Veracode simplifies security policy management for enterprises with mobile apps

 

The consumerization of IT can bring new workforce
efficiencies, as well as potentially devastating enterprise security and
compliance risks. As organizations grapple with the new era of mobile device
management, a one-size-fits-all approach to application security policy
management and compliance isn’t sufficient.

 

Veracode, a
provider of the cloud-based application risk management platform, announced a
more effective approach with the launch of its new Veracode Policy Manager.

 

Veracode Policy Manager allows enterprises to move rapidly from ad-hoc testing to proven and
enforceable security programs and policies for their entire software
application portfolio, including mobile.

 

Veracode currently provides application security
verification across primary mobile platforms – RIM’s BlackBerry operating
system (OS), Windows Mobile, Google’s Android OS and Apple iOS.

 

A cloud-based service, Veracode Policy Manager provides
CISOs with a dashboard that offers a centralized view of their portfolio of
internal and third-party applications with details on how each application is
performing from a policy perspective.

 

Veracode Policy Manager’s easy-to-use interface offers
specific compliance requirement tracking capabilities and enables users to tick
through a series of best practice-based or customizable drop-down menus that identify
appropriate security policy options, including recommended remediation times
based on the criticality of the flaw, criticality of the application and
established CISO requirements.

 

Mobile adoption and related application vulnerabilities
are pushing organizations to think more seriously about software security. The
reality is that mobile apps are no different from other enterprise apps from a
security policy perspective,”said Maria Cirino, chairperson, Veracode Board of
Directors, and managing director, .406 Ventures.

 

“However, many organizations, even those that are serious
about application risk management, are still questioning what those security
policies should be, and how to enforce and report on them,” Cirino added.

 

By TelecomLead.com Team
editor@telecomlead.com

 

Latest

More like this
Related

Telecom news: e& UAE, Huawei, Subex, Samsung

Today’s telecom news includes announcements on e& UAE, Huawei,...

Trump Signs Executive Order to Sell TikTok U.S. Operations for $14 bn, Ensuring Data Security and American Control

U.S. President Donald Trump has signed an executive order...

AT&T Named Fastest Wireless and Fiber Internet Provider in the U.S. by RootMetrics and Ookla

AT&T has cemented its position as the nation’s connectivity...

iPhone 17 Launch: What Smartphone Buyers Need to Know About Apple’s New Lineup

Apple is preparing to unveil its highly anticipated iPhone...