ShiftLeft Illuminate Released
February 18, 2021

ShiftLeft released ShiftLeft Illuminate, a new solution that leverages ShiftLeft technology to identify insider attacks, offer remediation advice and reduce overall risk to organizations’ software code base.

While cyberattacks on the CI/CD pipeline have been theoretical for some time, high-profile breaches over the past year have underscored a clear and urgent need for attention to this area. ShiftLeft Illuminate will help organizations eliminate insider threats within this vulnerable phase of the development pipeline.

According to Verizon’s 2020 Data Breach Investigations Report, “inside actors” are responsible for nearly one-third of data breaches. Many of these insiders have touchpoints with source code, including privileged IT administrators, disgruntled former employees and managerial employees with administrative privileges who can commit code without review. Organizations should also consider the threat from business partners with access to code repositories and nation-state actors weaponizing weaknesses of these parties.

“Recent cyberattacks have highlighted the importance of securing the software supply chain and ensuring that the software shipped is the same as the software developed,” said Manish Gupta, CEO, ShiftLeft. “Identifying such ‘insider attacks’ goes beyond taint-based vulnerability analysis. ShiftLeft's Illuminate helps customers insert insider attack detection in the software supply chain to establish non-repudiation of the software shipped at every stage.”

ShiftLeft Illuminate performs an architecture review to identify the most likely areas for an insider attack. It then creates a Code Property Graph (CPG) fingerprint of the relevant codebase and identifies sources, sinks and transforms to reduce exposure. Running algorithms on the CPG, Illuminate identifies insider attacks and business logic flaws, as well as potentially exploitable areas for insider attack, providing recommendations for reducing future risk. Using Illuminate, organizations can accurately determine if an insider attack has occurred in their source code, helping them to know what and where to monitor within their unique application architecture moving forward.

“Cybersecurity poses a difficult challenge to supply chains, as an organization may be affected by an attack on any other link in the chain,” said Chetan Conikee, CTO, ShiftLeft. “In general, individual nodes in a supply chain (horizontally across SaaS vendors and vertically across the OSS stack) bear the entire cost of their own cybersecurity investments, but some of the benefits of the investments may be enjoyed by the other nodes as well.”

Organizations using ShiftLeft Illuminate are armed with Summary Reports for executive and senior level management, as well as Technical Reports of insider attacks, remediation advice and strategic guidance for longer-term improvement. Illuminate also provides Summary Reports for customers, demonstrating a comprehensive security assessment of the organization’s software development pipeline to eliminate the blind spot around the risk of software consumption that exists today.

Share this

Industry News

November 21, 2024

Red Hat announced the general availability of Red Hat Enterprise Linux 9.5, the latest version of the enterprise Linux platform.

November 21, 2024

Securiti announced a new solution - Security for AI Copilots in SaaS apps.

November 20, 2024

Spectro Cloud completed a $75 million Series C funding round led by Growth Equity at Goldman Sachs Alternatives with participation from existing Spectro Cloud investors.

November 20, 2024

The Cloud Native Computing Foundation® (CNCF®), which builds sustainable ecosystems for cloud native software, has announced significant momentum around cloud native training and certifications with the addition of three new project-centric certifications and a series of new Platform Engineering-specific certifications:

November 20, 2024

Red Hat announced the latest version of Red Hat OpenShift AI, its artificial intelligence (AI) and machine learning (ML) platform built on Red Hat OpenShift that enables enterprises to create and deliver AI-enabled applications at scale across the hybrid cloud.

November 20, 2024

Salesforce announced agentic lifecycle management tools to automate Agentforce testing, prototype agents in secure Sandbox environments, and transparently manage usage at scale.

November 19, 2024

OpenText™ unveiled Cloud Editions (CE) 24.4, presenting a suite of transformative advancements in Business Cloud, AI, and Technology to empower the future of AI-driven knowledge work.

November 19, 2024

Red Hat announced new capabilities and enhancements for Red Hat Developer Hub, Red Hat’s enterprise-grade developer portal based on the Backstage project.

November 19, 2024

Pegasystems announced the availability of new AI-driven legacy discovery capabilities in Pega GenAI Blueprint™ to accelerate the daunting task of modernizing legacy systems that hold organizations back.

November 19, 2024

Tricentis launched enhanced cloud capabilities for its flagship solution, Tricentis Tosca, bringing enterprise-ready end-to-end test automation to the cloud.

November 19, 2024

Rafay Systems announced new platform advancements that help enterprises and GPU cloud providers deliver developer-friendly consumption workflows for GPU infrastructure.

November 19, 2024

Apiiro introduced Code-to-Runtime, a new capability using Apiiro’s deep code analysis (DCA) technology to map software architecture and trace all types of software components including APIs, open source software (OSS), and containers to code owners while enriching it with business impact.

November 19, 2024

Zesty announced the launch of Kompass, its automated Kubernetes optimization platform.

November 18, 2024

MacStadium announced the launch of Orka Engine, the latest addition to its Orka product line.