BURLINGTON, Mass. – March 19, 2018 – Veracode, Inc., a leader in securing the world’s software, acquired by CA Technologies (NASDAQ:CA), announced the evolution of CA Veracode Verified, a program that provides third-party validation of a company’s secure software developing processes.
With approximately 30 percent of all breaches occurring as a result of a vulnerability at the application layer, software purchasers are demanding more insight into the security of the software they are buying. CA Veracode Verified empowers software vendors to demonstrate their commitment to creating secure software.
New research conducted with International Data Group (IDG) found that 84 percent of software buyers include security requirements in new vendor contracts. Prospects and existing customers are more discerning than ever before when it comes to the security of the software being purchased, and without a means of demonstrating proof of security, organizations risk experiencing delayed or lost revenue. The CA Veracode Verified program provides several benefits to companies participating in the program, including:
• A roadmap for adopting and maturing an application security program tied to practical outcomes and business value for the Modern Software Factory.
• Third-party attestation from an industry leader that an application has undergone security testing as part of the development process. This can help streamline the sales process to proactively address security concerns.
• A focus on the secure coding process, not just a point-in-time release, to embrace DevSecOps and the rapid delivery pace of DevOps and Agile development methods.
• A means of ensuring that third party software purchased or used meets a high standard of application security, to reduce enterprise risk.
“As software becomes a bigger component of value in all industries, every company is driven to become a modern software factory. Security becomes a competitive advantage as companies learn to create and buy high-quality, secure software. Too often we’re seeing security sacrificed to accommodate the speed of business,” said Chris Wysopal, chief technology officer, CA Veracode. “The result is insecure software that causes extraordinarily damaging breaches. The CA Veracode Verified program provides both a roadmap towards secure software development and a quick means of determining the commitment to security made by potential software vendor. The program seal highlights organizations that make secure software development a competitive advantage by showing that they adopted a mature application security program that covers the entire SDLC.”
Successful application security is more than just scanning and fixing security flaws, it’s about a change in processes and procedures to embed security into the entire development process. CA Veracode Verified focuses on implementation of secure coding practices, not just recording point-in-time scans, which makes it ideal for today’s DevOps and Agile methods, where releases happen at very high frequency and security must be fully integrated throughout the lifecycle.
The CA Veracode Verified program recognizes three levels of maturity to help organizations and consumers understand the security posture of the software they purchase and use. The maturity levels are based on more than 12 years of software security trend data pulled from the CA Veracode Platform. This data provides best practices to help create a secure development process that minimizes vulnerabilities and reduces the risk of a breach.
To learn more about CA Veracode Verified, click here.
To read the full research report conducted in conjunction with IDG, click here.
About CA Veracode
Veracode, CA Technologies application security business, is a leader in helping organizations secure the software that powers their world. Veracode’s SaaS platform and integrated solutions help security teams and software developers find and fix security-related defects at all points in the software development lifecycle, before they can be exploited by hackers. Our complete set of offerings help customers reduce the risk of data breaches, increase the speed of secure software delivery, meet compliance requirements, and cost effectively secure their software assets- whether that’s software they make, buy or sell.
Veracode serves over 1,600 customers across a wide range of industries, including nearly one-third of the Fortune 100, three of the top four U.S. commercial banks and more than 20 of Forbes’ 100 Most Valuable Brands. Learn more at www.veracode.com, on the Veracode blog, on Twitter and in the CA Veracode Community.
Copyright © 2017 Veracode, Inc. All rights reserved. All other brand names, product names, or trademarks belong to their respective holders.
Follow CA Technologies
Social Media Page