Protect Your Assets
Showing results for 
Search instead for 
Do you mean 

HP WebInspect and F5 Integration

jgriggs ‎03-14-2014 07:34 AM - edited ‎09-25-2015 10:20 AM

Do you know how long it takes your developers to fix a vulnerability in a web application? Even in a perfect world it could take days, or more likely, weeks to develop a fix for a vulnerability that was found in a production web application, push it through the QC department to make sure it doesn’t impact functionality, and then deploy it to production.  During those weeks the vulnerability is open to the world, waiting to be discovered and exploited.



HP Fortify and F5 Networks have partnered to help organizations defend web applications against these lingering threats.  Web applications remain a substantial source of security exploitations and are largely considered the single greatest target for attackers. The joint solution enables vulnerabilities identified by HP WebInspect to be quickly addressed through an F5 BIG-IP Application Security Manager (ASM) policy.  BIG IP ASM integrates with the HP WebInspect software and the Fortify on Demand cloud based solutions to automate policy configuration and provide the ability to protect against vulnerabilities fast. This plays directly into the HP Fortify theme Assess, Assure, Protect vision for software security.  The user's application remains protected and in compliance without interruption to business applications, allowing code to be fixed in an efficient manner without rushing it through the change management process.


HP’s application vulnerability scanning test results allows security teams to distribute actionable intelligence and remediation guidance and when combined with BIG-IP ASM, allows organizations to achieve dynamic security in compliance with a broad range of standards, including payment card industry (PCI).


Underneath File > Export in WebInspect choose "Protection Rules to Web Application Firewall..."




By partnering with F5, we’ve created real value for our customers for in all stages of application development. Yet another way Fortify is delivering on our Assess, Assure, Protect vision.



0 Kudos
About the Author


Leave a Comment

We encourage you to share your comments on this post. Comments are moderated and will be reviewed
and posted as promptly as possible during regular business hours

To ensure your comment is published, be sure to follow the Community Guidelines.

Be sure to enter a unique name. You can't reuse a name that's already in use.
Be sure to enter a unique email address. You can't reuse an email address that's already in use.
Type the characters you see in the picture above.Type the words you hear.
Aug 29 - Sep 1
Boston, MA
HPE Big Data Conference 2016
Attend HPE’s Big Data Conference on August 29 - September 1, 2016 to learn from peers in every industry and hear from Big Data experts and thought lea...
Read more
Sep 13-16
National Harbor, MD
HPE Protect 2016
Protect 2016 is our annual conference on September 13 - 16, 2016, and is the place to meet the world’s top information security talent, discuss new pr...
Read more
View all