Cigital Software Security Program [Cigital

By: Cigital  06-Dec-2011
Keywords: Software Security, Online Gaming

As the business criticality of software grows, ensuring that your company's software and confidential data are protected and secure becomes increasingly important. Cigital assists companies big and small to meet this challenge by providing consulting services across the entire spectrum of software security. Whether you need application or architecture assessments, penetration testing, up-to-date coding standards or help with tools selection and implementation.. we can help.

A one-stop shop for software security — Cigital's Service offerings span all software security activities including:

In addition to our software security offerings, we have specific solutions and expertise in online gaming. More information can be found here:

Keywords: Online Gaming, Software Security

Contact Cigital

Email - none provided

Print this page

Other products and services from Cigital


Cigital Services Overview

Whether you need to build security and quality into your software, improve throughput in application development and delivery, train staff on software security, or meet governance and compliance requirements, Cigital can help. Cigital's services combine best practices, technology, tools and repeatable methodologies with a framework of role-based activities.


Cigital Solutions Overview

Cigital’s most recognizable solution was the creation of the first commercially available static analysis tool, ITS4 that led to the development of the most successful and largest static analysis tool in the market. When no tool or service exists to meet the challenges we face - Cigital sometimes creates new technology that can be leveraged by all our clients.


Training [Cigital

Integrating these best practices into a secure SDLC requires knowing and understanding non-functional security requirements, common attacks, secure design, and defensive programming, and also subjecting all software artifacts to thorough, objective threat modeling, risk analyses, and security testing.