Hy sal jeu bestorm
met sy horings omlaag, met sy voorkop geplooi,
beSTORM Enters Award Program for Outstanding Achievement in Information Technology Security
Its security analysis solution, beSTORM was named in the Reader Trust Award Best Security Software Development Solution category of the competition.
beSTORM was among nearly 400 entries submitted in nine technology categories.
Beyond Security, a leading provider of security assessment technologies, today announced the latest version of its security analysis solution, beSTORM 2.
beSTORM, with its new smart blackbox testing strategy is ideally suited to IP-based devices and embedded systems, providing a practical solution for identifying security holes.
Exhaustive testing can be completed for all products, but beSTORM provides developers the flexibility to manage the process by conducting mission critical testing first, and then launching into full testing when more time can be allocated to the process.
The cumulative result of three years of research and development, beSTORM changes the way security assessment is conducted by uncovering unknown vulnerabilities in network-enabled software applications during the development cycle.
beSTORM arms developers, quality assurance teams and security professionals with a tool that helps them to test for security holes while they are still in the development phase.
Unlike the current generation of assessment tools, beSTORM does not look for specifically defined attack signatures or attempt to locate known vulnerabilities in products and it does not require the source code (like source-code audit tools).
beSTORM focuses on network-enabled applications and models the protocols used to communicate with them.
beSTORM is targeted to software developers and QA professionals, or better yet, security professionals for a software company whose mission is to ensure the security of its solutions before entering the market.