|
On a smart planet, the systems we use are more interconnected, instrumented and intelligent. These systems make our lives more convenient but also have the potential to introduce great risk. Now more than ever, application security is critically importance. But what is the best approach?
Two techniques – whitebox and blackbox application security testing -- have emerged to detect vulnerabilities. They approach the problem in different ways. One analyzes software at the source while the other scans applications for vulnerabilities in the compiled program. While both have their strengths and weaknesses, a combination of the two approaches embedded across the software development life-cycle provides security professionals the most comprehensive application coverage.
Join us for a one-hour Web seminar where members of our security research team will discuss these techniques, highlight how their approaches to vulnerability detection compliment one another and share best practices for embedding application security testing across the software development lifecycle.
Hurry! This webcast is available ondemand for a limited period only.
Register today!
IBM, the IBM logo, ibm.com, and Rational are trademarks of IBM, registered in many jurisdictions worldwide. A current list of IBM trademarks is available at ibm.com/legal/copytrade.shtml. Other company, product, or service names may be trademarks or service marks of others. © Copyright IBM Corporation 2009. All Rights Reserved. Any material in this document with regard to third parties is based on information obtained from such parties. No effort has been made to independently verify the accuracy of the information. This document does not constitute an expressed or implied recommendation or endorsement by IBM of any third-party product or service.
|
|
|