Synopsys Releases Seeker 3.8 Runtime Security Analysis Tool for Web Applications

MOUNTAIN VIEW, Calif., July 25, 2016 — (PRNewswire) —  


  • Integration with Protecode Supply Chain (SC) to detect known vulnerabilities in open source and third-party software components.
  • Improved ease of use and deployment
  • Broadened technology support, including MongoDB and PHP 7


Synopsys, Inc. Logo.

Synopsys, Inc. (Nasdaq: SNPS) today announced the version 3.8 release of its Seeker® product, the company's innovative runtime security analysis solution and one of the latest additions to its Software Integrity Platform. Seeker analyzes web application code and data flows at runtime using a technique known as an Interactive Application Security Testing (IAST), which detects and confirms exploitable security vulnerabilities and provides actionable guidance that enables developers to address their root causes with ease. The Seeker 3.8 release includes improvements to its security analysis, usability and technology support.

Most notably, Seeker 3.8 now has the ability to detect known vulnerabilities in web applications' open source and third-party software components through a turnkey integration with Synopsys' Protecode™ Supply Chain (SC) technology. Seeker 3.8 automatically scans target web application binaries and produces a list of the detected open source and third-party dependencies (also known as a software bill of materials), a list of known vulnerabilities affecting its components, and pertinent software license attributes. This feature provides coverage for "A9 – Using Components with Known Vulnerabilities," one of the OWASP Top 10 most critical web application security flaws.

"Modern web applications depend on an increasingly vast and complex supply chain of open source and third-party software components," said Andreas Kuehlmann, senior vice president and general manager of Synopsys' Software Integrity Group. "There are thousands of known vulnerabilities that affect commonly used components, and they represent low-hanging fruit for attackers. Software composition analysis is an invaluable complement to Seeker's runtime security analysis as it provides a more comprehensive view of an applications' risk posture."

Seeker 3.8 includes several updates to improve its ease of use and ease of deployment, making it more flexible and easier to adopt across a variety of enterprise development and testing environments. This release also adds support for MongoDB and PHP 7, extending its utility to a wider range of web applications and services.

Synopsys will showcase Seeker 3.8 and the rest of its Software Integrity Platform at Black Hat USA 2016 in Las Vegas, Nevada on August 3 and 4. To learn more, visit Synopsys at booth #960 in the Black Hat Business Hall or visit:

Seeker and the other tools in Synopsys' Software Integrity Platform are used to facilitate "software signoff," an integrated development and testing methodology that aims to ensure software quality and security. Pioneered by Synopsys to emulate the signoff concept used in integrated circuit (IC) design, software signoff involves a series of automated testing cycles at critical points throughout the software development lifecycle and software supply chain.

About the Synopsys Software Integrity Platform

Through its Software Integrity Platform, Synopsys provides advanced solutions for improving the quality and security of software. This comprehensive platform of automated analysis and testing technologies integrates seamlessly into the software development process and enables organizations to detect and remediate quality defects, security vulnerabilities and compliance issues early in the software development lifecycle, as well as to gain security assurance with and visibility into their software supply chain.

About Synopsys

Synopsys, Inc. (Nasdaq: SNPS) is the Silicon to Software™ partner for innovative companies developing the electronic products and software applications we rely on every day. As the world's 15th largest software company, Synopsys has a long history of being a global leader in electronic design automation (EDA) and semiconductor IP and is also growing its leadership in software quality and security solutions. Whether you're a system-on-chip (SoC) designer creating advanced semiconductors, or a software developer writing applications that require the highest quality and security, Synopsys has the solutions needed to deliver innovative, high-quality, secure products. Learn more at

Editorial Contacts:  
Mark Van Elderen (Software Integrity Group)
Synopsys, Inc.
Email Contact

Sheryl Gulizia (Corporate)
Synopsys, Inc.
Email Contact

Logo -

To view the original version on PR Newswire, visit:

SOURCE Synopsys, Inc.

Synopsys, Inc.

Review Article Be the first to review this article
CST Webinar Series


Featured Video
Peggy AycinenaWhat Would Joe Do?
by Peggy Aycinena
Acquiring Mentor: Four Good Ideas, One Great
More Editorial  
Manager, Field Applications Engineering for Real Intent at Sunnyvale, CA
Sr. staff ASIC Design Engineer -2433 for Microchip at San Jose, CA
SENIOR ASIC Design Engineer for TiBit Communications at Petaluma, CA
Upcoming Events
DeviceWerx - 2016 at Green Valley Ranch Casino & Resort Las Vegas NV - Nov 3 - 4, 2016
2016 International Conference On Computer Aided Design at Doubletree Hotel Austin TX - Nov 7 - 10, 2016
ICCAD 2016, Nov 7-10, 2016 at Doubletree Hotel in Austin, TX at Doubletree Hotel Austin TX - Nov 7 - 10, 2016
Electric&Hybrid Aerospace Technology Symposium 2016 at Conference Centre East. Koelnmesse (East Entrance) Messeplatz 1 Cologne Germany - Nov 9 - 10, 2016
S2C: FPGA Base prototyping- Download white paper

Internet Business Systems © 2016 Internet Business Systems, Inc.
595 Millich Dr., Suite 216, Campbell, CA 95008
+1 (408)-337-6870 — Contact Us, or visit our other sites:
AECCafe - Architectural Design and Engineering TechJobsCafe - Technical Jobs and Resumes GISCafe - Geographical Information Services  MCADCafe - Mechanical Design and Engineering ShareCG - Share Computer Graphic (CG) Animation, 3D Art and 3D Models
  Privacy Policy