New Relic adds proof-of-abuse reporting to its IAST tool

New Relic has introduced enhanced features to its Interactive Application Security Testing (IAST) tool, including a new exploit proof reporting function for more efficient application security testing.

This update allows New Relic customers to uniquely identify exploitable vulnerabilities within their applications, giving them the ability to replicate issues to help remediate specific security threats before releasing new software versions. This advancement helps both security and engineering teams concentrate their efforts on real application security issues, ensuring there are no false positives, according to New Relic.

The introduction of proof-of-exploit reporting significantly improves the application security testing process, enabling New Relic customers to more efficiently identify, verify and remediate exploitable vulnerabilities.

This approach ensures that teams can confidently deploy new code, backed by a guarantee of a 100 percent accuracy rate in detecting real security issues, as validated by the industry-recognized OWASP benchmark.

“Security must be ingrained in the development culture, not just added on. New Relic IAST offers engineering and IT teams the ability to identify real application security risks with the same platform they use to monitor application performance,” said Manav Khurana, Chief Product Officer at New Relic. β€œIt strengthens DevSecOps by bringing developers and security teams together to write secure code that defends against tomorrow’s threats and promotes a proactive security posture. For more than a decade, the New Relic full-stack observation platform has bridged organizational silos by providing a single, trusted source of truth and unified user workflows – and now New Relic IAST advances this mission.”

Other new updates include a new risk exposure and assessment feature that provides visibility into each code change and an immediate impact analysis, detailing the number of applications that would be affected by the vulnerability.

Source link

Leave a Reply

Your email address will not be published. Required fields are marked *