|
||||||||||||||||||||||||||||||||||||||||||||||
|
Sentinel Premium EditionWhiteHat Sentinel Premium Edition (PE) is ideal for websites that are permanent, mission-critical, have rigorous compliance requirements, and that the company relies on to serve customers or business partners. These websites also have multi-step form-based processes. PE includes testing for both technical and business logic vulnerabilities. WhiteHat's Threat Research Center performs manual custom testing to identify business logic flaws. The WhiteHat Security experts who uncover these types of vulnerabilities are capable of understanding account structures, contextual logic, and similar characteristics of Web applications. PE comes standard with verified vulnerability reporting.
Business Logic TestingWhiteHat Sentinel Premium Edition is unique in mapping out and testing custom business logic and application workflows, paying particular attention to privileges between roles and users. This type of testing is virtually impossible to automate without human context and understanding of your unique application. WhiteHat Security will map out your application, users, roles, and custom business workflow. WhiteHat Sentinel can then properly test your application for expected business behavior and understand the context of the results. Example application behavior that would be unexpected and unwanted by the business include:
WhiteHat Security will work with you to ensure that the business logic vulnerabilities that WhiteHat Sentinel identifies are real and the intentions and risks associated with those vulnerabilities are understood by you. |
“The ability to leverage software vulnerability information from WhiteHat Sentinel integrated with Archer, enables DTCC to recognize the economic benefit of the completion of remediation tasks with assigned accountability. WhiteHat Sentinel provides excellent software vulnerability information by levels of risk that is aligned with an accountability model within Archer to manage risk and track key performance indicators to measure the health of the vulnerability management process.” Jim Routh, CISO
|
||||||||||||||||||||||||||||||||||||||||||||
|
||||||||||||||||||||||||||||||||||||||||||||||
Website Risk Management | Sentinel Services | Support Plus | Education Services | Events & News |
Resources |
Partners |
About WhiteHat 2011 © Copyright | WhiteHat Security | 3003 Bunker Hill Lane, Santa Clara, CA 95054 | 408.343.8300 | Contact the Webmaster |