- Fortify Software
Fortify Software is a
San Mateo ,California -based software vendor. The company was founded in2003 and provides software security products that identify and remove security vulnerabilities from software applications throughout the development, testing, and deployment cycles. [http://www.pcworld.com/news/article/0,aid,115532,00.asp Software Searches for Security Flaws] en icon, "PCWorld.com",April 5 2004 ] [http://www.internetnews.com/dev-news/article.php/3335651 A New Approach to Fortify Your Software ] en icon, "Internetnews.com ",April 5 2004 ] Its funding was provided byKleiner, Perkins, Caufield & Byers . The company has provided products forWells Fargo , Oracle,Honeywell , andLockheed Martin .Technical Advisory Board
Fortify's technical advisory board includes
Avi Rubin ,Bill Joy ,David Wagner , Fred Schneider,Gary McGraw ,Greg Morrisett , Li Gong, Marcus Ranum, Matt Bishop,William Pugh and John Viega.ecurity Research
Fortify runs a security research group led by Jacob West and Chief Scientist Brian Chess. Among other work, Fortify's security research group introduced
JavaScript Hijacking , a new type of eavesdropping attack against Ajax-style Web applications.The Fortify taxonomy of security vulnerabilities is maintained by the security research group in the publicly available Vulncat database [http://fortify.com/vulncat] .
Fortify customers receive quarterly updates from the security research group, which include rules to find new types of vulnerabilities, as well as support for new languages.
The group is also responsible for published research, including "JavaScript Hijacking" [http://www.fortify.com/landing/downloadLanding.jsp?path=%2Fpublic%2FJavaScript_Hijacking.pdf] , "Attacking the build: Cross build injection" [http://www.net-security.org/article.php?id=1077] , "Watch what you write: Preventing Cross-site scripting by observing program output" [http://www.owasp.org/images/9/9d/OWASP-AppSecEU08-Madou.pdf.] and "Dynamic taint propagation: Finding vulnerabilities without attacking" [http://portal.acm.org/citation.cfm?id=1371501] .
In addition, Jacob West and Brian Chess published a book, "Secure Programming with Static Analysis" in 2007.
The group invests resources in understanding, and improving the security of Open Source Software with its Java Open Review project [http://opensource.fortifysoftware.com] .
Products
Fortify offers one core product, Fortify 360. Fortify 360 consists of three analyzers which detect vulnerabilities in software, a collaboration module to help developers and security auditors fix the identified vulnerabilities, and a management and reporting console. The core components include:
*1) Source Code Analyzer (SCA): analyzes an application's source code for security vulnerabilities.
*2) Program Tracer Analyzer (PTA - Formerly known as Tracer): detects vulnerabilities in a running application. This analyzer integrates into a QA test, using dynamic taint propagation to find vulnerabilities automatically while a routine system test is conducted.
*3) Real-Time Analyzer (RTA - Formerly known as Defender): monitors and protects deployed applications.
*4) Collaboration Module: a web based interface that collects and correlates vulnerability information from the analyzers, together with a view of the relevant source code, and provides a user interface for auditors and developers to triage and fix issues.
*5) Manager: centralized reporting and management console for setting policies and reporting on a list of metrics.SCA scans code in the following languages:
* Adobe®ColdFusion ®
*Microsoft .NET
* C/C++
* Classic ASP
*COBOL
* Java
* JSP
*JavaScript
*PHP
* OraclePL/SQL
* MicrosoftT-SQL
* Visual Basic for Applications ("VBA")
*VBScript PTA and RTA use bytecode instrumentation and work with J2EE and .NET websites.
Platform support
Supported platforms include Windows, Solaris,
Linux ,HP-UX , AIX, andMac OS X .References
External links
* [http://fortify.com/ Company website]
* [http://opensource.fortify.com/ Java Open Review Project]
* [http://www.businessweek.com/technology/content/sep2006/tc20060926_175459.htm?chan=top+news_top+news+index Software Isn't Complete Unless It's Secure, BusinessWeek, September 26, 2006] - Article by Fortify Software Advisor Bill Joy
* http://reddevnews.com/news/devnews/article.aspx?editorialsid=1052]
* http://www.vnunet.com/vnunet/news/2217134/linux-vulnerability-exposed]
Wikimedia Foundation. 2010.