Q1. What drove Synopsys’ decision to acquire WhiteHat Security? How does it build-on/broaden your company’s existing capabilities?
The recent acquisition of WhiteHat Security adds significant new SaaS capabilities and a technology leading dynamic application security testing (DAST) product to what is considered one of the industry’s broadest application security testing (AST) portfolio. WhiteHat and Synopsys are strategically aligned, with a shared vision for delivering SaaS-based security testing services and building security into the software development lifecycle.
As a long-time technology leader in the application security testing market segment, WhiteHat has a large base of long-term customers with little overlap with the Synopsys customer base. Additionally, WhiteHat’s strong competency in DAST complements Synopsys’ strengths in Static Analysis (SAST), Software Composition Analysis (SCA), Interactive Analysis (IAST), and orchestration and correlation (ASOC). The acquisition adds well-known and respected SaaS capabilities to the Synopsys portfolio, broadening our offering to existing and new customers.
Software Integrity is a key part of the Synopsys strategy, with an expanded customer base, large total addressable market beyond its traditional EDA and IP business, and high growth potential. The addition of WhiteHat is an important move to help us scale this business to its next level of impact. Synopsys currently offers multiple SaaS-based solutions and will be moving other solutions to SaaS over time. The WhiteHat acquisition will accelerate our SaaS-based solution for dynamic analysis with a proven, market segment leading solution.
Q2. What are the key takeaways for organizations from the Synopsys 2022 Open Source Security and Risk Analysis report? What did it reveal about the current state of SCA and open source within enterprises?
The 2022 Open Source Security & Risk Analysis (OSSRA) report is Synopsys’ annual in-depth look at the current state of open source security, compliance, licensing, and code quality risks in commercial software. The report, produced by the Synopsys Cybersecurity Research Center (CyRC), examines the results of commercial and proprietary codebases from merger and acquisition transactions, performed by the Black Duck® Audit Services team. The report highlights trends in open-source usage within commercial and proprietary applications and provides insights to help developers better understand the interconnected software ecosystem. It also details the pervasive risks posed by unmanaged open source, including security vulnerabilities, outdated or abandoned components, and license compliance issues.
In 2021, our researchers examined anonymized findings from over 2,400 commercial codebases across 17 industries. 2,097 of those audits included security and operational risk assessments. The growth in the number of codebases audited by Synopsys in 2021—64% larger than last year’s—reflects the significant increase in mergers and acquisitions throughout 2021. The growth in audits can also be attributed to a recognition that software is often a key element of a company’s IP. More acquirers in M&A deals want to understand what risk may be associated with the software they’re acquiring—specifically risk around licensing, security, and the quality of the open source used in that software.
The 2022 OSSRA report findings underscore the fact that open source is used everywhere, in every industry, and is the foundation of every application built today. The results reflect that outdated open source remains the norm—including presence of vulnerable Log4j versions. From an operational risk/maintenance perspective, 85% of the 2,097 codebases contained open source that was more than four years out-of-date. 88% utilized components that were not the latest available version. 5% contained a vulnerable version of Log4j.
Q3. What can customers at Black Hat USA 2022 expect from Synopsys this time around?
We’re very much looking forward to having conversations with attendees around how digital transformation continues to reshape the way organizations operate. Even those that may not have thought of themselves as software-dependent in the past have digitized to optimize business processes and gain a competitive advantage.
All businesses at this point are software businesses: They either build software as part of their product and service offerings or buy software and depend on it to operate the business. In either case, the ability to innovate and deliver value to customers is powered by secure, reliable software. This also means every business is vulnerable to security risk from software attacks.
Securing the software supply chain is the first step to addressing this foundational risk. The software supply chain comprises all the open-source, proprietary and third-party software businesses develop and rely on to operate, as well as the collective processes through which they assemble this software. But securing the software supply chain involves more than just building a Software Bill of Materials (SBOM). Although knowing what’s in a software supply chain is a good first step and helps organizations move with speed and accuracy in the event of a breach, building a culture of security is the best protection against allowing a breach in the first place.
And this is where Synopsys can help. With the most comprehensive suite of industry-leading solutions on the market, we want to continue helping organizations build trust in the software that powers their business. Visit us at booth #1560 to learn more!