Definitions

Sorry, no definitions found. You may find more data at fortify's.

Etymologies

Sorry, no etymologies found.

Support

Help support Wordnik (and make this page ad-free) by adopting the word Fortify's.

Examples

  • Rob Rachwald, Fortify's director of product marketing, envisions a similar scenario: "Our best guess is that the software was either installed by a rogue employee working inside the firm, who passed the usual vetting procedures, or this was a direct systems attack followed by the insertion of a custom application on Heartland's IT resources," he says.

    Heartland could face litigation over data breach 2009

  • Plans include combining the vulnerability-scanning capabilities HP gained through the SPI Dynamics acquisition with the static analysis in Fortify's product to offer a comprehensive security assessment product for the enterprise, says Mark Sarbiewsi, vice president products for HP Software and Solutions.

    Intel drawn to vibrant security software market 2010

  • Fortify's software examines Scottrade's software code in depth for vulnerabilities as it is written; previously Scottrade tested its software only after it was completed, and then mainly to see if it worked properly, rather than to see how secure it was.

    Where the Holes Are 2008

  • He said Fortify's observations have shown that the main causes of software vulnerabilities stem from the early stages of the software development lifecycle.

    Comments from all Computer Weekly blogs 2010

  • He said Fortify's observations have shown that the main causes of software vulnerabilities stem from the early stages of the software development lifecycle.

    Comments from all Computer Weekly blogs 2010

  • "HP and Fortify's Hybrid 2.0 solution address the biggest application vulnerabilities, resulting in reduced business risk and lowered costs for clients."

    ebizQ Business and IT Agility News 2010

  • "HP and Fortify's Hybrid 2.0 solution address the biggest application vulnerabilities, resulting in reduced business risk and lowered costs for clients."

    ebizQ Business and IT Agility News 2010

  • "Whilst Frash may look attractive to iPhone 4 and 3GS users wanting to surf to extra web sites, the reality is that users will have to jail-break their handsets to install this software, allowing the loading of apps from almost any source," said Barmak Meftah, Fortify's chief products officer.

    CRN Australia - News - 2010

  • He said Fortify's observations have shown that the main causes of software vulnerabilities stem from the early stages of the software development lifecycle.

    Comments from all Computer Weekly blogs 2010

  • He said Fortify's observations have shown that the main causes of software vulnerabilities stem from the early stages of the software development lifecycle.

    Comments from all Computer Weekly blogs 2010

Comments

Log in or sign up to get involved in the conversation. It's quick and easy.