IDM Computer Solutions is CA Veracode Verified
We are 100% committed to protecting our customers.
The foundation of a strong and effective security program is to identify and "harden" high value assets. These are the "crown jewels" of a business – the assets most critical to operations and the source of trade and market success.
For many businesses, the software they use is the engine that powers those critical operations. For those using IDM products, rest assured we understand the business imperative of secure computing and have hardened our products to enhance your secure operations. In partnership with CA Veracode, we have invested heavily in application security as well as fortification of our worldwide cloud distribution array to ensure our customers are protected in every aspect of downloading, updating, and using IDM software.
In our opinion, a commercially supported product should also include peace of mind. Thank you for trusting IDM with your computing needs.
– Richard Knott, VP/COO IDM Computer Solutions, Inc.
IDM receives accredited certification for application security.
- Click to see UltraEdit letter of attestation from CA Veracode
- Click to see UEStudio letter of attestation from CA Veracode
- Click to see UltraCompare letter of attestation from CA Veracode
Hamilton, Ohio – May 2, 2018 – IDM Computer solutions has announced its participation in CA Veracode Verified, a program that validates a company's secure software development processes.
IDM's popular software titles UltraEdit, UEStudio, and UltraCompare have achieved standard verified status by CA Veracode.
With approximately 30 percent of all breaches occurring as a result of a vulnerability at the application layer, software purchasers are demanding more insight into the security of the software they are buying. CA Veracode Verified empowers IDM to demonstrate its commitment to creating secure software.
When purchasing software, customers and prospects are demanding to understand how secure the software is. As part of CA Veracode Verified, IDM can now demonstrate through a seal and provide an attestation letter from an industry leader that the application has undergone security testing as part of the development practice. Additionally, participating in the program ensures that our software meets a high standard of application security, reducing risk for the customer.
Organizations that had their secure development practice validated, and their application accepted into the Standard Tier, have demonstrated that the following security gates have been implemented into their software development practice:
- Assesses first-party code with static analysis
- Documents that the application does not allow "Very High" flaws in first-party code
- Provides developers with remediation guidance when new flaws are introduced
"IDM is committed to delivering secure code to help organizations reduce the risk of a major security breach. Companies that invest in secure coding processes and follow our protocol for a mature application security program are able to deliver more confidence to customers who deploy their software," said Asha May, CA Veracode.
At IDM, we have taken the following three steps to protect our customers from application exploits:
- Incorporate security as a design / build covenant.
- Undertake extreme pressure testing via CA Veracode certification.
- Invest in ongoing security innovations to enhance our continuous security effectiveness.
of organizations always incorporate security requirements into the contract before doing business with a vendor - IDG Survey 2018
of organizations report having experienced negative consequence as a result of security vulnerabilities or breach with almost 30% resulting in loss of customer data. - CA Veracode 2018
Since the beginning of 2016, there has been a 300% increase in ransomeware attacks.... That's 4000 per day! - CCIPS (2016)
Average time to resolve a malicious attack - Accenture (2017)
Average time to resolve a ransomeware attack - Accenture (2017)
is the average amount of money a company saves by using strong and effective security programs that incorporate using hardened applications - Accenture (2017)