Palamida is the industry's first application security solution exclusively for Open Source Software that uses component-level analysis to quickly identify and track undocumented code and associated security vulnerabilities as well as intellectual property and compliance issues, enabling development organizations to cost-effectively manage and secure mission critical applications and products.

Our Website: http://palamida.com

Latest Content From Palamida

Whitepaper: Software Assurance Protection: Bridging the Gap in Application Security for Open Source

by PalamidaSep 01, 2008

Software security in general, and application security specifically, is a significant element of compliance with the laws, regulations, and policies that govern most organizations and their proprietary data. Weak software security can represent, for example, a significant control deficiency in terms of compliance with the Sarbanes-Oxley Act, the Payment Card Industry Data Security Standard, among others. Different teams within an organization have responsibilities for ensuring the security

Whitepaper: Security Implications of Web 2.0 Services: Undocumented Code and Content is Leaving a Gap in Your Application Security Strategy

by PalamidaJul 01, 2008

Organizations worldwide are embracing and leveraging Web 2.0 for improved products, services, and overall business strategies. The same Web 2.0 characteristics that enable creativity, productivity and collaboration also make the Web 2.0 ecosystem prone to successful attacks and theft. The Web 2.0 global ecosystem increases the vulnerability of distributed software and exposes it to piracy and abuse, especially in places known for intellectual property neglect. User-friendly open source

Whitepaper: How to Lower Your Total Cost of Ownership of Open Source: What IT Executives Need to Know

by PalamidaJun 01, 2008

IT executives at leading organizations have become aware of the need to shift their organizations from cost centers to profit centers by aligning their mission with business requirements and operations. In doing so, they have ensured that their teams are valuable business partners and instrumental in enhancing revenue and profits. One key technology enabler in this new role has been the use open source software in internally developed applications for competitive advantage. Today, developers

Whitepaper: What Every Chief Security Officer and Security Savvy Executive Needs to Know about Open Source Software

by PalamidaJun 01, 2008

An application security for open source strategy requires processes, training and tools. It also requires a partnership between security and engineering teams. The nature of the partnership is based on two key elements. The first element is an accurate inventory of open source components. The second element includes a system to associate the open source projects in use with known and published vulnerabilities, managed by the security team. With new awareness, coupled with robust new tools for

Whitepaper: Undocumented Open Source Leaves a Gap in Your Application Security Strategy

by PalamidaMar 06, 2008

This paper examines the benefits of shifting your security focus to the Open Source Software components in your application layer. Prevalence of Open Source Software in typical company's software and products as well as potential security vulnerabilities and possible solutions to undocumented OSS code are also reviewed in detail.

Application security is more susceptible than ever in today's dynamic application development landscape. Most applications, internal and external,

Whitepaper: An Analysis of the Key Market Segments of Application Security for Open Source Software

by PalamidaMar 06, 2008

This paper will examine four basic market segments of the emerging Application Security Space for Open Source Software (OSS). Included will be a discussion of available tools and strategies for maximizing safe use of OSS during the software development process so as to maintain a high degree of security in a company's critical software applications and products.

The requirement to create and maintain secure applications is challenging one, requiring detailed understanding of the