Cigital Solutions Overview

By: Cigital  06-Dec-2011
Keywords: Software Security

As consultants Cigital’s primary purpose is to help our clients achieve their business goals. Most often we do this through a combination of services and commercially available tools. However, when no tool or service exists to meet the challenges we face - Cigital sometimes creates new technology that can be leveraged by all our clients. The result is Cigital Solutions.

Cigital’s most recognizable solution was the creation of the first commercially available static analysis tool, ITS4 that led to the development of the most successful and largest static analysis tool in the market. We continue to leverage our expertise to help organizations improve software security by offering the following Cigital Solutions.

Secure Coding Training

WBSA alert

Keywords: Software Security

Contact Cigital

Email - none provided

Print this page

Other products and services from Cigital


Cigital Services Overview

Whether you need to build security and quality into your software, improve throughput in application development and delivery, train staff on software security, or meet governance and compliance requirements, Cigital can help. Cigital's services combine best practices, technology, tools and repeatable methodologies with a framework of role-based activities.


Cigital Software Security Program [Cigital

As the business criticality of software grows, ensuring that your company's software and confidential data are protected and secure becomes increasingly important. Cigital assists companies big and small to meet this challenge by providing consulting services across the entire spectrum of software security. A one-stop shop for software security — Cigital's Service offerings span all software security activities including.


Training [Cigital

Integrating these best practices into a secure SDLC requires knowing and understanding non-functional security requirements, common attacks, secure design, and defensive programming, and also subjecting all software artifacts to thorough, objective threat modeling, risk analyses, and security testing.