This icon activates/deactivates data filtering on Critical Violations. By default, the dashboard only shows information about Critical Violations, rather than showing data for ALL violations - this allows you to instantly see the most important flaws in the analyzed application.Close
With continuous usage of CAST, you are able to see both Added and Removed violations based on different technical criteria.Close
Both Technical Criteria and their associated Quality Rules are weighted to help prioritize the most impactful violations to select for remediation.Close
The Propagated risk index or the PRI is a measurement of the riskiest objects of the application in terms of security.
The PRI formula takes into account the intrinsic risks of the component regarding security health factor coupled with the level of use of the given object in the application.
PRI finds objects that threaten the application usage. It helps you to determine objects for remediation to remove the most risk.
Review architecture design, security hotspots, non-secure transactions - project impact on the threat model before coding
Detect, measure and enforce engineers' adherence to custom and standard architectural rules
Focus on the security vulnerabilities that are contextual, critical and relevant, and filter out the rest
Calibrated quality model that scores application security in a reliable, consistent way that can be measured and benchmarked
Identify objects with security flaws in the dev pipeline
Gain insight into why specific defects are occurring and guidelines for fast remediation
Create action plans based on a prioritized list of high impact issues
Identify structural and architectural defects and blocker in your riskiest objects and transactions
Get clear direction on flaw remediation
Drill-down to identify specific code location of critical flaws
Validate against industry standard rules
Dr. Ray Russo
Head of Enterprise IT