Innovation & Quality
LONDON, April 28, 2014 – Quotium, the leading security and quality software provider, today announced the release of Seeker Enterprise 3.0.
Seeker’s innovative technology correlates application behavior with simulated hacker’s attacks to pinpoint vulnerable code. Delivering an application security testing automation process in the development lifecycle, Seeker allows organizations to secure every build, every release and every application without requiring manpower overhead or specific security knowledge.
With Enterprise Version 3.0, Seeker delivers new and unique capabilities that allow organizations to handle software cyber threats in fast-paced development environments.
“In the current cyber threat landscape, organizations cannot afford to look at just one application at a time. They must have a clear view of their overall security status available to them at all times. It is the only way to reduce overall exposure and risk.” says Ofer Maor, Quotium’s CTO
Among the many new features that have been introduced in this version are:
The new dashboards allow executives and managers to view their overall organizational security status, see which systems pose the most threat, which compliance requirements are met and which aren’t.
The enhanced automation capabilities allow better integration in cloud environments, with the ability to fully orchestrate Seeker and automatically run security testing in private cloud settings. Seeker performs automatic results triage via exploitation of vulnerabilities, eliminating the need for human effort as part of the process. This makes Seeker suitable for use by non-security personnel, and easy to place in the hands of developers or DevOps.
Quotium will showcase Seeker at the Infosecurity Europe conference London – booth H78, April 29th-May 1st.
Quotium develops innovative software solutions to guarantee the security and performance of business critical applications throughout their lifecycle. With Seeker, Quotium pioneered the Interactive Application Security Testing (IAST) technology
Seeker is the run-time code & data analysis application security testing solution for the software development life-cycle (SDLC). Seeker assists in vulnerability management by accurately demonstrating risks to business critical data. It can be fully automated and is very suitable for Agile and continuous integration environments.