SlideShare una empresa de Scribd logo
1 de 1
Descargar para leer sin conexión
a. Seric Systems Ltd, Studio 2004, Abbey Mill Business Centre, Mile End Building, 12 Seedhill Road, Paisley, PA1 1JS.
t. 0141 561 1161 e. info@seric.co.uk w. seric.co.uk tw. @sericsystems
CASE STUDY
PREDICTIVE
ANALYTICS
STORAGE AND
INTEGRATED
SYSTEMS
SOCIAL
BUSINESS AND
COLLABORATION
IT
SECURITY
TRESPASS
Security Vulnerability Scanning
BRIEF
Trespass required a solution which
could scan their website for security
vulnerabilities and ensure that they
were fully compliant with the latest
PCI security standards.
SOLUTION
The Seric solution was IBM Rational
AppScan Standard Edition. AppScan’s
ability to scan a wide range of
applications for security vulnerabilities
with high levels of accuracy,
accompanied by intuitive fix
recommendations, meant that any
security vulnerabilities were resolved
in a timely fashion.
AppScan’s regulatory compliance
reporting templates and console gives
Trespass an enterprise wide visibility
into risks and continuous updates on
remediation progress ensuring
compliance would no longer be
an issue.
OUTCOME
“This solution has dramatically
improved our ability to identify and
correct vulnerabilities on our
e-commerce platforms” Stuart
Melville IT Manager Trespass
“The varying levels of reporting can provide a concise
management view and can easily drill down to a technical
level, which has proved very useful in helping our
developers find the most appropriate response.”
Stuart Melville, IT Manager, Trespass

Más contenido relacionado

La actualidad más candente

Deploying Secure Modern Apps in Evolving Infrastructures
Deploying Secure Modern Apps in Evolving InfrastructuresDeploying Secure Modern Apps in Evolving Infrastructures
Deploying Secure Modern Apps in Evolving InfrastructuresSBWebinars
 
Operationalize with alerting, custom dashboards, and timelines
Operationalize with alerting, custom dashboards, and timelinesOperationalize with alerting, custom dashboards, and timelines
Operationalize with alerting, custom dashboards, and timelinesElasticsearch
 
Best practices for automating cloud security processes with Evident.io and AWS
Best practices for automating cloud security processes with Evident.io and AWSBest practices for automating cloud security processes with Evident.io and AWS
Best practices for automating cloud security processes with Evident.io and AWSAmazon Web Services
 
CyberSecTeam Business Services
CyberSecTeam Business Services CyberSecTeam Business Services
CyberSecTeam Business Services Ettore Galluccio
 
The DevSecOps Showdown: How to Bridge the Gap Between Security and Developers
The DevSecOps Showdown: How to Bridge the Gap Between Security and DevelopersThe DevSecOps Showdown: How to Bridge the Gap Between Security and Developers
The DevSecOps Showdown: How to Bridge the Gap Between Security and DevelopersDevOps.com
 
Palestra de abertura: Evolução e visão do Elastic Security
Palestra de abertura: Evolução e visão do Elastic SecurityPalestra de abertura: Evolução e visão do Elastic Security
Palestra de abertura: Evolução e visão do Elastic SecurityElasticsearch
 
SplunkLive! Customer Presentation--ServiceNow
SplunkLive! Customer Presentation--ServiceNowSplunkLive! Customer Presentation--ServiceNow
SplunkLive! Customer Presentation--ServiceNowSplunk
 
Splunk Discovery Day Düsseldorf 2016 - Splunk für IT Operations
Splunk Discovery Day Düsseldorf 2016 - Splunk für IT OperationsSplunk Discovery Day Düsseldorf 2016 - Splunk für IT Operations
Splunk Discovery Day Düsseldorf 2016 - Splunk für IT OperationsSplunk
 
Building Elastic into security operations
Building Elastic into security operationsBuilding Elastic into security operations
Building Elastic into security operationsElasticsearch
 
Application Security Webcast
Application Security WebcastApplication Security Webcast
Application Security WebcastVlad Styran
 
SCS DevSecOps Seminar - State of DevSecOps
SCS DevSecOps Seminar - State of DevSecOpsSCS DevSecOps Seminar - State of DevSecOps
SCS DevSecOps Seminar - State of DevSecOpsStefan Streichsbier
 
Splunk Discovery Day Düsseldorf 2016
Splunk Discovery Day Düsseldorf 2016Splunk Discovery Day Düsseldorf 2016
Splunk Discovery Day Düsseldorf 2016Splunk
 
A journey from dev ops to devsecops
A journey from dev ops to devsecopsA journey from dev ops to devsecops
A journey from dev ops to devsecopsVeritis Group, Inc
 
Splunk for Monitoring and Diagnostics Breakout Session
Splunk for Monitoring and Diagnostics Breakout SessionSplunk for Monitoring and Diagnostics Breakout Session
Splunk for Monitoring and Diagnostics Breakout SessionSplunk
 
SplunkLive! London 2017 - Building an Analytics Driven Security Operation Cen...
SplunkLive! London 2017 - Building an Analytics Driven Security Operation Cen...SplunkLive! London 2017 - Building an Analytics Driven Security Operation Cen...
SplunkLive! London 2017 - Building an Analytics Driven Security Operation Cen...Splunk
 
Waratek presentation for RANT November 2016
Waratek presentation for RANT November 2016Waratek presentation for RANT November 2016
Waratek presentation for RANT November 2016Waratek Ltd
 
Splunk Discovery Day Düsseldorf 2016 - Splunk für Security
Splunk Discovery Day Düsseldorf 2016 - Splunk für SecuritySplunk Discovery Day Düsseldorf 2016 - Splunk für Security
Splunk Discovery Day Düsseldorf 2016 - Splunk für SecuritySplunk
 
The State of Automation in Security
The State of Automation in SecurityThe State of Automation in Security
The State of Automation in SecurityAlgoSec
 
Waratek Securing Red Hat JBoss from the Inside Out
Waratek Securing Red Hat JBoss from the Inside OutWaratek Securing Red Hat JBoss from the Inside Out
Waratek Securing Red Hat JBoss from the Inside OutWaratek Ltd
 
How to transform developers into security people
How to transform developers into security peopleHow to transform developers into security people
How to transform developers into security peoplePriyanka Aash
 

La actualidad más candente (20)

Deploying Secure Modern Apps in Evolving Infrastructures
Deploying Secure Modern Apps in Evolving InfrastructuresDeploying Secure Modern Apps in Evolving Infrastructures
Deploying Secure Modern Apps in Evolving Infrastructures
 
Operationalize with alerting, custom dashboards, and timelines
Operationalize with alerting, custom dashboards, and timelinesOperationalize with alerting, custom dashboards, and timelines
Operationalize with alerting, custom dashboards, and timelines
 
Best practices for automating cloud security processes with Evident.io and AWS
Best practices for automating cloud security processes with Evident.io and AWSBest practices for automating cloud security processes with Evident.io and AWS
Best practices for automating cloud security processes with Evident.io and AWS
 
CyberSecTeam Business Services
CyberSecTeam Business Services CyberSecTeam Business Services
CyberSecTeam Business Services
 
The DevSecOps Showdown: How to Bridge the Gap Between Security and Developers
The DevSecOps Showdown: How to Bridge the Gap Between Security and DevelopersThe DevSecOps Showdown: How to Bridge the Gap Between Security and Developers
The DevSecOps Showdown: How to Bridge the Gap Between Security and Developers
 
Palestra de abertura: Evolução e visão do Elastic Security
Palestra de abertura: Evolução e visão do Elastic SecurityPalestra de abertura: Evolução e visão do Elastic Security
Palestra de abertura: Evolução e visão do Elastic Security
 
SplunkLive! Customer Presentation--ServiceNow
SplunkLive! Customer Presentation--ServiceNowSplunkLive! Customer Presentation--ServiceNow
SplunkLive! Customer Presentation--ServiceNow
 
Splunk Discovery Day Düsseldorf 2016 - Splunk für IT Operations
Splunk Discovery Day Düsseldorf 2016 - Splunk für IT OperationsSplunk Discovery Day Düsseldorf 2016 - Splunk für IT Operations
Splunk Discovery Day Düsseldorf 2016 - Splunk für IT Operations
 
Building Elastic into security operations
Building Elastic into security operationsBuilding Elastic into security operations
Building Elastic into security operations
 
Application Security Webcast
Application Security WebcastApplication Security Webcast
Application Security Webcast
 
SCS DevSecOps Seminar - State of DevSecOps
SCS DevSecOps Seminar - State of DevSecOpsSCS DevSecOps Seminar - State of DevSecOps
SCS DevSecOps Seminar - State of DevSecOps
 
Splunk Discovery Day Düsseldorf 2016
Splunk Discovery Day Düsseldorf 2016Splunk Discovery Day Düsseldorf 2016
Splunk Discovery Day Düsseldorf 2016
 
A journey from dev ops to devsecops
A journey from dev ops to devsecopsA journey from dev ops to devsecops
A journey from dev ops to devsecops
 
Splunk for Monitoring and Diagnostics Breakout Session
Splunk for Monitoring and Diagnostics Breakout SessionSplunk for Monitoring and Diagnostics Breakout Session
Splunk for Monitoring and Diagnostics Breakout Session
 
SplunkLive! London 2017 - Building an Analytics Driven Security Operation Cen...
SplunkLive! London 2017 - Building an Analytics Driven Security Operation Cen...SplunkLive! London 2017 - Building an Analytics Driven Security Operation Cen...
SplunkLive! London 2017 - Building an Analytics Driven Security Operation Cen...
 
Waratek presentation for RANT November 2016
Waratek presentation for RANT November 2016Waratek presentation for RANT November 2016
Waratek presentation for RANT November 2016
 
Splunk Discovery Day Düsseldorf 2016 - Splunk für Security
Splunk Discovery Day Düsseldorf 2016 - Splunk für SecuritySplunk Discovery Day Düsseldorf 2016 - Splunk für Security
Splunk Discovery Day Düsseldorf 2016 - Splunk für Security
 
The State of Automation in Security
The State of Automation in SecurityThe State of Automation in Security
The State of Automation in Security
 
Waratek Securing Red Hat JBoss from the Inside Out
Waratek Securing Red Hat JBoss from the Inside OutWaratek Securing Red Hat JBoss from the Inside Out
Waratek Securing Red Hat JBoss from the Inside Out
 
How to transform developers into security people
How to transform developers into security peopleHow to transform developers into security people
How to transform developers into security people
 

Destacado

The penal code 1860, Presentation
The penal code 1860, PresentationThe penal code 1860, Presentation
The penal code 1860, Presentationkamrul hasan
 
When the right of private defence of property extends to causing death
When the right of private defence of property extends to causing deathWhen the right of private defence of property extends to causing death
When the right of private defence of property extends to causing deathmukundsarda123
 
Indian Penal Code - by Alvin Jo caleb
Indian Penal Code - by Alvin Jo calebIndian Penal Code - by Alvin Jo caleb
Indian Penal Code - by Alvin Jo calebSchin Dler
 
General exceptions Indian Penal Code, (S. 76 to 106)
General  exceptions Indian Penal Code, (S. 76 to 106)General  exceptions Indian Penal Code, (S. 76 to 106)
General exceptions Indian Penal Code, (S. 76 to 106)Dr. Sandeep Kulshrestha
 

Destacado (7)

The penal code 1860, Presentation
The penal code 1860, PresentationThe penal code 1860, Presentation
The penal code 1860, Presentation
 
Ipc presentation
Ipc presentationIpc presentation
Ipc presentation
 
When the right of private defence of property extends to causing death
When the right of private defence of property extends to causing deathWhen the right of private defence of property extends to causing death
When the right of private defence of property extends to causing death
 
Criminal law.power point
Criminal law.power pointCriminal law.power point
Criminal law.power point
 
Indian Penal Code - by Alvin Jo caleb
Indian Penal Code - by Alvin Jo calebIndian Penal Code - by Alvin Jo caleb
Indian Penal Code - by Alvin Jo caleb
 
General exceptions Indian Penal Code, (S. 76 to 106)
General  exceptions Indian Penal Code, (S. 76 to 106)General  exceptions Indian Penal Code, (S. 76 to 106)
General exceptions Indian Penal Code, (S. 76 to 106)
 
The Indian Penal Code.
The Indian Penal Code.The Indian Penal Code.
The Indian Penal Code.
 

Similar a Seric Systems Helps Trespass Achieve PCI Compliance with IBM AppScan

Secure HANA in the Cloud | Mitigating Internal & External Threats | Symmetry™
Secure HANA in the Cloud | Mitigating Internal & External Threats | Symmetry™ Secure HANA in the Cloud | Mitigating Internal & External Threats | Symmetry™
Secure HANA in the Cloud | Mitigating Internal & External Threats | Symmetry™ Symmetry™
 
Powering DX & Cloud Workloads into Shape with Dynatrace AI at FLG (Sponsored ...
Powering DX & Cloud Workloads into Shape with Dynatrace AI at FLG (Sponsored ...Powering DX & Cloud Workloads into Shape with Dynatrace AI at FLG (Sponsored ...
Powering DX & Cloud Workloads into Shape with Dynatrace AI at FLG (Sponsored ...Amazon Web Services
 
Addressing the Cyber-Security Landscape
Addressing the Cyber-Security LandscapeAddressing the Cyber-Security Landscape
Addressing the Cyber-Security LandscapeePlus
 
Securing 100 products - How hard can it be?
Securing 100 products - How hard can it be?Securing 100 products - How hard can it be?
Securing 100 products - How hard can it be?Priyanka Aash
 
Qualys Corporate Brochure
Qualys Corporate BrochureQualys Corporate Brochure
Qualys Corporate BrochureQualys
 
How to assess the risks in your SAP systems at the push of a button
How to assess the risks in your SAP systems at the push of a buttonHow to assess the risks in your SAP systems at the push of a button
How to assess the risks in your SAP systems at the push of a buttonVirtual Forge
 
BMC - Response to the SolarWinds Breach/Malware
BMC - Response to the SolarWinds Breach/MalwareBMC - Response to the SolarWinds Breach/Malware
BMC - Response to the SolarWinds Breach/MalwareMike Rizzo
 
Streamlining AppSec Policy Definition.pptx
Streamlining AppSec Policy Definition.pptxStreamlining AppSec Policy Definition.pptx
Streamlining AppSec Policy Definition.pptxtmbainjr131
 
Partnership to Capture Indonesia ERP Cloud Trend Opportunities
Partnership to Capture Indonesia ERP Cloud Trend OpportunitiesPartnership to Capture Indonesia ERP Cloud Trend Opportunities
Partnership to Capture Indonesia ERP Cloud Trend OpportunitiesSutedjo Tjahjadi
 
Keeping Up with the ELK Stack: Elasticsearch, Kibana, Beats, and Logstash
Keeping Up with the ELK Stack: Elasticsearch, Kibana, Beats, and LogstashKeeping Up with the ELK Stack: Elasticsearch, Kibana, Beats, and Logstash
Keeping Up with the ELK Stack: Elasticsearch, Kibana, Beats, and LogstashAmazon Web Services
 
Secure Foundations: Why Red Hat Enterprise Linux is not just another Linux di...
Secure Foundations: Why Red Hat Enterprise Linux is not just another Linux di...Secure Foundations: Why Red Hat Enterprise Linux is not just another Linux di...
Secure Foundations: Why Red Hat Enterprise Linux is not just another Linux di...Lucy Huh Kerner
 
Tenable Solutions for Enterprise Cloud Security
Tenable Solutions for Enterprise Cloud SecurityTenable Solutions for Enterprise Cloud Security
Tenable Solutions for Enterprise Cloud SecurityMarketingArrowECS_CZ
 
Democratizing security
Democratizing securityDemocratizing security
Democratizing securitySanjeev Sharma
 
Synopsys_site.pptx
Synopsys_site.pptxSynopsys_site.pptx
Synopsys_site.pptxArthur528009
 
RSA 2021 Navigating the Unknowable: Resilience through Security Chaos Enginee...
RSA 2021 Navigating the Unknowable: Resilience through Security Chaos Enginee...RSA 2021 Navigating the Unknowable: Resilience through Security Chaos Enginee...
RSA 2021 Navigating the Unknowable: Resilience through Security Chaos Enginee...Aaron Rinehart
 
Rational App Scan&Policy Tester
Rational App Scan&Policy TesterRational App Scan&Policy Tester
Rational App Scan&Policy TesterKristina O'Regan
 

Similar a Seric Systems Helps Trespass Achieve PCI Compliance with IBM AppScan (20)

Secure HANA in the Cloud | Mitigating Internal & External Threats | Symmetry™
Secure HANA in the Cloud | Mitigating Internal & External Threats | Symmetry™ Secure HANA in the Cloud | Mitigating Internal & External Threats | Symmetry™
Secure HANA in the Cloud | Mitigating Internal & External Threats | Symmetry™
 
inSOC Sales Deck Dec 2020.pdf
inSOC Sales Deck Dec 2020.pdfinSOC Sales Deck Dec 2020.pdf
inSOC Sales Deck Dec 2020.pdf
 
Powering DX & Cloud Workloads into Shape with Dynatrace AI at FLG (Sponsored ...
Powering DX & Cloud Workloads into Shape with Dynatrace AI at FLG (Sponsored ...Powering DX & Cloud Workloads into Shape with Dynatrace AI at FLG (Sponsored ...
Powering DX & Cloud Workloads into Shape with Dynatrace AI at FLG (Sponsored ...
 
Website Security Service.pdf
Website Security Service.pdfWebsite Security Service.pdf
Website Security Service.pdf
 
Addressing the Cyber-Security Landscape
Addressing the Cyber-Security LandscapeAddressing the Cyber-Security Landscape
Addressing the Cyber-Security Landscape
 
Securing 100 products - How hard can it be?
Securing 100 products - How hard can it be?Securing 100 products - How hard can it be?
Securing 100 products - How hard can it be?
 
Qualys Corporate Brochure
Qualys Corporate BrochureQualys Corporate Brochure
Qualys Corporate Brochure
 
How to assess the risks in your SAP systems at the push of a button
How to assess the risks in your SAP systems at the push of a buttonHow to assess the risks in your SAP systems at the push of a button
How to assess the risks in your SAP systems at the push of a button
 
BMC - Response to the SolarWinds Breach/Malware
BMC - Response to the SolarWinds Breach/MalwareBMC - Response to the SolarWinds Breach/Malware
BMC - Response to the SolarWinds Breach/Malware
 
Streamlining AppSec Policy Definition.pptx
Streamlining AppSec Policy Definition.pptxStreamlining AppSec Policy Definition.pptx
Streamlining AppSec Policy Definition.pptx
 
Introduction to Chaos Engineering
Introduction to Chaos EngineeringIntroduction to Chaos Engineering
Introduction to Chaos Engineering
 
Partnership to Capture Indonesia ERP Cloud Trend Opportunities
Partnership to Capture Indonesia ERP Cloud Trend OpportunitiesPartnership to Capture Indonesia ERP Cloud Trend Opportunities
Partnership to Capture Indonesia ERP Cloud Trend Opportunities
 
Appulse Introduction
Appulse   IntroductionAppulse   Introduction
Appulse Introduction
 
Keeping Up with the ELK Stack: Elasticsearch, Kibana, Beats, and Logstash
Keeping Up with the ELK Stack: Elasticsearch, Kibana, Beats, and LogstashKeeping Up with the ELK Stack: Elasticsearch, Kibana, Beats, and Logstash
Keeping Up with the ELK Stack: Elasticsearch, Kibana, Beats, and Logstash
 
Secure Foundations: Why Red Hat Enterprise Linux is not just another Linux di...
Secure Foundations: Why Red Hat Enterprise Linux is not just another Linux di...Secure Foundations: Why Red Hat Enterprise Linux is not just another Linux di...
Secure Foundations: Why Red Hat Enterprise Linux is not just another Linux di...
 
Tenable Solutions for Enterprise Cloud Security
Tenable Solutions for Enterprise Cloud SecurityTenable Solutions for Enterprise Cloud Security
Tenable Solutions for Enterprise Cloud Security
 
Democratizing security
Democratizing securityDemocratizing security
Democratizing security
 
Synopsys_site.pptx
Synopsys_site.pptxSynopsys_site.pptx
Synopsys_site.pptx
 
RSA 2021 Navigating the Unknowable: Resilience through Security Chaos Enginee...
RSA 2021 Navigating the Unknowable: Resilience through Security Chaos Enginee...RSA 2021 Navigating the Unknowable: Resilience through Security Chaos Enginee...
RSA 2021 Navigating the Unknowable: Resilience through Security Chaos Enginee...
 
Rational App Scan&Policy Tester
Rational App Scan&Policy TesterRational App Scan&Policy Tester
Rational App Scan&Policy Tester
 

Más de William Macleod

3 ways to reduce Oracle license costs
3 ways to reduce Oracle license costs3 ways to reduce Oracle license costs
3 ways to reduce Oracle license costsWilliam Macleod
 
Seric case study Scottish Fire and Rescue Commvault
Seric case study Scottish Fire and Rescue CommvaultSeric case study Scottish Fire and Rescue Commvault
Seric case study Scottish Fire and Rescue CommvaultWilliam Macleod
 
Digital Participation case study
Digital Participation case studyDigital Participation case study
Digital Participation case studyWilliam Macleod
 
Digital Participation infographic
Digital Participation infographicDigital Participation infographic
Digital Participation infographicWilliam Macleod
 
Scottish fire service case study - Data Management
Scottish fire service case study - Data ManagementScottish fire service case study - Data Management
Scottish fire service case study - Data ManagementWilliam Macleod
 

Más de William Macleod (6)

3 ways to reduce Oracle license costs
3 ways to reduce Oracle license costs3 ways to reduce Oracle license costs
3 ways to reduce Oracle license costs
 
Digital Participation
Digital ParticipationDigital Participation
Digital Participation
 
Seric case study Scottish Fire and Rescue Commvault
Seric case study Scottish Fire and Rescue CommvaultSeric case study Scottish Fire and Rescue Commvault
Seric case study Scottish Fire and Rescue Commvault
 
Digital Participation case study
Digital Participation case studyDigital Participation case study
Digital Participation case study
 
Digital Participation infographic
Digital Participation infographicDigital Participation infographic
Digital Participation infographic
 
Scottish fire service case study - Data Management
Scottish fire service case study - Data ManagementScottish fire service case study - Data Management
Scottish fire service case study - Data Management
 

Seric Systems Helps Trespass Achieve PCI Compliance with IBM AppScan

  • 1. a. Seric Systems Ltd, Studio 2004, Abbey Mill Business Centre, Mile End Building, 12 Seedhill Road, Paisley, PA1 1JS. t. 0141 561 1161 e. info@seric.co.uk w. seric.co.uk tw. @sericsystems CASE STUDY PREDICTIVE ANALYTICS STORAGE AND INTEGRATED SYSTEMS SOCIAL BUSINESS AND COLLABORATION IT SECURITY TRESPASS Security Vulnerability Scanning BRIEF Trespass required a solution which could scan their website for security vulnerabilities and ensure that they were fully compliant with the latest PCI security standards. SOLUTION The Seric solution was IBM Rational AppScan Standard Edition. AppScan’s ability to scan a wide range of applications for security vulnerabilities with high levels of accuracy, accompanied by intuitive fix recommendations, meant that any security vulnerabilities were resolved in a timely fashion. AppScan’s regulatory compliance reporting templates and console gives Trespass an enterprise wide visibility into risks and continuous updates on remediation progress ensuring compliance would no longer be an issue. OUTCOME “This solution has dramatically improved our ability to identify and correct vulnerabilities on our e-commerce platforms” Stuart Melville IT Manager Trespass “The varying levels of reporting can provide a concise management view and can easily drill down to a technical level, which has proved very useful in helping our developers find the most appropriate response.” Stuart Melville, IT Manager, Trespass