Beyond Security Announces beSTORM 2.0
October 30, 2009
Beyond Security Announces beSTORM 2.0
Beyond Security announced the latest version of itssecurity analysis solution, beSTORM 2.0. This version introduces the 80/20 rulefor smart blackbox testing, which enables faster testing by focusing firston known vulnerability patterns before searching for unknown problems. Moreprecisely, the 80/20 rule allows for beSTORM to first test a small group ofknown scenarios that trigger the majority of the security holes in products.
Targeting softwareengineers and developers of IP-based devices and embedded systems, the 80/20rule enables these individuals to leverage the value of fuzzing by making itmore practical to expedite testing for security holes. The 80/20 feature opensfuzzing to legions of developers who would otherwise forgo such testing becauseprolonged test periods are not practical due to time-to-market and costconsiderations.
The new 80/20methodology enables quicker time to market through faster securitycertification testing. The key is in the ability to test in stages. Stage oneis focused on known attack vectors and is typically completed in a matter ofhours. Certification testing is based on stage one testing and indicateswhether or not a product meets security standards based on all known securityissues that exist at that time. Stage two is an exhaustive test that expandsthe scope to unknown problems, or less likely attack vectors. Exhaustivetesting can be completed for all products, but beSTORM provides developers theflexibility to manage the process by conducting mission critical testing beforelaunching into full testing.
beSTORM2.0 employs a client/server architecture and runs on Windows, UNIX, and Linux. Beyond Security is offering a free version, beSTORM Lite, to opensource developers. Contact mailto:[email protected]for more details. In addition, Beyond Security is offering a trial version ofbeSTORM. The fully functional 30-day trial version is limited to the FTP, HTTP1.0, and SIP (a Voice over IP Protocol) protocols; visit http://www.beyondsecurity.com/cgi-bin/bestorm/bestorm-trialdl.cgi.
Beyond Security
Price: Contact Beyond Security
Web Site: http://www.beyondsecurity.com
About the Author
You May Also Like