Datasheets

Veracode Corporate Overview

Learn how we help the world's largest enterprises reduce global application risk across web, mobile and third-party applications.

Download now

Application Perimeter Monitoring Datasheet

The Veracode Application Perimeter Monitoring (APM) solution enables enterprises to reduce the risk of data breaches by providing a rapid and massively scalable approach for gathering vulnerability intelligence across every enterprise web application.

Download now

VAST Program for the Enterprise

The Veracode Vendor Application Security Testing (VAST) program helps enterprises better understand and reduce the security risks associated with the use of vendor-supplied software, while strengthening vendor compliance with enterprise application security policy.

Download now

VAST Program for the Independent Software Provider

The Veracode Vendor Application Security Testing (VAST) program helps vendors to manage and reduce security risk in their software offerings, while ensuring compliance with their enterprise customers’ application security policies.

Download now

Veracode Mobile Application Reputation Service

The applications present on mobile devices may pose a significant risk to enterprises embarking on mobility management or BYOD (Bring Your Own Device) programs. Large enterprises are adopting BYOD and mobility management initiatives to reap the benefits of creating new mobile business opportunities and increased productivity accrued when employees can choose their mobile experience by selecting their preferred mobile devices.

Download now

Program Management Services

Veracode’s program management services are designed to ensure successful adoption and utilization of your application security program within your organization. We provide the simplest, fastest and most comprehensive solution to help identify and eradicate the most critical vulnerabilities affecting your software applications.

Download now

Veracode PCI

Veracode's PCI automates and shortens the process for achieving compliance with the application security requirements of PCI-DSS.

Download now

Veracode Results Review FAQs for Vendors

This document addresses many questions often asked upon results being made available to a vendor in an enterprise-vendor relationship.

Download now

Veracode Plugins and APIs

Whether you are developing code in a two-week Scrum Sprint, using continuous integration or a more traditional development model, your security tools should support the model and developer tools that make your team most productive.

Download now

SQL Injection Cheat Sheet

Find out how attackers exploit SQL flaws and how to fix and prevent SQL Injection vulnerabilities.

Download now

Cross-site Scripting Cheat Sheet

As companies are trying to adapt to the fast changing threat landscape today, web applications are becoming increasingly vulnerable to attacks because of vulnerabilities like Cross-site Scripting (XSS).

Download now

Veracode Analytics

Veracode analytics is a first-of-its-kind service that enables enterprises to base their decisions on data amassed from thousands of application scans spanning multiple industries.

Download now

Veracode FISMA Compliance Solution

Veracode's FISMA Compliance Solution helps federal agencies meet application security testing requirements of the Federal Information Security Management Act of 200

Download now

Veracode SDLC

Veracode SDLC enables security teams to conduct security assessments on mission-critical internally developed applications before they ship.

Download now

Remediation and Support Services

The right combination of people, process and technology must be properly aligned to address a problem as complex as application security. Discovering vulnerabilities in your internal, commercial, cloud or mobile applications is simply the first step in your path to application risk management. Effective and on-going remediation, mitigation and validation activities must be carried out to limit the business risks posed by your software infrastructure.

Download now

Veracode Services Overview

Veracode enables customers to progress from ad-hoc testing to a policy-driven application security center of excellence by providing a unique combination of services which fit every organization’s individual needs and are simple to adopt.

Download now

Veracode Mobile SDLC

While a mobile workforce enhances enterprise productivity, it should not come at the expense of enterprise application security and data privacy. Enterprises can embed security within their mobile application development strategy by leveraging Veracode’s simple, proven approach to application security testing.

Download now

Veracode and Good Technology Partnership

Good Technology’s secure mobile application platform, Good Dynamics, enables employees to stay productive on-the-go, while protecting corporate data from hackers and inadvertent data loss. Veracode’s simple, proven approach to testing application code provides enterprises with the assurance that all Good Dynamics-enabled applications comply with the strictest security standards.

Download now

Program Management Services - Customer Implementation Datasheet

Veracode’s program management services are designed to ensure successful adoption of an application security program for each of our customers. This datasheet shows how a Veracode customer was able to leverage Veracode's expertise to design and implement a successful application security program within their organization.

Download now

Veracode Digital Defense Integration

Veracode and Digital Defense have integrated their solutions to enable organizations to get a more comprehensive view of what their application risks are and where those risks reside on their networks. Organizations benefit from a comprehensive “infrastructure map” which layers application level flaws discovered by Veracode’s patented binary static analysis onto DDI’s network vulnerability analysis.

Download now

eLearning

Enterprise developers and security personnel use Veracode to improve their secure coding best practices while meeting corporate training and competency requirements. One of the best ways to ensure application security is to have better educated developers who understand how to avoid some of the common mistakes that lead to serious vulnerabilities.

Download now

Veracode SOX Compliance Solution

Veracode's SOX Compliance Solution helps public companies protect the integrity of their financial data to comply with the Sarbanes-Oxley Act of 2002.

Download now

VerAfied by Veracode

Veracode VerAfied enables organizations to quickly provide details about the security of their applications.

Download now

Sample Contract Language

Here is a sample of a contract.

Download Now