ShiftLeft Protect is the only code-informed Runtime Protection solution, providing an inside-out approach to automating vulnerability protections at runtime. Protect leverages “code-informed” insights into vulnerabilities discovered in each version of code during the dev cycle, establishing specific security policies to protect the vulnerabilities still present in the runtime environment.
This laser-focused approach to instrumenting security policies based on residual vulnerabilities enables Protect to operate with minimal footprint and overhead. It also enables users to tightly monitor, and automate “blocking or alerting” responses to, any exploitation attempts targeting these vulnerabilities. Where those instances of exploitation attempts occur, Protect informs DevOps so that vulnerabilities can be re-prioritized in the next or future versions of code.
Traditional application security tools such as web application firewalls (WAFs) struggle to keep pace with today’s continuous integration/continuous delivery (CI/CD) environments, where code is changing and being deployed at a rapid pace. These tools were built for more static environments as they require constant tuning to establish baselines, in order to to understand anomalies. The use of these tools today is more of a security checkbox, versus a useful appliance, at best.
ShiftLeft solutions were built to fulfill today’s DevOps requirements through rapid and deep code analysis performed by the code property graph (CPG) built into every ShiftLeft solution. The CPG identifies the vulnerabilities specific to each unique version of code, and it automates the creation of policies for use by Protect, for those vulnerabilities not remediated prior to the release cycle.
ShiftLeft Protect is designed to secure applications automatically at the speed of DevOps. During the development process, ShiftLeft identifies vulnerabilities and potential data leakage scenarios. These are presented to developers to fix; they will typically focus on a subset of the issues identified, depending on the organization’s priorities. The ShiftLeft solution then creates a policy for the ShiftLeft application micro-agent to protect the residual issues in production. The process, from analyzing the new build to enforcing a new policy in production, is fully automated, and it takes just minutes.
Inspect evaluates all the unique elements that make up each version of your application. The in depth scope of analysis performed by Inspect, includes custom code, frameworks, open source libraries, and commercial SDKs and all their dependencies. Through this holistic analysis, Inspect is able to identify even the most complex vulnerabilities found in modern applications, such as multi-stage deserialization vulnerabilities stemming from the way individual components are able interact with each other. Inspect supports seamless integration into CI/CD pipelines
The adoption of microservices, open source libraries, commercial SDKs, and external APIs has dramatically increased the complexity of how data flows into, across, and out of modern applications. The results are regular headlines of major organizations accidentally leaking unencrypted critical data through external APIs, logging services, and/or cloud infrastructure. Furthermore, regulations such as GDPR and the California Consumer Privacy Act of 2018 have significantly expanded the types of data that must be protected.
ShiftLeft automatically identifies critical variables in source code using industry-specific natural language processing (NLP). This enables the CPG to map definitively the exact flow of critical variables across sources, transforms, and sinks. Thus, critical data violations are easily identified in development, before being pushed to production. Organizations using non-standard variable naming conventions can edit the critical data dictionary to customize it to their environments.
Unlike other agents for application performance monitoring or security, Protect’s agent is extremely lightweight. The security profile that Protect is enforcing informed by analyzing source code. Hence, it understands exactly where the application is and is not vulnerable. Thus, Protect does not need to analyze all web traffic, but rather only the tiny fraction going to vulnerable routes. This precision enables Protect to secure the application with virtually no production latency and negligible RAM or CPU footprints.
Application security has traditionally been manual, time-intensive, and computationally expensive. In development, false positives from code analysis, writing QA tests, and patching require many hours from specialized talent. In production, false positives waste time and/or block legitimate traffic. Inline decryption/re-encryption required to inspect encrypted traffic is computationally expensive and adds to the overall complexity.
ShiftLeft significantly reduces these operational inefficiencies by eliminating false positives and automatically creating security profiles that protect the application in runtime. Vulnerabilities are confirmed via test or production traffic, so developers do not waste time fixing false positives. Confirmed vulnerabilities are always delivered to developers with their exact line(s) of code, which further decreases the mean time to repair (MTTR).
Lastly, the computational resources required in production are minimal because of the accuracy of the ShiftLeft solution. ShiftLeft’s application microagent is informed by the security policy exactly how and where the application is vulnerable, so it is extremely precise in how it protects the application. There is no need to decrypt and re-encrypt production traffic because the ShiftLeft micro-agent sees what the application sees.
Based on the above, Shiftleft eliminates inefficiencies across the entire value spectrum and generates economic value. The table below stacks up Shiftleft against current tools in the spectrum.
|Value Driver||Does the Tool Deliver? (For Each Specific Value Driver)|
|Code Analysis Tool||Runtime Protection Tool||Integrated (Analysis + Runtime )|
|Fast speed of code analysis or fast speed of app protection deployment (runtime protection)||No||Yes||Yes (Partially)||Yes||No||Yes|
|Low false positives (misidentification of genuine software interaction as a security issue)||No||No||Yes||Yes (Less Servere)||No||Yes|
|Understanding of app code/semantics (during runtime protection)||N / A||N / A||N / A||No||No||Yes|
|Low performance impact (during runtime)||N / A||N / A||N / A||No||Yes||Yes (very low impact)|