itb-nz logo
Story image

Blue Prism achieves highest level of Veracode accreditation

04 Jan 2019

Blue Prism is the first and only robotic process automation (RPA) vendor to achieve the highest level of Veracode Verified, a programme that validates a company’s secure software development processes. 

Blue Prism is also the world’s first software vendor to attain Verified Continuous, Veracode’s top tier and most comprehensive accreditation for integrated and mature secure practices. 

The Veracode Verified accreditation is issued by one of the leading providers of application security, validates Blue Prism’s ongoing commitment and market leadership in prioritising security and creating secure software.

With approximately 30% of all data breaches occurring as a result of a vulnerability at the application layer, software purchasers are demanding more insight into the security of the software they are buying. 

The Veracode Verified seal and attestation provides customers with a way to identify the commitment of individual software vendors to ensuring that their products are secure by design. 

Blue Prism’s Digital Workforce Platform has successfully met the requirements of the Veracode Verified program allowing for better security integration into the development process.

“Blue Prism’s partnership between its security and development teams to ensure secure coding practices was pivotal in the achievement of Verified Continuous,” says Veracode director of customer engagement Asha May.

 “Blue Prism is committed to delivering secure code to help organisations reduce the risk of a major security breach.”

This certification not only validates Blue Prism’s focus on providing an authentically built, enterprise-grade secure solution to this market but is also part of the company’s intrinsic product development methodology. 

By completing and passing rigorous testing, the Veracode Verified program moves Blue Prism beyond point-in-time security testing, into a mature application security program that enforces secure development practice across the entire Software Development Life Cycle (SDLC). 

“Blue Prism’s participation in this programme provides peace of mind to customers and prospects that our RPA platform meets the highest standard of application security, helping reduce risks while mitigating vulnerabilities,” says Blue Prism technology strategy head Colin Redbond. 

“It also further highlights our leadership in RPA security and enables us to help organisations support their PCI-DSS, SANS 25, OWASP and CERT compliant processes while meeting the security and governance requirements in the most highly regulated industries.”

Link image
Webinar: How to stay agile in the face of changing cloud needs for customers
Join the discussion about how to migrate to cloud, adopt AI and bolster CX - and leave with the know-how to advance your business in 2020 and beyond.More
Story image
Cohesity announces integrated, automated disaster recovery
The new solution is integrated with the company’s existing backup and continuous data protection capabilities.More
Story image
Case study: MECCA has HCM makeover with Workday
The phased HCM makeover began in 2017, when the company made the decision to launch a three to five-year program to digitalise its human capital management technology so that it could simplify everyday requirements for its team members and enable them to self-serve. More
Story image
The importance of selecting a secure SD-WAN solution
It’s essential to adopt a secure SD-WAN solution to avoid the risks that an unsecured SD-WAN solution can introduce, writes Wavelink managing director Ilan Rubin.More
Link image
How to effectively accelerate 5G device workflow
Achieving a first-to-market advantage in 5G requires innovative network emulation solutions that accelerate the device workflow. Find the 5G network emulation software that's right for you.More
Story image
From 1G to 5G: How innovations in cellular have shaped our lives
As we look to the present decade from 2020 onwards, 5G will be at the forefront. The race for 5G is not about merely deploying new infrastructure, but getting the first-mover advantage in who can build and take the leadership role in the host of new applications and services that 5G will enable.More