code security

Code Security (SAST)

Blazingly fast cyber threat remediation.


REQUEST YOUR FREE TRIAL

Please leave this field empty.




 

Fast & collaborative

Identify and remediate cyber threats in a blazingly fast, collaborative environment, with seamlessly integration in your SDLC

Executive overview

Kiuwan SAST offers tailored reports with industry standard security ratings for application security

Set it up

Configure the level of criticality of your applications. Enjoy one of the most comprehensive sets of coding rules.

 

DOWNLOAD DATASHEET

kiuwan code security

The 1 min explainer

Detect and eliminate vulnerabilities

  • Uninitialized Variables
  • Application Misconfiguration
  • Credential/Session Prediction
  • Directory Indexing
  • Insufficient Authorization/Authentication
  • Automatic Reference Counting

  • Cross Site Request Forgery
  • Information Leakage
  • Insufficient Transport Layer Protection
  • Insufficient Binary Protection
  • Cross Site Scripting
  • Injection Attacks

  • Interprocess Communication
  • OS Commanding
  • Insecure Cryptography
  • SQL injection
  • Cryptographic Related Attacks
  • Buffer Overrun

  • Free Non-Heap Variable
  • Use After-Free
  • Double Free/Close
  • Format String Vulnerability
  • Return Pointer To Local
These are just a brief example.
Learn more

 

Full compliance with security market standards

 

security standards

Among others!
Check the OWASP benchmark results below
Check the Kiuwan CWE declaration here

 

… for all major programming languages

 

languages

Among others!
See all

 

 

Fully integrated with your IDE

Kiuwan allows coding rule logic and testing them against your application’s code. Generate a report with the meta information needed to import the rules to your Code Security (SAST) library.

 

REQUEST YOUR FREE TRIAL

 

IDE

 

GOVERNANCE

 

Complete visibility of your entire application portfolio

Objective information to negotiate your SLA’s

Measure external providers, understand their path from a unique vantage point.

governance

 

Make informed decisions

summary governance

 

Decision quadrants

Detect risky applications using different decision quadrants

Evolution

Predictive analytics of the evolution of your application’s portfolio.

Activity

Record the activity of your development teams and software vendors, both in application and maintenance projects or change requests.

REQUEST A FREE TRIAL

 

 

Audit your software deliveries

 

Compare baseline modifications

in order to detect new defects during the development process.

Define checkpoints and audits

tailored to each type of project or change request.

Check control points continuously

during the construction or maintenance phases to ensure that applications do not degrade over time after modifications.

collaboration

 

 

 

Action plans to reduce your risks

 

code security what if analysis

one

Set up
your goals

Determine the effort required by the development teams or the rating you want to achieve

two

Follow
up

Check out the progress & acomplishment of your goals, and avoid deviations

three

Take
action

Kiuwan suggests to you where to act and to what extent. Line of code level, if needed!

 

Kiuwan & OWASP
Amazing results on OWASP Benchmark

 

The OWASP Benchmark is a test suite designed to evaluate the coverage and accuracy of automated vulnerability detection tools. The Benchmark contains thousands of test cases that are fully runnable and exploitable. It considers 11 different types of vulnerabilities, including several injection types such as XSS, weak encryption or trust boundary. For every type, the test cases have real vulnerabilities (true positives) and fake vulnerabilities (false positives) to challenge the tools.
We have run Kiuwan on the OWASP Benchmark test cases and here you have the results. We have added them to the comparison graph published in the OWASP Benchmark website, which include open source and commercial tools. Kiuwan is right up there detecting almost 100% of true positives.
You don’t have to take our word for it: Request a free trial today →

owasp comparison chart

 

REQUEST YOUR FREE TRIAL