Resources

Filters:
  • 6 Steps to Getting Started with ASRTM

    SD Elements

    Introduction Application Security Requirements and Threat Management (ASRTM) and how to get started with minimal investment.

    View Whitepaper
  • SD Elements Operational Security

    SD Elements

    Learn about support for operational security requirements of application deployment environments in SD Elements.

    View datasheet
  • NY DFS Cybersecurity Regulation Compliance

    SD Elements

    Learn about how Security Compass provides an effective, simple, and scalable solution for complying with NY DFS Cybersecurity Regulation 23 NYCRR P...

    View Whitepaper
  • Gap Analysis of Code Scanners

    SD Elements

    Our report looks at security gaps that code scanners cannot catch (false negatives). Large organizations need a shift left strategy to help manage ...

    View Whitepaper
  • Managing Application Security Webinar

    Advisory

    COO, Rohit Sethi, reveals aggregated insights, industry trends and best practices on how to manage application security at scale.

    View Webinar
  • How to Protect Yourself from WannaCry

    Training

    An overview of the May 2017 WannaCry ransomware attack and how you can protect yourself.

    View Cyber-Attack News
  • Checklist to Ensure the Success of Your Training Program

    Training

    A checklist to help you ensure the success of your training program. Suitable for new Training Enterprise customers.

    View Article
  • Best Practices to Code Securely

    Training

    Tips to help you stay on top of secure coding requirements across Java, PHP, Mobile and .Net.

    View Datasheet
  • How to Avoid the Google Docs Phishing Attack

    Training

    A short overview of the May 2017 Google Docs phishing attack and how you can avoid being attacked.

    View Cyber-Attack News
  • Do you know Mobile Security?

    Training

    A handy guide to implementing the most important mobile security measures.

    View Datasheet
  • Shazam Network

    Training

    SSP Suites helps support SHAZAM's security education needs

    View Case Study
  • Innovapost

    Training

    SSP Suites helps Innovapost kickstart an initiative for enhancing secure development practices for its Application Development teams.

    View Case Study
  • SD Elements and ThreadFix Integration

    SD Elements

    Unifying Security Requirements and Vulnerability Management for Applications

    View Webinar
  • Forrester Report

    SD Elements

    Forrester Total Economic Impact study details ROI for SD Elements at Large Financial Company

    View Case Study
  • AppSec Beyond Scanners

    SD Elements

    We examine the idea of enhancing your security mindset, and evolving your application security programs beyond the reliance on dynamic and static t...

    View Webinar
  • Beat the FISMA Mandated Timeline with Security Compass

    SD Elements

    Security Compass can address the need for compliance by strengthening application security through automated requirements management and training.

    View Datasheet
  • Make Your Security Initiatives Measure Up To BSIMM

    SD Elements

    Learn how SD Elements maps to up to 70% of BSIMM activities.

    View Datasheet
  • Which version of SD Elements is right for your team?

    SD Elements

    A comparison of the three different versions of SD Elements.

    View Datasheet
  • SD Elements Benefits and Business Value

    SD Elements

    A brief description of SD Elements security requirements management, and how it helps organizations develop more secure applications in the most co...

    View Datasheet
  • SD Elements Datasheet

    SD Elements

    List of compliance specifications, regulations, industry standards, development platforms, ALM integrations and security tool integrations supporte...

    View Datasheet
  • BMC Software

    Training

    BMC Software drives business value through application security education

    View Case Study
  • Thrivent

    Training

    CBTs from Security Compass Improve Organization’s Security Awareness

    View Case Study
  • Cubic

    Training

    Leading developer of transportation systems builds security into the SDLC

    View Case Study
  • Square Two

    Training

    SC Training sparks an engaging security culture at SquareTwo Financial

    View Case Study
  • Nurun

    Training

    Design and technology consultants from Security Compass optimize security training investment at Nurun

    View Case Study
  • Ovum On The Radar

    SD Elements

    The security industry is largely focused on detecting security vulnerabilities but less so on preventing these vulnerabilities in the first place. ...

    View Report
  • image32

    SD Elements

    With the help of SD Elements, image32 enables physicians to deliver better patient care.

    View Case Study
  • Health Care Provider

    SD Elements

    Health care plan provider improves application security and reduces audit findings with SD Elements.

    View Case Study
  • How to Add Security Requirements into Different Development Processes

    SD Elements

    Learn how to embed security into three patterns of development: agile, waterfall and continuous development. This whitepaper outlines suggestions f...

    View Whitepaper
  • 5 Steps to Starting a Software Security Requirements Program

    SD Elements

    Security requirements are different. With a good security requirement system, you can determine the relevant threat to your applications in 15 minu...

    View Whitepaper
  • Automated Scaling of Security Requirements

    SD Elements

    Learn how we built a scalable security requirements process to accurately predict over 97% of high risk vulnerabilities in penetration tests. This ...

    View Whitepaper
  • What are Security Requirements?

    SD Elements

    This short article describes security requirements, including differentiating continuous and one-time requirements. The article also describes attr...

    View Article
  • What is Security Testing?

    SD Elements

    This short article discusses common methods for verifying security software, including code review and run-time assessments. The article describes ...

    View Article

Interested in Training? Contact our sales team for a demonstration.