- Oct. 20, 2012 - PARIS, France --
In addition to its unmatched capacity to accurately and quickly detect the most prevalent and most pertinent vulnerabilities within Java and .NET applications, SEEKER is now capable of analyzing vulnerabilities within PHP applications. Its great ease of use for all stakeholders of the web and mobile application development lifecycle, allows for a seamless integration into every enterprise’s business software development process, turning it into a truly secured software factory.
“A security bug shouldn’t be treated differently from a functional bug.” said Michel Tiberini, Quotium President. “With this new version of Seeker, any project manager can integrate the identification and correction of security vulnerabilities within its web applications directly into the enterprise’s development lifecycle. Security becomes the part of every developer’s daily job.”
“Thanks to its underlying IAST technology (Interactive Application Security Testing), this new version of Seeker allows for accurate detection of vulnerabilities while eliminating false positives for all Java,
.NET, and PHP applications.”
noted Ofer Maor, CTO of Quotium and Chairman of OWASP Israel, “Seeker is today the only automated real alternative to manual penetration testing for protecting applications and data against attacks.”
"Analysis of dynamic programming languages, such as PHP is a challenge for existing security technologies"
, pointed out Joseph Feiman from Gartner, "IAST technology offers a potential for higher-accuracy vulnerability analysis."
More about Quotium: http://www.quotium.com
) Partner Diffusion communiqué de presse