<img height="1" width="1" src="https://www.facebook.com/tr?id=1879927395628828&amp;ev=PageView &amp;noscript=1">

Mapping the Application Security Terrain

How to Choose an Appropriate Application Security Assessment Process

Mapping the App Security Terrain

There are many different types of applications in use today, encompassing a myriad of functionalities and business purposes.

Therefore, there can be no “one size fits all” approach to risk management when contemplating application security. An internally utilized client-server application that tracks office equipment purchases will not have the same security requirements as those of a publicly accessible banking application.

Inside this whitepaper

  • Comprehensive Assessment - Automated analysis with complete manual analysis
  • Perimeter Assessment - Automated analysis with attack surface manual analysis
  • Perimeter Audit - Automated analysis with attack surface manual audit
  • Automated Assessment - Automated static source analysis