“An Ounce of Prevention, Is Worth a Pound of Cure.”
– Benjamin Franklin
SOFTWARE QUALITY ASSESSMENTS
A 100% analysis of defects.
Is the most thorough process in the industry of forensically analyzing your source code for coding constructs suspect of being high priority bugs or violate important coding practices at a 100% effectiveness levels.
This process can identify failures and additional problems that have escaped the code inspection or testing processes.
Evaluation of overall health.
Evaluate potential upcoming risks created by deficiencies in the engineering quality process.
Top level categories analyzed are Architecture & Design, Structural Metrics, Defensive Programming, Portability and Complexity.
Establishes a plan to improve the systems as necessary by assessing the current state of the software against industry standards and best practices.
This also includes a statistical analysis process (10% – 15%) for defect identification.
Uncover hard to find defects.
The Targeted service consists of a methodical process employing custom search and analysis techniques and methods to identify categories of software errors which are difficult, complex and high value defects to find and fix within source code outside of the scope that standard software quality automation products can identify
MEMORY LEAK DETECTION
Dynamically identifies errors impacting your system’s management of memory resources including data corruption.
MEMORY LEAK DETECTION
Is the process of identifying memory leaks that slowly and wastefully consume machine resources, which leads to overall machine performance degradation or crashing from running out of resources.
They also slow the applications response times to unacceptable levels primarily through increased paging behavior.
Re-examine changed software to ensure risks have been fixed from prior analyses and not re-injected into the software.
PSC will review the changed software to determine if the defects previously identified have been properly corrected in the ‘new’ code base.
This is a quick turn-around, light-weight go-fast service to double check that defects are closed out.
This service does not consider “newly added” code. If the new code-base contains additional functionality/files, it will not be examined for defects
Re-examine new software in between analyses providing valuable insight to your software’s changing risk signature.
This service examines the “additive” or new code against the code-base originally delivered for a prior assessment service.
The entire code-base is reviewed for defects and only defects appearing in new files, significantly changed methods, and new-methods will be assessed.
Get a Free Vulnerability Report!
Let us Give you a DEMO of KASAN!
Or, let’s chat about APPSEC and your Strategy.