Quotium announced the release of Seeker Enterprise 3.0, whose innovative technology correlates application behavior with simulated hacker’s attacks to pinpoint vulnerable code.
Seeker is the run-time code & data analysis application security testing solution for the software development life-cycle (SDLC). It assists in vulnerability management by accurately demonstrating risks to business critical data. It can be fully automated and is very suitable for Agile and continuous integration environments.
Delivering an application security testing automation process in the development lifecycle, it allows organizations to secure every build, every release and every application without requiring manpower overhead or specific security knowledge.
With Enterprise Version 3.0, Seeker delivers new and unique capabilities that allow organizations to handle software cyber threats in fast-paced development environments.
Among the many new features that have been introduced in this version are:
- Enhanced automation capabilities
- Better cross-organizational security view and reporting
- Assessment of cross-organizational compliance status
- Team security performance metrics and more.
The new dashboards allow executives and managers to view their overall organizational security status, see which systems pose the most threat, which compliance requirements are met and which aren’t.
The enhanced automation capabilities allow better integration in cloud environments, with the ability to fully orchestrate Seeker and automatically run security testing in private cloud settings. It performs automatic results triage via exploitation of vulnerabilities, eliminating the need for human effort as part of the process. This makes Seeker suitable for use by non-security personnel, and easy to place in the hands of developers or DevOps.
Quotium will showcase the solution at Infosecurity Europe 2014 this week.