Today’s software doesn’t exist in isolation; it operates in a complex and hostile ecosystem that makes it vulnerable to attack from multiple points – and that we understand well. For over a decade, organizations have relied on our assessment and training solutions to make the use of software systems safer in the most challenging environments – whether in web applications, IoT devices, or the cloud.
Security Innovation’s roots are in software quality and security. In 2002, we were launched as a consultancy focused on software security analysis for US Department of Defense and software vendors including Microsoft, Adobe, and Symantec. From this evolved training and SDLC assessments to address root causes of vulnerabilities, enabling growth into the financial services, retail, hospitality, and manufacturing industries. With the acquisition of NTRU Cryptosystems in 2009, the company added embedded and IoT security expertise and further expanded into testing “smart” devices for home, energy, and building control.
Security Innovation is trusted worldwide
Our solutions are based on the three pillars of a secure SDLC, which feed into one another to create an ecosystem of repeatable, secure software development: Standards, Education, and Assessment.
Because our solutions span assessment, remediation and training, we understand the systemic causes that lead to vulnerable software. We also develop software products ourselves; thus, we understand the challenges of building security in, trade-offs between functionality and security, and how to take a risk-based approach to vulnerability management.
Software Security Assessments
Unlike others vendors that rely on scanning for broad coverage, our software security experts focus on quality coverage by calibrating the breadth (automation) and depth (experts) of testing to software risk/complexity.
Leveraging our Platform Centers of Excellence, our software security assessments range from a deep, manually intensive test to a more technology driven inspection with expert tool operation and vulnerability verification. Benefits include:
Application Security Consulting
Most vulnerabilities are introduced before a single line of code is written. An architecture and design review casts a critical eye over the security of an application's structure and identifies weaknesses before they propagate into numerous code level vulnerabilities.
IoT & Embedded Security Consulting
The complexity of IoT often results in a massive attack surface. Couple that with evolving security knowledge from the manufacturers of those devices and you have a high-risk environment ripe for exploit. Our services examine your connected solutions at the physical, communications, and software levels:
Knowing the visionary behind Security Innovation
Ed Adams, President & CEO
Ed Adams is a software quality and security expert with over 20 years of experience in the field. He served as a member of the Security Innovation Board of Directors since its inception in 2002 and took over as CEO in 2003. Prior to his work at Security Innovation, Ed held senior management positions at Rational Software, Lionbridge, Ipswitch, and MathSoft. He was also an engineer for the US Army and Foster-Miller earlier in his career.
“Security Innovation is a leader in software security, with over one-third of the Fortune 100 relying on our assessment and training solutions to protect their brands as if they were our own.”