Customers: ELAR (Electronic archive, NPO Opyt)
Contractors: Positive Technologies Product: PT Application Inspector (PT AI)Project date: 2018/04 - 2018/04
|
The Positive Technologies company announced in April, 2018 cooperation with ELAR corporation, the technical contractor of projects of the Ministry of Defence of the Russian Federation "Memory of the people", "A people feat", OBD "Memorial".
Main article Project:Databanks "Memorial" and "People Feat", Memory of the People service
For automatic verification of web applications of information resources about World War II the analyzer of security of the source code of the PT Application Inspector applications is used now. It allows to provide higher level of information security of online applications: risks of existence of vulnerabilities in their source code are minimized, and due to automation of search of vulnerabilities time expenditure on acceptance of the code in general is significantly reduced.
"A large-scale national resource, such as "Memory of the people", contain millions of documents of the military period and attract genuine interest of users from around the world. The peak of activity is the share of May holidays: during this period the portal daily visits more than one million users (about 1000 a minute), ― Vartanyan Artem, the Head of Department of marketing of ELAR comments. ― Reliability of storage of archive documents is one of priority tasks therefore we pay close attention to detection of vulnerabilities of web applications at all stages, from their development before implementation in operation, constantly improving technologies for ensuring protection of web applications against any vulnerabilities".
According to the results of implementation specialists of ELAR received the instrument of automation of audit of web applications allowing to estimate security and code maintainability with the high level of quality. The technologies put in PT Application Inspector allow not only to find vulnerabilities, but also to define conditions of their operation and to create test requests for check (exploits). Use of unique analysis algorithms leads to considerable decrease in number of false operations and significant reduction of time for additional processing of results by experts.