Navigating the security superhighway of application perimeters, vendor software and in house development efforts can be a complex and intimidating task. We aim to shift your efforts to the fast lane with our new program, VAST!

Today marks the official launch of our new Vendor Application Security Testing (VAST) program, designed to help enterprises manage the risks inherent in vendor-supplied software applications.

According to a 2012 study by PWC, less than a fourth of respondents require third-party suppliers or partners to comply with baseline security procedures. With so many data breaches originating with third-party software, it comes as no surprise that governance, risk and compliance efforts are increasingly concerned about the security of all applications across the software supply chain.

“The vast majority of enterprise software is not designed or built with security in mind,” said Bob Brennan, CEO of Veracode. “Veracode can provide immediate insight into the security of the software that runs an organization’s business, and help its software providers remediate those flaws that subject it to being attacked.”

Accompanying our VAST program is our free Secure Software Supply Chain Toolkit! This new kit contains best practices and tools to educate you and your vendors on the steps to securing their applications. In the kit you'll find six resources that will get you on the road to reducing your company’s risk!

Does your enterprise company struggle with third party application security? If so we invite you to take a closer look at our VAST program to learn how we can help your organization become more secure.

About Neil DuPaul

Neil manages the blog pipeline at Veracode, often by fending off eager contributors with a stick. He manages much of the Veracode web presence while also motivating the more introspective Veracoders to be social. Lover of sports and outdoors, and a SERP enthusiast, hit him up on Twitter here.

Comments (0)

Please Post Your Comments & Reviews

Your email address will not be published. Required fields are marked *

Love to learn about Application Security?

Get all the latest news, tips and articles delivered right to your inbox.