Fortify Software is the leader in the category of Software Security Assurance. We provide unique security solutions that protect government agencies from today's greatest security risk: the software that runs their agencies. Government organizations throughout the US and across the globe are experiencing dramatic increases in the quantity and sophistication of cyber crime attacks. The hackers include foreign governments, organized crime, and even individuals.

As a result of the recent increase, several compliance regulations, such as FISMA, have been developed to help government agencies understand what steps need to be taken. However most agencies find they must go beyond FISMA to ensure they are protecting the software that runs their agencies and the securing their confidential data. Fortify offers a comprehensive suite of solutions, which enables an agency to conduct static analysis of an application's source code and dynamic analysis of a running application.

Our Website: http://www.fortify.com

Latest Content From Fortify

Whitepaper: Ready, Aim, Fortify! U.S. Army Deploys Application Security Regimen for its Munitions System

by FortifyFeb 16, 2010

U.S. Army Deploys Application Security Regimen for its Munitions System

The Total Ammunition Management Information System (TAMIS) is the U.S. Army application that manages conventional munitions for wartime, training and testing operations across the U.S. Armed Forces.

TAMIS handles approximately 350,000 ammunition transactions per month from units located all around the world, supporting more than 7,000 authorized personnel who request, approve and

Whitepaper: Application Security's Role in FISMA Compliance

by FortifyDec 17, 2009

The Federal Information Security Management Act of 2002 provides a comprehensive framework for ensuring effective information security controls for all federal information and assets. The Act aims to bolster computer and network security within the Federal Government by mandating periodic audits. Based on this framework, FISMA mandates that all government agencies report their overall security posture to the Office of Management and Budget, which in turn reports to Congress annually.

Whitepaper: A CISO's Guide to Application Security

by FortifyNov 24, 2009

Security breaches are expensive. They cost time, effort, remediation, and reputation restoration. Many IT decision-makers tend to focus their security efforts almost exclusively at the network perimeter. They overlook the software applications that run their day-to-day agencies. These applications are often packed with Social Security numbers, addresses, personal health information, or other sensitive data.

Focusing on security features at both the infrastructure and application level

Whitepaper: Best Practices: ProveIT Case Study for U.S. Air Force Software Assurance Center of Excellence

by FortifyOct 23, 2009

ProveIT case studies provide government end users with assessments of IT solutions. This ProveIT case study examines a U.S. Air Force initiative to implement application security/software assurance practices following the massive breach of an Air Force information system.

The U.S. Air Force began realizing that it had been losing unknown quantities of data and information. These data losses came about as the Air Force moved from using closed systems or client-server systems to the