splunk Hands-on
Splunk
Mais procurados
(20)
Source Code Analysis with SAST
Source Code Analysis with SAST
Secure Code Review 101
Secure Code Review 101
How to Replace Your Legacy Antivirus Solution with CrowdStrike
How to Replace Your Legacy Antivirus Solution with CrowdStrike
Vulnerability Assessment Report
Vulnerability Assessment Report
Los 10 principales riesgos en aplicaciones web #CPMX5
Los 10 principales riesgos en aplicaciones web #CPMX5
ISACA SV Chapter: Securing Software Supply Chains
ISACA SV Chapter: Securing Software Supply Chains
Web Application Security Testing
Web Application Security Testing
Autosar Basics hand book_v1
Autosar Basics hand book_v1
DAST, SAST, Hybrid, Hybrid 2.0 & IAST - Methodology & Limitations
DAST, SAST, Hybrid, Hybrid 2.0 & IAST - Methodology & Limitations
IBM AppScan - the total software security solution
IBM AppScan - the total software security solution
Optimizing Security Operations: 5 Keys to Success
Optimizing Security Operations: 5 Keys to Success
Security testing
Security testing
Strategies for Managing OT Cybersecurity Risk
Strategies for Managing OT Cybersecurity Risk
Vulnerability and Patch Management
Vulnerability and Patch Management
Integrated Security Operations Center (ISOC) for Cybersecurity Collaboration
Integrated Security Operations Center (ISOC) for Cybersecurity Collaboration
Secure Software Development Lifecycle - Devoxx MA 2018
Secure Software Development Lifecycle - Devoxx MA 2018
Governance of security operation centers
Governance of security operation centers
Mobile App Security Testing -2
Mobile App Security Testing -2
MW_Arch Fastest_way_to_hunt_on_Windows_v1.01
MW_Arch Fastest_way_to_hunt_on_Windows_v1.01
Threat Hunting with Splunk Hands-on
Threat Hunting with Splunk Hands-on
Semelhante a Synopsys_site.pptx
Webinar–That is Not How This Works
Webinar–That is Not How This Works
Synopsys Software Integrity Group
Webinar – Risk-based adaptive DevSecOps
Webinar – Risk-based adaptive DevSecOps
Synopsys Software Integrity Group
Webinar–Best Practices for DevSecOps at Scale
Webinar–Best Practices for DevSecOps at Scale
Synopsys Software Integrity Group
Bridging the Security Testing Gap in Your CI/CD Pipeline
Bridging the Security Testing Gap in Your CI/CD Pipeline
DevOps.com
Pentest is yesterday, DevSecOps is tomorrow
Pentest is yesterday, DevSecOps is tomorrow
Amien Harisen Rosyandino
Take Control: Design a Complete DevSecOps Program
Take Control: Design a Complete DevSecOps Program
Deborah Schalm
Take Control: Design a Complete DevSecOps Program
Take Control: Design a Complete DevSecOps Program
DevOps.com
RSA Conference Presentation–Creating a Modern AppSec Toolchain to Quantify Se...
RSA Conference Presentation–Creating a Modern AppSec Toolchain to Quantify Se...
Synopsys Software Integrity Group
Webinar–AppSec: Hype or Reality
Webinar–AppSec: Hype or Reality
Synopsys Software Integrity Group
Webinar–Creating a Modern AppSec Toolchain to Quantify Service Risks
Webinar–Creating a Modern AppSec Toolchain to Quantify Service Risks
Synopsys Software Integrity Group
Scaling AppSec through Education
Scaling AppSec through Education
Grant Ongers
Secure Your DevOps Pipeline Best Practices Meetup 08022024.pptx
Secure Your DevOps Pipeline Best Practices Meetup 08022024.pptx
lior mazor
How to get the best out of DevSecOps - a security perspective
How to get the best out of DevSecOps - a security perspective
Colin Domoney
Webinar–Building A Culture of Secure Programming in Your Organization
Webinar–Building A Culture of Secure Programming in Your Organization
Synopsys Software Integrity Group
Benefits of DevSecOps
Benefits of DevSecOps
Finto Thomas , CISSP, TOGAF, CCSP, ITIL. JNCIS
From Zero to DevSecOps: How to Implement Security at the Speed of DevOps
From Zero to DevSecOps: How to Implement Security at the Speed of DevOps
WhiteSource
Realizing Software Security Maturity: The Growing Pains and Gains
Realizing Software Security Maturity: The Growing Pains and Gains
Priyanka Aash
Outpost24 webinar - application security in a dev ops world-08-2018
Outpost24 webinar - application security in a dev ops world-08-2018
Outpost24
10 things to get right for successful dev secops
10 things to get right for successful dev secops
Mohammed Ahmed
SIG-product-overview.pdf
SIG-product-overview.pdf
Aklnt
Semelhante a Synopsys_site.pptx
(20)
Webinar–That is Not How This Works
Webinar–That is Not How This Works
Webinar – Risk-based adaptive DevSecOps
Webinar – Risk-based adaptive DevSecOps
Webinar–Best Practices for DevSecOps at Scale
Webinar–Best Practices for DevSecOps at Scale
Bridging the Security Testing Gap in Your CI/CD Pipeline
Bridging the Security Testing Gap in Your CI/CD Pipeline
Pentest is yesterday, DevSecOps is tomorrow
Pentest is yesterday, DevSecOps is tomorrow
Take Control: Design a Complete DevSecOps Program
Take Control: Design a Complete DevSecOps Program
Take Control: Design a Complete DevSecOps Program
Take Control: Design a Complete DevSecOps Program
RSA Conference Presentation–Creating a Modern AppSec Toolchain to Quantify Se...
RSA Conference Presentation–Creating a Modern AppSec Toolchain to Quantify Se...
Webinar–AppSec: Hype or Reality
Webinar–AppSec: Hype or Reality
Webinar–Creating a Modern AppSec Toolchain to Quantify Service Risks
Webinar–Creating a Modern AppSec Toolchain to Quantify Service Risks
Scaling AppSec through Education
Scaling AppSec through Education
Secure Your DevOps Pipeline Best Practices Meetup 08022024.pptx
Secure Your DevOps Pipeline Best Practices Meetup 08022024.pptx
How to get the best out of DevSecOps - a security perspective
How to get the best out of DevSecOps - a security perspective
Webinar–Building A Culture of Secure Programming in Your Organization
Webinar–Building A Culture of Secure Programming in Your Organization
Benefits of DevSecOps
Benefits of DevSecOps
From Zero to DevSecOps: How to Implement Security at the Speed of DevOps
From Zero to DevSecOps: How to Implement Security at the Speed of DevOps
Realizing Software Security Maturity: The Growing Pains and Gains
Realizing Software Security Maturity: The Growing Pains and Gains
Outpost24 webinar - application security in a dev ops world-08-2018
Outpost24 webinar - application security in a dev ops world-08-2018
10 things to get right for successful dev secops
10 things to get right for successful dev secops
SIG-product-overview.pdf
SIG-product-overview.pdf
Último
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
Martijn de Jong
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
The Digital Insurer
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
Khushali Kathiriya
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
apidays
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
apidays
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
sammart93
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
Remote DBA Services
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
Product Anonymous
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Zilliz
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Orbitshub
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
Andrey Devyatkin
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
Cyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdf
Overkill Security
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Jago de Vreede
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Angeliki Cooney
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Orbitshub
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
ThousandEyes
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
sudhanshuwaghmare1
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
Dropbox
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
Nanddeep Nachan
Último
(20)
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
Cyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdf
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
Synopsys_site.pptx
1.
© 2021 Synopsys,
Inc. 1 Synopsys Leader in Application Security and Quality
2.
© 2021 Synopsys,
Inc. 2 Over 30 Years of leadership, growth and innovation Employees: ~15.000 Engineers: ~6,000 SIG: ~1,500 Engineering culture Global reach 30+ Years of innovation Market Value ~ $45B 2020 Revenue ~ $3.7B $1.4B+ invested in SIG Constant growth 1. Microsoft 2. Oracle 3. SAP 4. Symantec 5. VMware 6. Salesforce 7. Intuit 8. CA Technologies 9. Adobe 10. Teradata 11. Amdocs 12. Cerner 13. Citrix 14. Autodesk 15. Synopsys 16. Sage Group 17. Akamai Technologies 18. Nuance 19. Open Text 20. F5 Networks Top 20 Global Software Companies 15. 0 500 1,000 1,500 2,000 2,500 3,000 3,500 4,000 4,500 $ Millions
3.
© 2021 Synopsys,
Inc. 3 Synopsys SIG – Software Integrity Group 2021 2022
4.
© 2021 Synopsys,
Inc. 4 2021 2020 2019
5.
© 2020 Synopsys,
Inc. 2022 Synopsys is a Leader in the 2022 Gartner® Magic Quadrant for Application Security Testing (AST) for the sixth year in a row. Based on its ability to execute and our completeness of vision, Synopsys is positioned highest and farthest right for the fourth time in a row in the Leaders Quadrant among the 14 AST vendors evaluated by Gartner.
6.
© 2021 Synopsys,
Inc. 6 Integrated Tools Strategy & Planning Maturity Action Plan (MAP) Coverity SAST Black Duck SCA Dynamic Application Security Testing Managed Services Static Application Security Testing Mobile Application Security Testing Penetration Testing Professional Services Industry Solutions Architecture and Design Security Training/ Champion Programs DevSecOps Integration Cloud Security Building Security in Maturity Model (BSIMM) Synopsys Software Security and Quality Portfolio Code Dx & I. Orchestration WhiteHat & Seeker Dynamic Analysis
7.
© 2021 Synopsys,
Inc. 7 The Problem Development and Security Teams are in a hurry to deliver secure software, faster
8.
© 2021 Synopsys,
Inc. 8 Development Reality Business Demands Development Teams + Time to Market Customer Satisfaction Innovation + Meet shorter, faster delivery schedules Avoid cost and time of re-work Maximize developer productivity Meet quality, safety, security requirements Maintain multi- variants of code
9.
© 2021 Synopsys,
Inc. 9 © 2022 Synopsys, Inc. 9 Synopsys Confidential Information One Organized View SAST DAST IAST SCA API Scans Addressing all of the security touchpoints • Only 25 of 122 BSIMM activities are automated • All testing must be tracked – What test type? – What was identified? – What was assigned for remediation? – Who was it assigned to? – Was it completed, and, if so, when? • Goal: eliminate Excel as the tracking tool for testing Lots of tools, lots of activities, no central truth Security Reality Risk Analysis Architecture Analysis Threat Modeling Penetration Testing Edge/Boundary Tests Manual Code Review Malicious Code Detection Automated Tests Manual Tests
10.
© 2021 Synopsys,
Inc. 10 Old tools and methods slow DevOps velocity Pipeline Congestion Large, monolithic AppSec testing tools can congest build, test, and release pipelines. The answer is smaller, purpose built tests run intelligently at the right time in situational context More tools + more testing = more findings that must be correlated, deduplicated and prioritized so developers aren’t overwhelmed and can focus on issues that matter most Findings Overload
11.
© 2021 Synopsys,
Inc. 11 Intelligent Orchestration Intelligent, policy-driven DevSecOps AppSec Program Objectives & Metrics Prioritized tickets for remediation Policies Correlates, prioritizes, tracks remediation, centralizes visibility Code Dx Executes the right tests, at the right time, at the right level Actionable insights into software risk SAST SCA IAST DAST Code Review Threat Model Pen Test Risk Analysis
12.
© 2021 Synopsys,
Inc. 12 Build Secure, High-Quality Software Faster