CIO Influence
AIOps CIO Influence News Security

Dynatrace Enhances Application Security With AI-Powered Vulnerability Prioritization

Dynatrace Enhances Application Security With AI-Powered Vulnerability Prioritization
New Davis Security Advisor automatically contextualizes and prioritizes application vulnerabilities to reduce enterprise risk

Software intelligence company Dynatrace announced its new Davis Security Advisor, an AI-powered enhancement to the Dynatrace Application Security Module that automatically surfaces, prioritizes, and details the software libraries and open-source packages representing the greatest risk to an organization. This empowers DevSecOps teams to make more informed, real-time decisions and address the most critical vulnerabilities first, which allows them to reduce the risk facing their organization with greater confidence and efficiency, leaving more time to drive innovation.

Recommendedย ITechย News: An Expert Discussion on Zero Trust

โ€œApplications remain a top cause of external breaches, and the prevalence of open source, API, and containers only adds complexity to the security team.โ€

According to a Forrester Research report by Principal Analyst Sandy Carielli, โ€œApplications remain a top cause of external breaches, and the prevalence of open source, API, and containers only adds complexity to the security team.โ€1ย This is reinforced by recent Dynatraceย research, which revealed 89% of CISOs say cloud-native architectures and container runtime environments have made it more difficult to detect and manage software vulnerabilities.

The new Davis Security Advisor addresses these challenges. Optimized for cloud-native environments and powered by the Dynatrace AI engine,ย Davisยฎ, it automatically monitors all software libraries used in preproduction and production, and removes false positives. In addition, Davis Security Advisor aggregates vulnerability data in real-time and prioritizes remediation based on multiple dimensions of risk, including:

Recommendedย ITechย News: New Report Finds IT Leaders Focused on Digital Employee Experience Earn Nearly Double the Industry Average Salary

  • Number of vulnerabilitiesย caused by each software library.
  • Vulnerability severity, which is based on the common vulnerability scoring system (CVSS) rating of each vulnerability and whether the relevant code is used at runtime.
  • Threat context, which reflects whether there is a known public exploit for each vulnerability.
  • Asset exposure, which indicates whether the vulnerable code is communicating with the internet.
  • Potential business impact, which is determined by whether the processes that include the vulnerable library are connected to sensitive data.

โ€œCloud-native architectures fuel digital transformation, but traditional application security tools simply cannot keep up with the rapid pace of change in these environments and fail to surface key insights like whether vulnerable code is used at runtime,โ€ said Steve Tack, SVP of Product Management at Dynatrace. โ€œManual processes and piecemeal solutions that donโ€™t aggregate data from across these environments force teams to waste time chasing false positives and leave organizations vulnerable to risk. By automatically surfacing the most critical vulnerabilities and providing code-level detail and prioritization based on business impact, Dynatrace enables DevSecOps teams to work smarter, not harder, as they reduce their organizationsโ€™ risk exposure.โ€

Recommendedย ITechย News: InterDigital Debuts 5G Edge Pilot for Industry 4.0 Applications in the UK

Related posts

MainOne Supports VIPNET With Increased Capacity

CIO Influence News Desk

TeamViewer Digitalizes Warehouse Operations at GlobalFoundries with AR-Based Picking Solution

CIO Influence News Desk

Paian IT Solutions Used Corent Marketizer to Rapidly Publish Its PASOS Cloud Optimization Service

CIO Influence News Desk