Download PDF
Contrast Security > Case Studies > Empowering Developers to Deliver Secure Software: A Case Study on a Major North American Insurance Subsidiary
Contrast Security Logo

Empowering Developers to Deliver Secure Software: A Case Study on a Major North American Insurance Subsidiary

Technology Category
  • Application Infrastructure & Middleware - Event-Driven Application
  • Cybersecurity & Privacy - Application Security
Applicable Industries
  • Equipment & Machinery
  • National Security & Defense
Applicable Functions
  • Product Research & Development
  • Quality Assurance
Use Cases
  • Cybersecurity
  • Tamper Detection
Services
  • Cloud Planning, Design & Implementation Services
  • Cybersecurity Services
The Challenge
The North American insurance subsidiary, a part of a global group that ranks among the world’s top providers of both commercial and property/casualty insurance, faced several challenges in its application security. The company wanted to increase awareness among developers about application security risk and safe-coding practices, enable discovery and remediation of vulnerabilities with minimal delays to the development process, reduce the backlog of unaddressed high-risk vulnerabilities, and roll out a global solution to all internal business units and groups. The company's existing application security processes were unsustainable. Vulnerability scanning with the legacy static application security testing (SAST) tool often took hours at a time, and many of the alerts in each report turned out to be false positives, wasting precious time and potentially delaying release cycles.
About The Customer
The North American insurance subsidiary highlighted in this case study has been in business in the United States and Canada for more than 100 years. It is a part of a global group that ranks among the world’s top providers of both commercial and property/casualty insurance. The North American operation has more than 10,000 employees, and its customers represent a wide-ranging diversity of industries. The information security leader for North America has focused on maturing the application security program as a top priority, given that applications are among the favorite targets for cyber criminals.
The Solution
The company shifted application security further left in development with Contrast Assess. The Contrast Customer Success team aided onboarding and provides ongoing support, while Contrast Professional Services helped with implementation and rollout of the solution. Contrast Assess uses instrumentation to embed continuous security scanning within each application, with real-time feedback for developers that gives them guidance on how to remediate problems as they occur. The company also leverages the Contrast platform’s built-in integration with Microsoft Teams to manage vulnerability notifications within the company’s primary collaboration tool. The deployment of Contrast Assess has also been a catalyst for cultural change at the organization, with developers now actively participating in the delivery of secure applications.
Operational Impact
  • The deployment of Contrast Assess has not only improved the company's application security technology but also brought about a cultural change within the organization. Security scans, which used to be perceived as an annoying checkbox, are now seen as an opportunity to make software safer. Developers are now actively participating in the delivery of secure applications, and many of them are excited about it. They have even formed an internal application security community that meets online regularly to discuss ways to write more secure code. The security and development teams are also getting better at prioritizing vulnerabilities. The company is now looking to extend its Contrast Assess deployment to the cloud to support the new infrastructure.
Quantitative Benefit
  • Improved developer productivity by shifting security left in development and reducing amount of time needed to trace source of vulnerabilities and remediate each one
  • Enhanced productivity of application security team by virtually eliminating false positives
  • Augmented security risk posture of applications by reducing mean time to remediate (MTTR)

Related Case Studies.

Contact us

Let's talk!

* Required
* Required
* Required
* Invalid email address
By submitting this form, you agree that IoT ONE may contact you with insights and marketing messaging.
No thanks, I don't want to receive any marketing emails from IoT ONE.
Submit

Thank you for your message!
We will contact you soon.