HP announces HP Fortify Open Review Project at RSA 2014 Conference

HP-Fortify-On-Demand.jpgThe challenges that face the security industry are daunting. Security keeps getting harder, not easier. The attack surface is constantly expanding. And seemingly anything introduced into a corporate environment can lead to a network compromise. That includes widely used open sourced software.   As part of the  effort to share threat intelligence and give organizations the tools for security success,  HP announced the HP Fortify Open Review Project at RSA 2014 this week.  This initiative provides an in-depth source of security intelligence to both identify and report on security vulnerabilities in widely used open-source software components.

 

Often, relying on open sourced software is the only way to get a project done. However, that also comes with significant security risks. That’s one of the reasons Fortify on Demand has decided to help via the HP Fortify Open Review Project.  Open source community members and software developers can benefit from access to a full set of analysis from HP Fortify and can easily review, comment and act on the findings to improve the security of their software. Additionally, HP has partnered with Sonatype to further reduce the risk introduced by open-source software. With the integration of Sonatype's component life cycle management (CLM) analysis technology, HP Fortify on Demand customers can identify third-party and open-source software components, detect known vulnerabilities or license risk, and prioritize remediation.

 

For more information, and to request a free scan of open source software, visit the HP Fortify Open Review Project  home page.

 

 

Leave a Comment

We encourage you to share your comments on this post. Comments are moderated and will be reviewed
and posted as promptly as possible during regular business hours

To ensure your comment is published, be sure to follow the Community Guidelines.

Be sure to enter a unique name. You can't reuse a name that's already in use.
Be sure to enter a unique email address. You can't reuse an email address that's already in use.
Type the characters you see in the picture above.Type the words you hear.
Search
Showing results for 
Search instead for 
Do you mean 
About the Author


Follow Us
The opinions expressed above are the personal opinions of the authors, not of HP. By using this site, you accept the Terms of Use and Rules of Participation