DevOps.com

  • Latest
    • Articles
    • Features
    • Most Read
    • News
    • News Releases
  • Topics
    • AI
    • Continuous Delivery
    • Continuous Testing
    • Cloud
    • Culture
    • DevSecOps
    • Enterprise DevOps
    • Leadership Suite
    • DevOps Practice
    • ROELBOB
    • DevOps Toolbox
    • IT as Code
  • Videos/Podcasts
    • DevOps Chats
    • DevOps Unbound
  • Webinars
    • Upcoming
    • On-Demand Webinars
  • Library
  • Events
    • Upcoming Events
    • On-Demand Events
  • Sponsored Communities
    • AWS Community Hub
    • CloudBees
    • IT as Code
    • Rocket on DevOps.com
    • Traceable on DevOps.com
    • Quali on DevOps.com
  • Related Sites
    • Techstrong Group
    • Container Journal
    • Security Boulevard
    • Techstrong Research
    • DevOps Chat
    • DevOps Dozen
    • DevOps TV
    • Digital Anarchist
  • Media Kit
  • About
  • AI
  • Cloud
  • Continuous Delivery
  • Continuous Testing
  • DevSecOps
  • Leadership Suite
  • Practices
  • ROELBOB
  • Low-Code/No-Code
  • IT as Code
  • More
    • Application Performance Management/Monitoring
    • Culture
    • Enterprise DevOps

Home » News » Veracode Greenlight Lets Software Developers Spot Security Defects in Seconds, Without Ever Leaving Their Development Environments

Veracode Greenlight Lets Software Developers Spot Security Defects in Seconds, Without Ever Leaving Their Development Environments

By: Jules Louis on January 25, 2017 Leave a Comment

BURLINGTON, Mass. – January 25, 2017 – Veracode, a leader in securing the world’s software, today announced the availability of Veracode Greenlight, a new product to support developers’ need to provide quality, secure code faster than ever before. Veracode Greenlight integrates seamlessly into popular development environments, making security just one more part of the software development process and reducing the disruption and time associated with adopting secure coding practices.

Recent Posts By Jules Louis
  • The Coming Earthquake in IIS and SQL Configuration Management
  • Webinar: Diving Deeper into DevOps Deployments
  • Skytap Simplifies Application Modernization with New Container Management Solution
More from Jules Louis
Related Posts
  • Veracode Greenlight Lets Software Developers Spot Security Defects in Seconds, Without Ever Leaving Their Development Environments
  • Why DevSecOps Should Be Top Priority
  • Functional Safety in Embedded Design Starts with Code Development
    Related Categories
  • Latest News Releases
    Related Topics
  • Veracode Greenlight
Show more
Show less

The short and cyclical nature of DevOps and CI/CD development environments requires developers to maintain a rapid pace of innovation in order to drive business growth. Finding vulnerabilities late in the software lifecycle disrupts this process by slowing down production and release cycles and increasing development costs. According to NIST, fixing vulnerabilities in the coding stage provides a 10x cost savings versus fixing vulnerabilities in the testing stage.

DevOps Connect:DevSecOps @ RSAC 2022

Veracode Greenlight identifies vulnerabilities and provides advice for fixing security defects within the developers’ integrated development environment (IDE). By integrating into existing IDEs, security is embedded directly into the development process so developers can remediate defects at the point with the lowest cost and least amount of disruption. This provides the speed and agility DevOps and CI/DC environments require and helps developers meet both security and functional requirements for their code.

“In working with our customers it has become clear that application security testing must adapt to the continuous development cycle created by DevOps and CI/CD environments,” said Janet Worthington, Product Manager, Veracode. “By enabling developers to test early and often in the development lifecycle and integrating into the existing development toolchains, Greenlight supports developers to achieve their goals while simultaneously enabling organizations to adopt DevSecOps, making secure code one more dimension of quality code.”

Veracode Greenlight scans code through the full SaaS-based Veracode Static Analysis engine to provide a high availability and scalable solution that delivers high accuracy and a low false positive rate. Customers will benefit from a cutting-edge technology, strengthened by more than 10 years of application security expertise. Combined with the Veracode Static Analysis Solution, Veracode Greenlight ensures consistent results for security and development teams enabling applications to pass compliance much faster than if development and security tests were conducted separately and with disparate results.

“Application security is a problem affecting the entire software development lifecycle, not just the quality assurance phase or the development phase,” said Scott Crawford, Research Director for Information Security with 451 Research. “Using Veracode Greenlight to find and fix vulnerabilities early in the development process combined with Veracode’s Static Analysis solution supports an end-to-end approach with technologies that help ensure security with speed and usability for both development and security teams.” 

For more information about Veracode Greenlight visit: https://www.veracode.com/products/greenlight

About Veracode

Veracode is a leader in helping organizations secure the software that powers their world. Veracode’s SaaS platform and integrated solutions help security teams and software developers find and fix security-related defects at all points in the software development lifecycle, before they can be exploited by hackers. Our complete set of offerings help customers reduce the risk of data breaches, increase the speed of secure software delivery, meet compliance requirements, and cost effectively secure their software assets- whether that’s software they make, buy or sell.

Veracode serves over a thousand customers across a wide range of industries, including nearly one-third of the Fortune 100, three of the top four U.S. commercial banks and more than 20 of Forbes’ 100 Most Valuable Brands. Learn more at www.veracode.com, on the Veracode blog and on Twitter.

Copyright © 2006-2016 Veracode, Inc. All Rights Reserved. All other brand names, product names, or trademarks belong to their respective holders.

 

Press and Media Contact for Veracode:

Laura Paine
Veracode
[email protected]
Phone: 1-339-674-1535

Megan Grasty
Highwire PR
[email protected]
Phone: 415-963-4174, x26

 

 

— Jules Louis

Filed Under: Latest News Releases Tagged With: Veracode Greenlight

Sponsored Content
Featured eBook
Hybrid Cloud Security 101

Hybrid Cloud Security 101

No matter where you are in your hybrid cloud journey, security is a big concern. Hybrid cloud security vulnerabilities typically take the form of loss of resource oversight and control, including unsanctioned public cloud use, lack of visibility into resources, inadequate change control, poor configuration management, and ineffective access controls ... Read More
« Platform9 Launches Industry’s First Infrastructure-Agnostic Managed Kubernetes Service
Vidyo Launches Vidyo.io CPaaS for Developers to Easily Embed Industry-Leading Multiparty Video Conferencing into Web, Mobile, and Native Apps »

TechStrong TV – Live

Click full-screen to enable volume control
Watch latest episodes and shows

Upcoming Webinars

Continuous Deployment
Monday, July 11, 2022 - 1:00 pm EDT
Using External Tables to Store and Query Data on MinIO With SQL Server 2022
Tuesday, July 12, 2022 - 11:00 am EDT
Goldilocks and the 3 Levels of Cardinality: Getting it Just Right
Tuesday, July 12, 2022 - 1:00 pm EDT

Latest from DevOps.com

Rust in Linux 5.20 | Deepfake Hiring Fraud | IBM WFH ‘New Normal’
June 30, 2022 | Richi Jennings
Moving From Lift-and-Shift to Cloud-Native
June 30, 2022 | Alexander Gallagher
The Two Types of Code Vulnerabilities
June 30, 2022 | Casey Bisson
Common RDS Misconfigurations DevSecOps Teams Should Know
June 29, 2022 | Gad Rosenthal
Quick! Define DevSecOps: Let’s Call it Development Security
June 29, 2022 | Don Macvittie

Get The Top Stories of the Week

  • View DevOps.com Privacy Policy
  • This field is for validation purposes and should be left unchanged.

Download Free eBook

Hybrid Cloud Security 101
New call-to-action

Most Read on DevOps.com

What Is User Acceptance Testing and Why Is it so Important?
June 27, 2022 | Ron Stefanski
Chip-to-Cloud IoT: A Step Toward Web3
June 28, 2022 | Nahla Davies
DevOps Connect: DevSecOps — Building a Modern Cybersecurity ...
June 27, 2022 | Veronica Haggar
Rust in Linux 5.20 | Deepfake Hiring Fraud | IBM WFH ‘New No...
June 30, 2022 | Richi Jennings
Quick! Define DevSecOps: Let’s Call it Development Security
June 29, 2022 | Don Macvittie

On-Demand Webinars

DevOps.com Webinar ReplaysDevOps.com Webinar Replays
  • Home
  • About DevOps.com
  • Meet our Authors
  • Write for DevOps.com
  • Media Kit
  • Sponsor Info
  • Copyright
  • TOS
  • Privacy Policy

Powered by Techstrong Group, Inc.

© 2022 ·Techstrong Group, Inc.All rights reserved.