Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Application Security

8/7/2018
08:20 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

ShiftLeft Demonstrates Application Protection During 14-Day Pen Test

Test measured ShiftLeft's ability to protect a vulnerable application against exploit attempts made by white-hat hackers.

SANTA CLARA, Calif., Aug. 1, 2018 -- ShiftLeft™ Inc., an innovator in application security, today announced the industry’s first public real-world benchmark of its continuous application security solution. The test measured ShiftLeft’s ability to protect a vulnerable application against exploit attempts made by some of industry’s best white-hat hackers. Cobalt.io, the leader in Pen Testing as a Service, performed the penetration testing to provide ethical hacking expertise and an objective third-party perspective.

Lab-based testing provides standardized results, but it cannot emulate the unpredictability of human-driven real-world hacking scenarios. In a lab, common tools may be used to probe the application for potential weaknesses. In the real world, these tools merely inform the attacker, who then seeks to exploit subtle nuances using more complex attacks.

“ShiftLeft's ability to analyze an application in development, in order to automatically protect it in production, enables the company to benchmark themselves in unique ways,” said Vik Phatak, CEO of NSS Labs. “This aligns well with the fast pace of the modern software development lifecycle.”

The testing methodology started by developing an application that included six (6) of the relevant OWASP Top 10 vulnerabilities. Next, two instances of the application were created. One instance was hosted without any security protection. Another instance was protected by ShiftLeft, which extracted the application’s security DNA in order to create a custom security profile that protected the application in runtime.

Finally, Cobalt.io performed a 14-day penetration test against both applications. Cobalt.io had three white-hat hacking experts attack both applications with any and all tools and methods. Cobalt.io was able to find and exploit all six vulnerabilities in the unprotected test application. However, the application protected by ShiftLeft could not be exploited during the test.

“After discovering several vulns in the unprotected application, our experts could no longer exploit in-scope vulns with the ShiftLeft protection in place,” said Brian Levine of Cobalt.io.

“Legacy security products are tested in a legacy fashion: in a test lab, where known tools throw known attack patterns to see if the security products can detect the attacks. This does not represent the real world, where the hackers are not limited to using known tools,” said Manish Gupta, CEO and co-founder of ShiftLeft. “At ShiftLeft, our mission is to protect the application without ever reacting to threats. I am excited to see the positive results of this test, as they demonstrate the power of the ShiftLeft solution.”

About ShiftLeft

ShiftLeft™ Inc., is an innovator in application-specific cloud security, delivering the industry’s first fully automated Security-as-a-Service (SECaaS) solution that understands the unique security needs of each version of each application and creates custom security and threat detection for it. With ShiftLeft, DevOps can make threat detection part of their continuous integration/continuous deployment (CI/CD) process. ShiftLeft’s approach allows teams to both protect their applications immediately and enhance the security posture of their code. The company was founded by a team with extensive backgrounds in security and cloud infrastructure who were early innovators of technologies such as sandbox, Next Generation Firewall, Next Generation Electronic Payment network and Fraud Modeling, and several open source initiatives. Headquartered in Santa Clara, Calif., ShiftLeft is backed by Bain Capital Ventures and Mayfield. For more information, see https://www.shiftleft.io/.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Where Businesses Waste Endpoint Security Budgets
Kelly Sheridan, Staff Editor, Dark Reading,  7/15/2019
US Mayors Commit to Just Saying No to Ransomware
Robert Lemos, Contributing Writer,  7/16/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Building and Managing an IT Security Operations Program
As cyber threats grow, many organizations are building security operations centers (SOCs) to improve their defenses. In this Tech Digest you will learn tips on how to get the most out of a SOC in your organization - and what to do if you can't afford to build one.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-12815
PUBLISHED: 2019-07-19
An arbitrary file copy vulnerability in mod_copy in ProFTPD up to 1.3.5b allows for remote code execution and information disclosure without authentication, a related issue to CVE-2015-3306.
CVE-2019-13569
PUBLISHED: 2019-07-19
A SQL injection vulnerability exists in the Icegram Email Subscribers & Newsletters plugin through 4.1.7 for WordPress. Successful exploitation of this vulnerability would allow a remote attacker to execute arbitrary SQL commands on the affected system.
CVE-2019-9228
PUBLISHED: 2019-07-19
** DISPUTED ** An issue was discovered on AudioCodes Mediant 500L-MSBR, 500-MBSR, M800B-MSBR and 800C-MSBR devices with firmware versions F7.20A at least to 7.20A.252.062. The (1) management SSH and (2) management TELNET features allow remote attackers to cause a denial of service (connection slot e...
CVE-2019-12725
PUBLISHED: 2019-07-19
Zeroshell 3.9.0 is prone to a remote command execution vulnerability. Specifically, this issue occurs because the web application mishandles a few HTTP parameters. An unauthenticated attacker can exploit this issue by injecting OS commands inside the vulnerable parameters.
CVE-2019-11989
PUBLISHED: 2019-07-19
A security vulnerability in HPE IceWall SSO Agent Option and IceWall MFA (Agent module ) could be exploited remotely to cause a denial of service. The versions and platforms of Agent Option modules that are impacted are as follows: 10.0 for Apache 2.2 on RHEL 5 and 6, 10.0 for Apache 2.4 on RHEL 7, ...