Application Security

4/18/2018
02:00 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

SAP Security Tool Now Enables Automated QA & Security Checks for SAPUI5

Virtual Forge now offers its CodeProfiler for HANA with support of SAPUI5.

HEIDELBERG, Germany (April 18, 2018) – Virtual Forge, the leading provider of cyber security solutions for SAP®, today announced its CodeProfiler for HANA is now able to scan the SAPUI5 programming language. The company also announced new patents pending for the technology. CodeProfiler for HANA enables companies to run automated quality and security checks on their custom developments as lines of code are being developed on the SAP HANA platform.

SAPUI5 is a modern HTML5-based development toolkit based on JavaScript, CSS and HTML5 that enables one consistent user experience. Custom applications developed with SAPUI5 are responsive across browsers and devices – on smartphones, tablets, and desktops – the UI controls automatically adapt themselves to the capabilities of each device.

Virtual Forge’s CodeProfiler for HANA provides developers with detailed feedback on the code quality  of SAPUI5-based business applications, even as developers write the code – similar to the spell-checking functionality of a word processor. HANA differs fundamentally from other SAP technologies, making it difficult for programmers to maintain the security, performance levels, overall code quality and compliance necessary for custom SAP-developed programs.

CodeProfiler for HANA supports the programmers in an effective way.

The average ERP system based on SAP’s ABAP language contains two million lines of custom programming, and the numbers for customers using the newer HANA technology will probably reach similar statistics. CodeProfiler for HANA is designed to pinpoint and eliminate critical deficiencies in security, compliance, and performance early in the process of creating HANA programs. The technology interfaces with the two development environments used for HANA: Eclipse and SAP’s home-grown Web IDE tool1. It supports the programming languages used in SAP HANA, including SQLScript, XSJS, and SAPUI5.

“Businesses today must work with SAP ERP systems that are not only agile, but enable customer-facing solutions with a user interface that allows for an exciting and richly branded experience,” said Dr. Markus Schumacher, CEO of Virtual Forge. “In order to achieve this, brands must leverage technologies such as SAPUI5, but they must also have reliable protection in place to ensure their custom code and applications are secure from outside malicious attacks.”

The content-checking component offered by both CodeProfiler for ABAP and CodeProfiler for HANA includes key areas of security, compliance and data loss prevention. It also offers quality checks to ensure maintainability, robustness, and performance. Developers can also take advantage of detailed documentation of the test cases at hand. For each test case, CodeProfiler provides extensive documentation that allows a developer to understand the identified problems and associated risks. It also enables the developer to easily mitigate them.

Virtual Forge filed new technology patents for CodeProfiler, which include the following highlights:

  • Overcoming SAST limitations for dynamically typed languages by using a hybrid approach to execute the source code to be analyzed in a controlled execution environment in the form of a virtual machine.
  • Allowing code analysis during the early stages of software development.
  • Reliably reproducing tests and scans of DAST/IAST without side effects.


About Virtual Forge:

Virtual Forge is the leading provider of cyber security solutions for SAP® security. Our mission is to help customers ensure the security and quality of their SAP® systems and applications from the ground up. As pioneers in ABAP® security, we also aid SAP customers around the world in identifying security flaws and risks, fine-tuning the performance of their systems, and avoiding unnecessary investments. Virtual Forge was founded in Heidelberg, Germany, in 2001, and has offices in Heidelberg, Weimar (Germany), and Philadelphia (USA); as well as Singapore, Abu Dhabi, Rotterdam, and Madrid. For more information please visit www.VirtualForge.com.

 

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Higher Education: 15 Books to Help Cybersecurity Pros Be Better
Curtis Franklin Jr., Senior Editor at Dark Reading,  12/12/2018
Worst Password Blunders of 2018 Hit Organizations East and West
Curtis Franklin Jr., Senior Editor at Dark Reading,  12/12/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
10 Best Practices That Could Reshape Your IT Security Department
This Dark Reading Tech Digest, explores ten best practices that could reshape IT security departments.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-20161
PUBLISHED: 2018-12-15
A design flaw in the BlinkForHome (aka Blink For Home) Sync Module 2.10.4 and earlier allows attackers to disable cameras via Wi-Fi, because incident clips (triggered by the motion sensor) are not saved if the attacker's traffic (such as Dot11Deauth) successfully disconnects the Sync Module from the...
CVE-2018-20159
PUBLISHED: 2018-12-15
i-doit open 1.11.2 allows Remote Code Execution because ZIP archives are mishandled. It has an upload feature that allows an authenticated user with the administrator role to upload arbitrary files to the main website directory. Exploitation involves uploading a ".php" file within a "...
CVE-2018-20157
PUBLISHED: 2018-12-15
The data import functionality in OpenRefine through 3.1 allows an XML External Entity (XXE) attack through a crafted (zip) file, allowing attackers to read arbitrary files.
CVE-2018-20154
PUBLISHED: 2018-12-14
The WP Maintenance Mode plugin before 2.0.7 for WordPress allows remote authenticated users to discover all subscriber e-mail addresses.
CVE-2018-20155
PUBLISHED: 2018-12-14
The WP Maintenance Mode plugin before 2.0.7 for WordPress allows remote authenticated subscriber users to bypass intended access restrictions on changes to plugin settings.