Try our new research platform with insights from 80,000+ expert users
2022-08-02T07:24:00Z

Community Spotlight #19

EB
  • 71
Published:Aug 2, 2022
Search for a product comparison in Static Application Security Testing (SAST)
PeerSpot user

1 Comment

EB
Real User
2022-08-02T08:26:09Z
Aug 2, 2022
Chris Childerhose - PeerSpot reviewer
Real User
ExpertTop 5
Aug 2, 2022

@Evgeny Belenky my pleasure always great to give back to the community.

PeerSpot user
Find out what your peers are saying about Sonar, Veracode, Checkmarx and others in Static Application Security Testing (SAST). Updated: November 2024.
823,795 professionals have used our research since 2012.
Related Questions
Ariel Lindenfeld - PeerSpot reviewer
May 15, 2024
May 15, 2024
SAST is crucial for organizations aiming to secure their software during the development phase. Developers should consider the following aspects: Identify vulnerabilities early Cost-effective security measures Compliance with standards Improvement of code quality Automated security checks The importance of SAST lies in its capability to identify vulnerabilities early in the software development...
See 1 answer
RA
May 15, 2024
SAST is crucial for organizations aiming to secure their software during the development phase. Developers should consider the following aspects: Identify vulnerabilities early Cost-effective security measures Compliance with standards Improvement of code quality Automated security checks The importance of SAST lies in its capability to identify vulnerabilities early in the software development process. By incorporating SAST tools, companies can detect security flaws during the coding stage, minimizing the cost and effort required to fix issues post-deployment. Addressing vulnerabilities before the software reaches production not only reduces potential security risks but also ensures that any patches needed have minimal impact on the project's overall timeline. Additionally, SAST tools automate security checks, providing continuous analysis without disrupting the workflow, thereby making early vulnerability detection a more integral part of software development.Compliance with industry standards is another significant importance of SAST. Organizations are often required to adhere to specific regulatory standards and frameworks, such as OWASP, PCI-DSS, or HIPAA. SAST helps ensure compliance by verifying code against these standards, reducing the risk of non-compliance and potential legal consequences. Implementing SAST also contributes to improving code quality by enforcing good coding practices, which enhances robustness and reliability. By integrating SAST, developers receive feedback that not only identifies issues but also suggests best practices, fostering a secure software development environment focused on quality and compliance.
reviewer2163450 - PeerSpot reviewer
Apr 26, 2023
Apr 26, 2023
Come on guys, the correct answer to this is the Microsoft Admin Portal and your Azure Admin and the Security and Compliance centers. Everyone wants to buy new SaaS when most of the Controls and Safeguards are built into MS. Steven Palange, steven_palange@tlic.com reach out for any and all your SaaS renewals.
See 2 answers
SP
Apr 25, 2023
Come on guys, the correct answer to this is the Microsoft Admin Portal and your Azure Admin and the Security and Compliance centers. Everyone wants to buy new SaaS when most of the Controls and Safeguards are built into  MS. Steven Palange, steven_palange@tlic.com reach out for any and all your SaaS renewals. 
reviewer2054484 - PeerSpot reviewer
Apr 26, 2023
For small companies, utilize the tooling you already have in place like the MS Office or the Atlassian Suite, etc. Ultimately, as you grow towards enterprise scale, Archer and ServiceNow (Governance, Risk, Compliance) can help with everything from compliance workflow to tracking incidence response. As a Cyber Architect in a corporate Fortune 500, we use a medley of integration with our SIEM, Vulnerability Tool, and all the collected data can be accessed by Tableau to generate a dynamic web graph. When you start tracking vulnerabilities and incidents, the data you accumulate can be expressed in your appropriate CPI. If you lack data for a particular CPI, then you may a gap in your cyber program.
Related Articles
LW
Oct 22, 2023
Oct 22, 2023
Top 3 Tech Leaders in Application Security Testing (AST) 2023 Discover the leading technology solutions in Application Security Testing (AST) with PeerSpot's annual Tech Leaders awards. The awards are based on comprehensive user reviews and other criteria as outlined below, offering you a window into the top products in this category and a way to explore and compare outstanding products. Join u...
Related Articles
LW
Oct 22, 2023
Application Security Testing (AST) - Tech Leaders
Top 3 Tech Leaders in Application Security Testing (AST) 2023 Discover the leading technology sol...
Download Free Report
Download our free Cloud Security Posture Management (CSPM) Report and find out what your peers are saying about Palo Alto Networks, Wiz, Microsoft, and more! Updated: November 2024.
DOWNLOAD NOW
823,795 professionals have used our research since 2012.