DevOps.com

  • Latest
    • Articles
    • Features
    • Most Read
    • News
    • News Releases
  • Topics
    • AI
    • Continuous Delivery
    • Continuous Testing
    • Cloud
    • Culture
    • DevSecOps
    • Enterprise DevOps
    • Leadership Suite
    • DevOps Practice
    • ROELBOB
    • DevOps Toolbox
    • IT as Code
  • Videos/Podcasts
    • DevOps Chats
    • DevOps Unbound
  • Webinars
    • Upcoming
    • On-Demand Webinars
  • Library
  • Events
    • Upcoming Events
    • On-Demand Events
  • Sponsored Communities
    • AWS Community Hub
    • CloudBees
    • IT as Code
    • Rocket on DevOps.com
    • Traceable on DevOps.com
    • Quali on DevOps.com
  • Related Sites
    • Techstrong Group
    • Container Journal
    • Security Boulevard
    • Techstrong Research
    • DevOps Chat
    • DevOps Dozen
    • DevOps TV
    • Digital Anarchist
  • Media Kit
  • About
  • AI
  • Cloud
  • Continuous Delivery
  • Continuous Testing
  • DevSecOps
  • Leadership Suite
  • Practices
  • ROELBOB
  • Low-Code/No-Code
  • IT as Code
  • More
    • Application Performance Management/Monitoring
    • Culture
    • Enterprise DevOps

Home » Latest News Releases » Aricent Launches Intelligent Security Automation System

Aricent Launches Intelligent Security Automation System

By: DevOps.com on February 27, 2018 Leave a Comment

Companies can catch product and infrastructure vulnerabilities faster and earlier in the DevOps cycle

Recent Posts By DevOps.com
  • Global Next-Generation Software Engineering Conference
  • Akamai Security Research: Financial Services Continues Getting Bombarded with Credential Stuffing and Web Application Attacks
  • Vulcan Cyber Announces New Chief Revenue Officer and Internal Promotions to Accelerate Rapid Growth
More from DevOps.com
Related Posts
  • Aricent Launches Intelligent Security Automation System
  • Researchers Find Privilege Escalation Vulnerability in GitHub Repos
  • Understanding SaaS Security for DevOps
    Related Categories
  • Latest News Releases
Show more
Show less

MOBILE WORLD CONGRESS, Barcelona, and Santa Clara, California — February 27, 2018 — Aricent, a leading global design and engineering company, today announced the launch of its Highly Automated Vulnerability Assessment Orchestration Containers (HAVOC) framework that manages cyber risk by catching significant security vulnerabilities before they are exploited.

DevOps Connect:DevSecOps @ RSAC 2022

Companies are under pressure to launch products and services faster without exposing themselves to cyber risk. However, shorter time to market lifecycles and latent vulnerabilities raises the likelihood of more successful denial of service attacks and data breaches. Aricent’s HAVOC solution addresses the need to understand the nature of vulnerability risk through a combination of precision coverage, superior probability and statistics, and speed of decision making.

According to researchers, the costs of ransomware in 2015 was $325m and rose to $5bn in 2017. In the next five years, the cost could reach $8 trillion. Conventional security management of products is based upon monolithic risk models with infrequent pre-release tests and random post-deployment assessments. These methods are unable to keep up with the advancing threat levels to product security and are not evolved to accommodate the speed and rigor of Agile or DevOps processes.

While latent software defects will always exist, the challenge is remediating vulnerabilities that can be readily exploited. Through a high-performance graph database, the tool reduces the time to prioritize and correlate thousands of findings that can span software source code, run-times, protocols stack, application interfaces and cloud-native implementations. HAVOC increases speed, verification and frequency of build, test and deployments lifecycles.  This results in safer, more secure applications and safeguards businesses from legal, business and economic problems.

“The idea is to create as much deliberate “havoc” on a network or product so when they get hacked, and they will, the hurdle for compromise is extremely high or hopefully non-existent. For example, we worked with a large cloud provider to shift security testing of OpenStack services much earlier in the lifecycle. We orchestrated best of breed vulnerability scanners from static code analysis, penetrating testing and quality assurance, to generate detained findings to fix what matters most.” said Walid Negm, Chief Technology Officer at Aricent.

About Aricent

Aricent is a global design and engineering company innovating for customers in the digital era. We help our clients lead into the future by solving their most complex and mission critical issues through customized solutions. For decades, we have helped companies do new things and scale with intention. We bring differentiated value and capability in focused industries to help transform products, brands and companies. Based in San Francisco, frog, the global leader in innovation and design, is a part of Aricent. Learn more about Aricent at https://www.aricent.com/

Media Contacts

Aricent media and analysts contact:
[email protected]

Filed Under: Latest News Releases

Sponsored Content
Featured eBook
The State of Open Source Vulnerabilities 2020

The State of Open Source Vulnerabilities 2020

Open source components have become an integral part of today’s software applications — it’s impossible to keep up with the hectic pace of release cycles without them. As open source usage continues to grow, so does the number of eyes focused on open source security research, resulting in a record-breaking ... Read More
« Standardization, De Facto Style
How to Deploy a Container to the Cloud »

TechStrong TV – Live

Click full-screen to enable volume control
Watch latest episodes and shows

Upcoming Webinars

Deploying Microservices With Pulumi & AWS Lambda
Tuesday, June 28, 2022 - 3:00 pm EDT
Boost Your Java/JavaScript Skills With a Multi-Experience Platform
Wednesday, June 29, 2022 - 3:30 pm EDT
Closing the Gap: Reducing Enterprise AppSec Risks Without Disrupting Deadlines
Thursday, June 30, 2022 - 11:00 am EDT

Latest from DevOps.com

DevOps Connect: DevSecOps — Building a Modern Cybersecurity Practice
June 27, 2022 | Veronica Haggar
What Is User Acceptance Testing and Why Is it so Important?
June 27, 2022 | Ron Stefanski
Developer’s Guide to Web Application Security
June 24, 2022 | Anas Baig
Cloudflare Outage Outrage | Yet More FAA 5G Stupidity
June 23, 2022 | Richi Jennings
The Age of Software Supply Chain Disruption
June 23, 2022 | Bill Doerrfeld

Get The Top Stories of the Week

  • View DevOps.com Privacy Policy
  • This field is for validation purposes and should be left unchanged.

Download Free eBook

The 101 of Continuous Software Delivery
New call-to-action

Most Read on DevOps.com

Four Steps to Avoiding a Cloud Cost Incident
June 22, 2022 | Asim Razzaq
How FinOps Can Optimize Cloud Costs and Drive Innovation
June 21, 2022 | Larry Cusick
The Age of Software Supply Chain Disruption
June 23, 2022 | Bill Doerrfeld
Survey Uncovers Depth of Open Source Software Insecurity
June 21, 2022 | Mike Vizard
At Some Point, We’ve Shifted Too Far Left
June 22, 2022 | Don Macvittie

On-Demand Webinars

DevOps.com Webinar ReplaysDevOps.com Webinar Replays
  • Home
  • About DevOps.com
  • Meet our Authors
  • Write for DevOps.com
  • Media Kit
  • Sponsor Info
  • Copyright
  • TOS
  • Privacy Policy

Powered by Techstrong Group, Inc.

© 2022 ·Techstrong Group, Inc.All rights reserved.