Suche senden
Hochladen
Synopsys_site.pptx
•
0 gefällt mir
•
300 views
A
Arthur528009
Folgen
FCBR - https://www.fcbr.com.br
Weniger lesen
Mehr lesen
Technologie
Melden
Teilen
Melden
Teilen
1 von 12
Empfohlen
Synopsys Security Event Israel Presentation: Keynote: Securing Your Software,...
Synopsys Security Event Israel Presentation: Keynote: Securing Your Software,...
Synopsys Software Integrity Group
Nozomi networks-solution brief
Nozomi networks-solution brief
Nozomi Networks
Introduction to QRadar
Introduction to QRadar
PencilData
Dragos S4x20: How to Build an OT Security Operations Center
Dragos S4x20: How to Build an OT Security Operations Center
Dragos, Inc.
Understanding Your Attack Surface and Detecting & Mitigating External Threats
Understanding Your Attack Surface and Detecting & Mitigating External Threats
Ulf Mattsson
IBM QRadar Security Intelligence Overview
IBM QRadar Security Intelligence Overview
Camilo Fandiño Gómez
How to Reduce the Attack Surface Created by Your Cyber-Tools
How to Reduce the Attack Surface Created by Your Cyber-Tools
Enterprise Management Associates
Cyber Threat Intelligence
Cyber Threat Intelligence
Prachi Mishra
Empfohlen
Synopsys Security Event Israel Presentation: Keynote: Securing Your Software,...
Synopsys Security Event Israel Presentation: Keynote: Securing Your Software,...
Synopsys Software Integrity Group
Nozomi networks-solution brief
Nozomi networks-solution brief
Nozomi Networks
Introduction to QRadar
Introduction to QRadar
PencilData
Dragos S4x20: How to Build an OT Security Operations Center
Dragos S4x20: How to Build an OT Security Operations Center
Dragos, Inc.
Understanding Your Attack Surface and Detecting & Mitigating External Threats
Understanding Your Attack Surface and Detecting & Mitigating External Threats
Ulf Mattsson
IBM QRadar Security Intelligence Overview
IBM QRadar Security Intelligence Overview
Camilo Fandiño Gómez
How to Reduce the Attack Surface Created by Your Cyber-Tools
How to Reduce the Attack Surface Created by Your Cyber-Tools
Enterprise Management Associates
Cyber Threat Intelligence
Cyber Threat Intelligence
Prachi Mishra
To Build Or Not To Build: Can SOC-aaS Bridge Your Security Skills Gap?
To Build Or Not To Build: Can SOC-aaS Bridge Your Security Skills Gap?
NetEnrich, Inc.
Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...
Stephen Cobb
IBM-QRadar-Corporate-Online-Training.
IBM-QRadar-Corporate-Online-Training.
Avishek Priyadarshi
ICS security
ICS security
Ahmed Shitta
Building a Cyber Security Operations Center for SCADA/ICS Environments
Building a Cyber Security Operations Center for SCADA/ICS Environments
Shah Sheikh
Cyber threat intelligence ppt
Cyber threat intelligence ppt
Kumar Gaurav
Walk This Way: CIS CSC and NIST CSF is the 80 in the 80/20 rule
Walk This Way: CIS CSC and NIST CSF is the 80 in the 80/20 rule
EnterpriseGRC Solutions, Inc.
IBM QRadar Security Intelligence Overview
IBM QRadar Security Intelligence Overview
Camilo Fandiño Gómez
Building a Next-Generation Security Operations Center (SOC)
Building a Next-Generation Security Operations Center (SOC)
Sqrrl
Vulnerability assessment & Penetration testing Basics
Vulnerability assessment & Penetration testing Basics
Mohammed Adam
Cyber attacks and IT security management in 2025
Cyber attacks and IT security management in 2025
Radar Cyber Security
Cybersecurity 1. intro to cybersecurity
Cybersecurity 1. intro to cybersecurity
sommerville-videos
Building an Analytics - Enabled SOC Breakout Session
Building an Analytics - Enabled SOC Breakout Session
Splunk
An introduction to SOC (Security Operation Center)
An introduction to SOC (Security Operation Center)
Ahmad Haghighi
Sosyal Mühendislik
Sosyal Mühendislik
Selman
Data Center Security
Data Center Security
Cisco Canada
Soc
Soc
Mukesh Chaudhari
Bulding Soc In Changing Threat Landscapefinal
Bulding Soc In Changing Threat Landscapefinal
Mahmoud Yassin
Security operation center (SOC)
Security operation center (SOC)
Ahmed Ayman
IBM Security Software Solutions - Powerpoint
IBM Security Software Solutions - Powerpoint
Thierry Matusiak
Webinar–That is Not How This Works
Webinar–That is Not How This Works
Synopsys Software Integrity Group
Webinar – Risk-based adaptive DevSecOps
Webinar – Risk-based adaptive DevSecOps
Synopsys Software Integrity Group
Weitere ähnliche Inhalte
Was ist angesagt?
To Build Or Not To Build: Can SOC-aaS Bridge Your Security Skills Gap?
To Build Or Not To Build: Can SOC-aaS Bridge Your Security Skills Gap?
NetEnrich, Inc.
Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...
Stephen Cobb
IBM-QRadar-Corporate-Online-Training.
IBM-QRadar-Corporate-Online-Training.
Avishek Priyadarshi
ICS security
ICS security
Ahmed Shitta
Building a Cyber Security Operations Center for SCADA/ICS Environments
Building a Cyber Security Operations Center for SCADA/ICS Environments
Shah Sheikh
Cyber threat intelligence ppt
Cyber threat intelligence ppt
Kumar Gaurav
Walk This Way: CIS CSC and NIST CSF is the 80 in the 80/20 rule
Walk This Way: CIS CSC and NIST CSF is the 80 in the 80/20 rule
EnterpriseGRC Solutions, Inc.
IBM QRadar Security Intelligence Overview
IBM QRadar Security Intelligence Overview
Camilo Fandiño Gómez
Building a Next-Generation Security Operations Center (SOC)
Building a Next-Generation Security Operations Center (SOC)
Sqrrl
Vulnerability assessment & Penetration testing Basics
Vulnerability assessment & Penetration testing Basics
Mohammed Adam
Cyber attacks and IT security management in 2025
Cyber attacks and IT security management in 2025
Radar Cyber Security
Cybersecurity 1. intro to cybersecurity
Cybersecurity 1. intro to cybersecurity
sommerville-videos
Building an Analytics - Enabled SOC Breakout Session
Building an Analytics - Enabled SOC Breakout Session
Splunk
An introduction to SOC (Security Operation Center)
An introduction to SOC (Security Operation Center)
Ahmad Haghighi
Sosyal Mühendislik
Sosyal Mühendislik
Selman
Data Center Security
Data Center Security
Cisco Canada
Soc
Soc
Mukesh Chaudhari
Bulding Soc In Changing Threat Landscapefinal
Bulding Soc In Changing Threat Landscapefinal
Mahmoud Yassin
Security operation center (SOC)
Security operation center (SOC)
Ahmed Ayman
IBM Security Software Solutions - Powerpoint
IBM Security Software Solutions - Powerpoint
Thierry Matusiak
Was ist angesagt?
(20)
To Build Or Not To Build: Can SOC-aaS Bridge Your Security Skills Gap?
To Build Or Not To Build: Can SOC-aaS Bridge Your Security Skills Gap?
Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...
IBM-QRadar-Corporate-Online-Training.
IBM-QRadar-Corporate-Online-Training.
ICS security
ICS security
Building a Cyber Security Operations Center for SCADA/ICS Environments
Building a Cyber Security Operations Center for SCADA/ICS Environments
Cyber threat intelligence ppt
Cyber threat intelligence ppt
Walk This Way: CIS CSC and NIST CSF is the 80 in the 80/20 rule
Walk This Way: CIS CSC and NIST CSF is the 80 in the 80/20 rule
IBM QRadar Security Intelligence Overview
IBM QRadar Security Intelligence Overview
Building a Next-Generation Security Operations Center (SOC)
Building a Next-Generation Security Operations Center (SOC)
Vulnerability assessment & Penetration testing Basics
Vulnerability assessment & Penetration testing Basics
Cyber attacks and IT security management in 2025
Cyber attacks and IT security management in 2025
Cybersecurity 1. intro to cybersecurity
Cybersecurity 1. intro to cybersecurity
Building an Analytics - Enabled SOC Breakout Session
Building an Analytics - Enabled SOC Breakout Session
An introduction to SOC (Security Operation Center)
An introduction to SOC (Security Operation Center)
Sosyal Mühendislik
Sosyal Mühendislik
Data Center Security
Data Center Security
Soc
Soc
Bulding Soc In Changing Threat Landscapefinal
Bulding Soc In Changing Threat Landscapefinal
Security operation center (SOC)
Security operation center (SOC)
IBM Security Software Solutions - Powerpoint
IBM Security Software Solutions - Powerpoint
Ähnlich wie Synopsys_site.pptx
Webinar–That is Not How This Works
Webinar–That is Not How This Works
Synopsys Software Integrity Group
Webinar – Risk-based adaptive DevSecOps
Webinar – Risk-based adaptive DevSecOps
Synopsys Software Integrity Group
Webinar–Best Practices for DevSecOps at Scale
Webinar–Best Practices for DevSecOps at Scale
Synopsys Software Integrity Group
Bridging the Security Testing Gap in Your CI/CD Pipeline
Bridging the Security Testing Gap in Your CI/CD Pipeline
DevOps.com
Pentest is yesterday, DevSecOps is tomorrow
Pentest is yesterday, DevSecOps is tomorrow
Amien Harisen Rosyandino
Take Control: Design a Complete DevSecOps Program
Take Control: Design a Complete DevSecOps Program
Deborah Schalm
Take Control: Design a Complete DevSecOps Program
Take Control: Design a Complete DevSecOps Program
DevOps.com
RSA Conference Presentation–Creating a Modern AppSec Toolchain to Quantify Se...
RSA Conference Presentation–Creating a Modern AppSec Toolchain to Quantify Se...
Synopsys Software Integrity Group
Webinar–AppSec: Hype or Reality
Webinar–AppSec: Hype or Reality
Synopsys Software Integrity Group
Webinar–Creating a Modern AppSec Toolchain to Quantify Service Risks
Webinar–Creating a Modern AppSec Toolchain to Quantify Service Risks
Synopsys Software Integrity Group
Scaling AppSec through Education
Scaling AppSec through Education
Grant Ongers
Secure Your DevOps Pipeline Best Practices Meetup 08022024.pptx
Secure Your DevOps Pipeline Best Practices Meetup 08022024.pptx
lior mazor
How to get the best out of DevSecOps - a security perspective
How to get the best out of DevSecOps - a security perspective
Colin Domoney
Webinar–Building A Culture of Secure Programming in Your Organization
Webinar–Building A Culture of Secure Programming in Your Organization
Synopsys Software Integrity Group
Benefits of DevSecOps
Benefits of DevSecOps
Finto Thomas , CISSP, TOGAF, CCSP, ITIL. JNCIS
From Zero to DevSecOps: How to Implement Security at the Speed of DevOps
From Zero to DevSecOps: How to Implement Security at the Speed of DevOps
WhiteSource
Realizing Software Security Maturity: The Growing Pains and Gains
Realizing Software Security Maturity: The Growing Pains and Gains
Priyanka Aash
Outpost24 webinar - application security in a dev ops world-08-2018
Outpost24 webinar - application security in a dev ops world-08-2018
Outpost24
10 things to get right for successful dev secops
10 things to get right for successful dev secops
Mohammed Ahmed
SIG-product-overview.pdf
SIG-product-overview.pdf
Aklnt
Ähnlich wie Synopsys_site.pptx
(20)
Webinar–That is Not How This Works
Webinar–That is Not How This Works
Webinar – Risk-based adaptive DevSecOps
Webinar – Risk-based adaptive DevSecOps
Webinar–Best Practices for DevSecOps at Scale
Webinar–Best Practices for DevSecOps at Scale
Bridging the Security Testing Gap in Your CI/CD Pipeline
Bridging the Security Testing Gap in Your CI/CD Pipeline
Pentest is yesterday, DevSecOps is tomorrow
Pentest is yesterday, DevSecOps is tomorrow
Take Control: Design a Complete DevSecOps Program
Take Control: Design a Complete DevSecOps Program
Take Control: Design a Complete DevSecOps Program
Take Control: Design a Complete DevSecOps Program
RSA Conference Presentation–Creating a Modern AppSec Toolchain to Quantify Se...
RSA Conference Presentation–Creating a Modern AppSec Toolchain to Quantify Se...
Webinar–AppSec: Hype or Reality
Webinar–AppSec: Hype or Reality
Webinar–Creating a Modern AppSec Toolchain to Quantify Service Risks
Webinar–Creating a Modern AppSec Toolchain to Quantify Service Risks
Scaling AppSec through Education
Scaling AppSec through Education
Secure Your DevOps Pipeline Best Practices Meetup 08022024.pptx
Secure Your DevOps Pipeline Best Practices Meetup 08022024.pptx
How to get the best out of DevSecOps - a security perspective
How to get the best out of DevSecOps - a security perspective
Webinar–Building A Culture of Secure Programming in Your Organization
Webinar–Building A Culture of Secure Programming in Your Organization
Benefits of DevSecOps
Benefits of DevSecOps
From Zero to DevSecOps: How to Implement Security at the Speed of DevOps
From Zero to DevSecOps: How to Implement Security at the Speed of DevOps
Realizing Software Security Maturity: The Growing Pains and Gains
Realizing Software Security Maturity: The Growing Pains and Gains
Outpost24 webinar - application security in a dev ops world-08-2018
Outpost24 webinar - application security in a dev ops world-08-2018
10 things to get right for successful dev secops
10 things to get right for successful dev secops
SIG-product-overview.pdf
SIG-product-overview.pdf
Kürzlich hochgeladen
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
Principled Technologies
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
ThousandEyes
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
debabhi2
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
DianaGray10
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Miguel Araújo
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
Pixlogix Infotech
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
Safe Software
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
UK Journal
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
Anna Loughnan Colquhoun
🐬 The future of MySQL is Postgres 🐘
🐬 The future of MySQL is Postgres 🐘
RTylerCroy
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
hans926745
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
Rafal Los
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
lior mazor
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
Martijn de Jong
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
Michael W. Hawkins
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
Maria Levchenko
Kürzlich hochgeladen
(20)
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
🐬 The future of MySQL is Postgres 🐘
🐬 The future of MySQL is Postgres 🐘
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
Synopsys_site.pptx
1.
© 2021 Synopsys,
Inc. 1 Synopsys Leader in Application Security and Quality
2.
© 2021 Synopsys,
Inc. 2 Over 30 Years of leadership, growth and innovation Employees: ~15.000 Engineers: ~6,000 SIG: ~1,500 Engineering culture Global reach 30+ Years of innovation Market Value ~ $45B 2020 Revenue ~ $3.7B $1.4B+ invested in SIG Constant growth 1. Microsoft 2. Oracle 3. SAP 4. Symantec 5. VMware 6. Salesforce 7. Intuit 8. CA Technologies 9. Adobe 10. Teradata 11. Amdocs 12. Cerner 13. Citrix 14. Autodesk 15. Synopsys 16. Sage Group 17. Akamai Technologies 18. Nuance 19. Open Text 20. F5 Networks Top 20 Global Software Companies 15. 0 500 1,000 1,500 2,000 2,500 3,000 3,500 4,000 4,500 $ Millions
3.
© 2021 Synopsys,
Inc. 3 Synopsys SIG – Software Integrity Group 2021 2022
4.
© 2021 Synopsys,
Inc. 4 2021 2020 2019
5.
© 2020 Synopsys,
Inc. 2022 Synopsys is a Leader in the 2022 Gartner® Magic Quadrant for Application Security Testing (AST) for the sixth year in a row. Based on its ability to execute and our completeness of vision, Synopsys is positioned highest and farthest right for the fourth time in a row in the Leaders Quadrant among the 14 AST vendors evaluated by Gartner.
6.
© 2021 Synopsys,
Inc. 6 Integrated Tools Strategy & Planning Maturity Action Plan (MAP) Coverity SAST Black Duck SCA Dynamic Application Security Testing Managed Services Static Application Security Testing Mobile Application Security Testing Penetration Testing Professional Services Industry Solutions Architecture and Design Security Training/ Champion Programs DevSecOps Integration Cloud Security Building Security in Maturity Model (BSIMM) Synopsys Software Security and Quality Portfolio Code Dx & I. Orchestration WhiteHat & Seeker Dynamic Analysis
7.
© 2021 Synopsys,
Inc. 7 The Problem Development and Security Teams are in a hurry to deliver secure software, faster
8.
© 2021 Synopsys,
Inc. 8 Development Reality Business Demands Development Teams + Time to Market Customer Satisfaction Innovation + Meet shorter, faster delivery schedules Avoid cost and time of re-work Maximize developer productivity Meet quality, safety, security requirements Maintain multi- variants of code
9.
© 2021 Synopsys,
Inc. 9 © 2022 Synopsys, Inc. 9 Synopsys Confidential Information One Organized View SAST DAST IAST SCA API Scans Addressing all of the security touchpoints • Only 25 of 122 BSIMM activities are automated • All testing must be tracked – What test type? – What was identified? – What was assigned for remediation? – Who was it assigned to? – Was it completed, and, if so, when? • Goal: eliminate Excel as the tracking tool for testing Lots of tools, lots of activities, no central truth Security Reality Risk Analysis Architecture Analysis Threat Modeling Penetration Testing Edge/Boundary Tests Manual Code Review Malicious Code Detection Automated Tests Manual Tests
10.
© 2021 Synopsys,
Inc. 10 Old tools and methods slow DevOps velocity Pipeline Congestion Large, monolithic AppSec testing tools can congest build, test, and release pipelines. The answer is smaller, purpose built tests run intelligently at the right time in situational context More tools + more testing = more findings that must be correlated, deduplicated and prioritized so developers aren’t overwhelmed and can focus on issues that matter most Findings Overload
11.
© 2021 Synopsys,
Inc. 11 Intelligent Orchestration Intelligent, policy-driven DevSecOps AppSec Program Objectives & Metrics Prioritized tickets for remediation Policies Correlates, prioritizes, tracks remediation, centralizes visibility Code Dx Executes the right tests, at the right time, at the right level Actionable insights into software risk SAST SCA IAST DAST Code Review Threat Model Pen Test Risk Analysis
12.
© 2021 Synopsys,
Inc. 12 Build Secure, High-Quality Software Faster