CIO Influence
CIO Influence News Security

Legit Security Extends Platform Capabilities for Code to Cloud Visibility and Security

Legit Security Extends Platform Capabilities for Code to Cloud Visibility and Security

Legit Security, a cyber security company with an enterprise platform that protects an organization’s software supply chain from attack and ensures secure application delivery, announces new code to cloud traceability and security capabilities that capture deep security issue context and business insights to drive faster remediation and security issue prioritization for enterprise security teams. These capabilities extend the company’s existing market leadership position in software supply chain security by providing broader and more automated security issue discovery, correlation and remediation capabilities from code creation to cloud delivery and runtime. By using the Legit Security platform, enterprise security teams can greatly improve their efficiency and effectiveness by leveraging critical insights and deep security issue context to cut through the noise and quickly remediate the security issues that matter most. More details on this latest capability can be found on the company’s blog.

Modern software applications are driven by a demand for continuous innovation that has led to the adoption of DevOps, agile development, and rapid software releases to the cloud. However, this has created a sprawling and rapidly changing attack surface that requires a coordinated, real-time approach to security that spans Application Security, Cloud Security and Software Development teams. Yet, these teams lack end-to-end visibility and context into how applications are really built and deployed so they can cut through high levels of security issue noise, prioritize application risks effectively, and collaborate efficiently so they can quickly remediate the most critical risks first.

CIO INFLUENCE News: Shabodi and Megh Computing Unveil Network-Aware Video Analytics Solutions for Private 5G Networks

The Legit Security platform is providing deep visibility into security vulnerabilities and risks from code creation, through software build automation, to runtime deployment so that security teams can easily collaborate and build trust with software development teams while scaling their security operations to meet the speed of development. Automated code to cloud traceability and security also provides critical capabilities to define and track secure application delivery benchmarks, to build secure pipelines with optimal security guardrail coverage across the software development lifecycle (SDLC), and to manage clear cut strategies for shifting security left to improve efficiency.

“Traditional application security lacks an understanding of code lineage and how applications are built and shipped, creating a huge gap in the ability to secure application delivery end-to-end, in real time, across all stages of the SDLC,” said Liav Caspi, CTO and co-founder of Legit Security. “Our code to cloud traceability closes this gap. We’re providing visibility, context and correlation of both applications and their risks to bridge together the worlds of Application Security, Cloud Security and Development, which is exactly what the market needs to get to the next level of effectiveness. We’re enabling enterprises to better understand and prioritize the real risks that vulnerabilities pose to their applications, how that risk originated, and how it moved through their SDLC and to the cloud.”

CIO INFLUENCE News: UiPath Helps JATCO Reap the Benefits of Enterprise-Wide Automation

Legit Security’s code to cloud traceability works by tracking code from the time it’s written, across all its pre-production build stages and binary forms, to when it’s deployed to a runtime environment. The platform automatically discovers and maps the connections and dependencies between systems, code, artifacts, third parties, developers and cloud environments and tracks the pathways used by individual application releases. This allows organizations to see where vulnerabilities in code will ultimately be deployed and also where vulnerabilities discovered in runtime originated in the SDLC, so that teams can quickly understand their ultimate impact and prioritize remediation for the most critical threats.

CIO INFLUENCE News: Swimlane Partners with AWS, Enabling Security Lake Customers to Achieve the Most Cost-Effective Security Cloud Available

[To share your insights with us, please write to sghosh@martechseries.com]

Related posts

Flexible And Compliant Cloud Calling Is Now Available To Indian Businesses As Exotel Bags Virtual Network Operator License; First Indian Customer Engagement Platform To Become A Virtual Operator

CIO Influence News Desk

Bunzz, the dApp Development Platforms in Asia, Has Surpassed 3,300 Users, and Developers

CIO Influence News Desk

InQuest Integrates with ThreatConnect to Elevate Threat Intelligence

Business Wire