{"id":14358,"date":"2019-08-17T21:48:00","date_gmt":"2019-08-17T21:48:00","guid":{"rendered":"https:\/\/oxfordcorp.com\/?p=14358"},"modified":"2023-10-18T19:07:45","modified_gmt":"2023-10-18T19:07:45","slug":"identification-and-remediation-of-application-vulnerabilities","status":"publish","type":"post","link":"https:\/\/www.oxfordcorp.com\/es\/insights\/case-study\/identification-and-remediation-of-application-vulnerabilities\/","title":{"rendered":"Identification and Remediation of Application Vulnerabilities"},"content":{"rendered":"<p><strong>INDUSTRY<\/strong><br \/>\nApplication Testing<\/p>\n<p><strong>SERVICES<\/strong><br \/>\nSecure DevOps<br \/>\nStatic and Dynamic Code Analysis<br \/>\nVulnerability Management<\/p>\n<p><strong>SKILLS<\/strong><br \/>\nApplication Security Engineers<br \/>\nDevOps Engineers<br \/>\nThreat Analysts<\/p>\n<h4><em>Secure coding practices for three million lines of code.<\/em><\/h4>\n<p><strong>The Challenge<\/strong><br \/>\nOur client, whose software is used in highly regulated industries, lacked the ability to evaluate its source code for vulnerabilities. Two large applications with different secure software development requirements needed evaluation. In each case we needed to identify and support remediation of vulnerabilities prior to release. Application 1 included 1.7 million lines of code of C#, .NET, 45k lines of VB and required daily reviews. Application 2 had more than two million lines of code. Each application needed to be reviewed three times per year.<\/p>\n<p><strong>The Solution<\/strong><br \/>\nOur team integrated with each application\u2019s build process, scaling with customer requirements. Our process includes the following steps:<\/p>\n<ul>\n<li>Results are analyzed and triaged based on priority and category (false positive, poor practice, valid finding)<\/li>\n<li>Remediation steps are added to the development pipeline<\/li>\n<\/ul>\n<p><strong>The Result<\/strong><br \/>\nAs a result of our solution, our client is able to deliver third party vetted and analyzed software that is developed secure at time of creation, reducing costly reengineering once released in production, enhancing customer satisfaction and end users trust by reducing vulnerabilities.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Discover how Oxford helped our client deliver secure source code. <\/p>\n","protected":false},"author":10,"featured_media":15425,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[181],"tags":[251],"category-tag":[],"class_list":["post-14358","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-case-study","tag-technology-communications"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.1 (Yoast SEO v27.1.1) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Identification and Remediation of Application Vulnerabilities - Oxford Global Resources<\/title>\n<meta name=\"description\" content=\"Discover how Oxford helped our client deliver secure source code.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.oxfordcorp.com\/insights\/case-study\/identification-and-remediation-of-application-vulnerabilities\/\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Identification and Remediation of Application Vulnerabilities\" \/>\n<meta property=\"og:description\" content=\"Discover how Oxford helped our client deliver secure source code.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.oxfordcorp.com\/insights\/case-study\/identification-and-remediation-of-application-vulnerabilities\/\" \/>\n<meta property=\"og:site_name\" content=\"Oxford Global Resources\" \/>\n<meta property=\"article:published_time\" content=\"2019-08-17T21:48:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-10-18T19:07:45+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.oxfordcorp.com\/wp-content\/uploads\/2019\/10\/identification_and_remediation_of_application_vulnerabilities_resized_0.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"516\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Luke Summers\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"Luke Summers\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minuto\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.oxfordcorp.com\/insights\/case-study\/identification-and-remediation-of-application-vulnerabilities\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.oxfordcorp.com\/insights\/case-study\/identification-and-remediation-of-application-vulnerabilities\/\"},\"author\":{\"name\":\"Luke Summers\",\"@id\":\"https:\/\/www.oxfordcorp.com\/de\/#\/schema\/person\/e880f6edc6bcf421204f294431943cd3\"},\"headline\":\"Identification and Remediation of Application Vulnerabilities\",\"datePublished\":\"2019-08-17T21:48:00+00:00\",\"dateModified\":\"2023-10-18T19:07:45+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.oxfordcorp.com\/insights\/case-study\/identification-and-remediation-of-application-vulnerabilities\/\"},\"wordCount\":210,\"image\":{\"@id\":\"https:\/\/www.oxfordcorp.com\/insights\/case-study\/identification-and-remediation-of-application-vulnerabilities\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.oxfordcorp.com\/wp-content\/uploads\/2019\/10\/identification_and_remediation_of_application_vulnerabilities_resized_0.jpeg\",\"keywords\":[\"Technology &amp; Communications\"],\"articleSection\":[\"Case Study\"],\"inLanguage\":\"es\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.oxfordcorp.com\/insights\/case-study\/identification-and-remediation-of-application-vulnerabilities\/\",\"url\":\"https:\/\/www.oxfordcorp.com\/insights\/case-study\/identification-and-remediation-of-application-vulnerabilities\/\",\"name\":\"Identification and Remediation of Application Vulnerabilities - Oxford Global Resources\",\"isPartOf\":{\"@id\":\"https:\/\/www.oxfordcorp.com\/de\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.oxfordcorp.com\/insights\/case-study\/identification-and-remediation-of-application-vulnerabilities\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.oxfordcorp.com\/insights\/case-study\/identification-and-remediation-of-application-vulnerabilities\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.oxfordcorp.com\/wp-content\/uploads\/2019\/10\/identification_and_remediation_of_application_vulnerabilities_resized_0.jpeg\",\"datePublished\":\"2019-08-17T21:48:00+00:00\",\"dateModified\":\"2023-10-18T19:07:45+00:00\",\"author\":{\"@id\":\"https:\/\/www.oxfordcorp.com\/de\/#\/schema\/person\/e880f6edc6bcf421204f294431943cd3\"},\"description\":\"Discover how Oxford helped our client deliver secure source code.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.oxfordcorp.com\/insights\/case-study\/identification-and-remediation-of-application-vulnerabilities\/#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.oxfordcorp.com\/insights\/case-study\/identification-and-remediation-of-application-vulnerabilities\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/www.oxfordcorp.com\/insights\/case-study\/identification-and-remediation-of-application-vulnerabilities\/#primaryimage\",\"url\":\"https:\/\/www.oxfordcorp.com\/wp-content\/uploads\/2019\/10\/identification_and_remediation_of_application_vulnerabilities_resized_0.jpeg\",\"contentUrl\":\"https:\/\/www.oxfordcorp.com\/wp-content\/uploads\/2019\/10\/identification_and_remediation_of_application_vulnerabilities_resized_0.jpeg\",\"width\":1600,\"height\":430,\"caption\":\"identification and remediation of application vulnerabilities resized 0\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.oxfordcorp.com\/insights\/case-study\/identification-and-remediation-of-application-vulnerabilities\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.oxfordcorp.com\/es\/final-homepage-2\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Identification and Remediation of Application Vulnerabilities\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.oxfordcorp.com\/de\/#website\",\"url\":\"https:\/\/www.oxfordcorp.com\/de\/\",\"name\":\"Oxford Global Resources\",\"description\":\"Global\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.oxfordcorp.com\/de\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.oxfordcorp.com\/de\/#\/schema\/person\/e880f6edc6bcf421204f294431943cd3\",\"name\":\"Luke Summers\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/www.oxfordcorp.com\/de\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/3d7d4c9724f33e3a19ac78af573b29ed6164c2ceffe51f72aff7df98b279e3de?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/3d7d4c9724f33e3a19ac78af573b29ed6164c2ceffe51f72aff7df98b279e3de?s=96&d=mm&r=g\",\"caption\":\"Luke Summers\"},\"url\":\"https:\/\/www.oxfordcorp.com\/es\/insights\/author\/lsummersthiel-com\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Identification and Remediation of Application Vulnerabilities - Oxford Global Resources","description":"Discover how Oxford helped our client deliver secure source code.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.oxfordcorp.com\/insights\/case-study\/identification-and-remediation-of-application-vulnerabilities\/","og_locale":"es_ES","og_type":"article","og_title":"Identification and Remediation of Application Vulnerabilities","og_description":"Discover how Oxford helped our client deliver secure source code.","og_url":"https:\/\/www.oxfordcorp.com\/insights\/case-study\/identification-and-remediation-of-application-vulnerabilities\/","og_site_name":"Oxford Global Resources","article_published_time":"2019-08-17T21:48:00+00:00","article_modified_time":"2023-10-18T19:07:45+00:00","og_image":[{"width":1920,"height":516,"url":"https:\/\/www.oxfordcorp.com\/wp-content\/uploads\/2019\/10\/identification_and_remediation_of_application_vulnerabilities_resized_0.jpeg","type":"image\/jpeg"}],"author":"Luke Summers","twitter_card":"summary_large_image","twitter_misc":{"Escrito por":"Luke Summers","Tiempo de lectura":"1 minuto"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.oxfordcorp.com\/insights\/case-study\/identification-and-remediation-of-application-vulnerabilities\/#article","isPartOf":{"@id":"https:\/\/www.oxfordcorp.com\/insights\/case-study\/identification-and-remediation-of-application-vulnerabilities\/"},"author":{"name":"Luke Summers","@id":"https:\/\/www.oxfordcorp.com\/de\/#\/schema\/person\/e880f6edc6bcf421204f294431943cd3"},"headline":"Identification and Remediation of Application Vulnerabilities","datePublished":"2019-08-17T21:48:00+00:00","dateModified":"2023-10-18T19:07:45+00:00","mainEntityOfPage":{"@id":"https:\/\/www.oxfordcorp.com\/insights\/case-study\/identification-and-remediation-of-application-vulnerabilities\/"},"wordCount":210,"image":{"@id":"https:\/\/www.oxfordcorp.com\/insights\/case-study\/identification-and-remediation-of-application-vulnerabilities\/#primaryimage"},"thumbnailUrl":"https:\/\/www.oxfordcorp.com\/wp-content\/uploads\/2019\/10\/identification_and_remediation_of_application_vulnerabilities_resized_0.jpeg","keywords":["Technology &amp; Communications"],"articleSection":["Case Study"],"inLanguage":"es"},{"@type":"WebPage","@id":"https:\/\/www.oxfordcorp.com\/insights\/case-study\/identification-and-remediation-of-application-vulnerabilities\/","url":"https:\/\/www.oxfordcorp.com\/insights\/case-study\/identification-and-remediation-of-application-vulnerabilities\/","name":"Identification and Remediation of Application Vulnerabilities - Oxford Global Resources","isPartOf":{"@id":"https:\/\/www.oxfordcorp.com\/de\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.oxfordcorp.com\/insights\/case-study\/identification-and-remediation-of-application-vulnerabilities\/#primaryimage"},"image":{"@id":"https:\/\/www.oxfordcorp.com\/insights\/case-study\/identification-and-remediation-of-application-vulnerabilities\/#primaryimage"},"thumbnailUrl":"https:\/\/www.oxfordcorp.com\/wp-content\/uploads\/2019\/10\/identification_and_remediation_of_application_vulnerabilities_resized_0.jpeg","datePublished":"2019-08-17T21:48:00+00:00","dateModified":"2023-10-18T19:07:45+00:00","author":{"@id":"https:\/\/www.oxfordcorp.com\/de\/#\/schema\/person\/e880f6edc6bcf421204f294431943cd3"},"description":"Discover how Oxford helped our client deliver secure source code.","breadcrumb":{"@id":"https:\/\/www.oxfordcorp.com\/insights\/case-study\/identification-and-remediation-of-application-vulnerabilities\/#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.oxfordcorp.com\/insights\/case-study\/identification-and-remediation-of-application-vulnerabilities\/"]}]},{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/www.oxfordcorp.com\/insights\/case-study\/identification-and-remediation-of-application-vulnerabilities\/#primaryimage","url":"https:\/\/www.oxfordcorp.com\/wp-content\/uploads\/2019\/10\/identification_and_remediation_of_application_vulnerabilities_resized_0.jpeg","contentUrl":"https:\/\/www.oxfordcorp.com\/wp-content\/uploads\/2019\/10\/identification_and_remediation_of_application_vulnerabilities_resized_0.jpeg","width":1600,"height":430,"caption":"identification and remediation of application vulnerabilities resized 0"},{"@type":"BreadcrumbList","@id":"https:\/\/www.oxfordcorp.com\/insights\/case-study\/identification-and-remediation-of-application-vulnerabilities\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.oxfordcorp.com\/es\/final-homepage-2\/"},{"@type":"ListItem","position":2,"name":"Identification and Remediation of Application Vulnerabilities"}]},{"@type":"WebSite","@id":"https:\/\/www.oxfordcorp.com\/de\/#website","url":"https:\/\/www.oxfordcorp.com\/de\/","name":"Oxford Global Resources","description":"Global","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.oxfordcorp.com\/de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":"Person","@id":"https:\/\/www.oxfordcorp.com\/de\/#\/schema\/person\/e880f6edc6bcf421204f294431943cd3","name":"Luke Summers","image":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/www.oxfordcorp.com\/de\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/3d7d4c9724f33e3a19ac78af573b29ed6164c2ceffe51f72aff7df98b279e3de?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/3d7d4c9724f33e3a19ac78af573b29ed6164c2ceffe51f72aff7df98b279e3de?s=96&d=mm&r=g","caption":"Luke Summers"},"url":"https:\/\/www.oxfordcorp.com\/es\/insights\/author\/lsummersthiel-com\/"}]}},"_links":{"self":[{"href":"https:\/\/www.oxfordcorp.com\/es\/wp-json\/wp\/v2\/posts\/14358","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.oxfordcorp.com\/es\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.oxfordcorp.com\/es\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.oxfordcorp.com\/es\/wp-json\/wp\/v2\/users\/10"}],"replies":[{"embeddable":true,"href":"https:\/\/www.oxfordcorp.com\/es\/wp-json\/wp\/v2\/comments?post=14358"}],"version-history":[{"count":0,"href":"https:\/\/www.oxfordcorp.com\/es\/wp-json\/wp\/v2\/posts\/14358\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.oxfordcorp.com\/es\/wp-json\/wp\/v2\/media\/15425"}],"wp:attachment":[{"href":"https:\/\/www.oxfordcorp.com\/es\/wp-json\/wp\/v2\/media?parent=14358"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.oxfordcorp.com\/es\/wp-json\/wp\/v2\/categories?post=14358"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.oxfordcorp.com\/es\/wp-json\/wp\/v2\/tags?post=14358"},{"taxonomy":"category-tag","embeddable":true,"href":"https:\/\/www.oxfordcorp.com\/es\/wp-json\/wp\/v2\/category-tag?post=14358"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}