Application Security

4/18/2018
02:00 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

SAP Security Tool Now Enables Automated QA & Security Checks for SAPUI5

Virtual Forge now offers its CodeProfiler for HANA with support of SAPUI5.

HEIDELBERG, Germany (April 18, 2018) – Virtual Forge, the leading provider of cyber security solutions for SAP®, today announced its CodeProfiler for HANA is now able to scan the SAPUI5 programming language. The company also announced new patents pending for the technology. CodeProfiler for HANA enables companies to run automated quality and security checks on their custom developments as lines of code are being developed on the SAP HANA platform.

SAPUI5 is a modern HTML5-based development toolkit based on JavaScript, CSS and HTML5 that enables one consistent user experience. Custom applications developed with SAPUI5 are responsive across browsers and devices – on smartphones, tablets, and desktops – the UI controls automatically adapt themselves to the capabilities of each device.

Virtual Forge’s CodeProfiler for HANA provides developers with detailed feedback on the code quality  of SAPUI5-based business applications, even as developers write the code – similar to the spell-checking functionality of a word processor. HANA differs fundamentally from other SAP technologies, making it difficult for programmers to maintain the security, performance levels, overall code quality and compliance necessary for custom SAP-developed programs.

CodeProfiler for HANA supports the programmers in an effective way.

The average ERP system based on SAP’s ABAP language contains two million lines of custom programming, and the numbers for customers using the newer HANA technology will probably reach similar statistics. CodeProfiler for HANA is designed to pinpoint and eliminate critical deficiencies in security, compliance, and performance early in the process of creating HANA programs. The technology interfaces with the two development environments used for HANA: Eclipse and SAP’s home-grown Web IDE tool1. It supports the programming languages used in SAP HANA, including SQLScript, XSJS, and SAPUI5.

“Businesses today must work with SAP ERP systems that are not only agile, but enable customer-facing solutions with a user interface that allows for an exciting and richly branded experience,” said Dr. Markus Schumacher, CEO of Virtual Forge. “In order to achieve this, brands must leverage technologies such as SAPUI5, but they must also have reliable protection in place to ensure their custom code and applications are secure from outside malicious attacks.”

The content-checking component offered by both CodeProfiler for ABAP and CodeProfiler for HANA includes key areas of security, compliance and data loss prevention. It also offers quality checks to ensure maintainability, robustness, and performance. Developers can also take advantage of detailed documentation of the test cases at hand. For each test case, CodeProfiler provides extensive documentation that allows a developer to understand the identified problems and associated risks. It also enables the developer to easily mitigate them.

Virtual Forge filed new technology patents for CodeProfiler, which include the following highlights:

  • Overcoming SAST limitations for dynamically typed languages by using a hybrid approach to execute the source code to be analyzed in a controlled execution environment in the form of a virtual machine.
  • Allowing code analysis during the early stages of software development.
  • Reliably reproducing tests and scans of DAST/IAST without side effects.


About Virtual Forge:

Virtual Forge is the leading provider of cyber security solutions for SAP® security. Our mission is to help customers ensure the security and quality of their SAP® systems and applications from the ground up. As pioneers in ABAP® security, we also aid SAP customers around the world in identifying security flaws and risks, fine-tuning the performance of their systems, and avoiding unnecessary investments. Virtual Forge was founded in Heidelberg, Germany, in 2001, and has offices in Heidelberg, Weimar (Germany), and Philadelphia (USA); as well as Singapore, Abu Dhabi, Rotterdam, and Madrid. For more information please visit www.VirtualForge.com.

 

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Meet 'Bro': The Best-Kept Secret of Network Security
Greg Bell, CEO, Corelight,  6/14/2018
Containerized Apps: An 8-Point Security Checklist
Jai Vijayan, Freelance writer,  6/14/2018
Four Faces of Fraud: Identity, 'Fake' Identity, Ransomware & Digital
David Shefter, Chief Technology Officer at Ziften Technologies,  6/14/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-0291
PUBLISHED: 2018-06-20
A vulnerability in the Simple Network Management Protocol (SNMP) input packet processor of Cisco NX-OS Software could allow an authenticated, remote attacker to cause the SNMP application on an affected device to restart unexpectedly. The vulnerability is due to improper validation of SNMP protocol ...
CVE-2018-0292
PUBLISHED: 2018-06-20
A vulnerability in the Internet Group Management Protocol (IGMP) Snooping feature of Cisco NX-OS Software could allow an unauthenticated, adjacent attacker to execute arbitrary code and gain full control of an affected system. The attacker could also cause an affected system to reload, resulting in ...
CVE-2018-0293
PUBLISHED: 2018-06-20
A vulnerability in role-based access control (RBAC) for Cisco NX-OS Software could allow an authenticated, remote attacker to execute CLI commands that should be restricted for a nonadministrative user. The attacker would have to possess valid user credentials for the device. The vulnerability is du...
CVE-2018-0294
PUBLISHED: 2018-06-20
A vulnerability in the write-erase feature of Cisco FXOS Software and Cisco NX-OS Software could allow an authenticated, local attacker to configure an unauthorized administrator account for an affected device. The vulnerability exists because the affected software does not properly delete sensitive...
CVE-2018-0295
PUBLISHED: 2018-06-20
A vulnerability in the Border Gateway Protocol (BGP) implementation of Cisco NX-OS Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition due to the device unexpectedly reloading. The vulnerability is due to incomplete input validation of the BGP update...