Code Dx offers value to any organization responsible for creating and maintaining secure software. Our customers range from large enterprises with customer-facing applications such as banking and insurance, government agencies, public utilities, defense and intelligence agencies, and intelligent device manufacturers. Any application where software is exposed to the public, and therefore is vulnerable to attack, Code Dx can play a role in securing that software.
Within our customers, Code Dx is used in a variety of ways by diverse users: Application Security Auditors, Application Security Analysts, Software Developers, Quality Assurance Analysts, Accreditors, Compliance Officers, Software Managers, and Configuration Managers all have responsibilities related to creating secure applications, and can all benefit from Code Dx.
The research that led to the development of Code Dx was funded by the Department of Homeland Security as part of their initiative to improve the security of the nation’s software infrastructure through the application of software assurance concepts and techniques across government and industry (specifically under DHS Phase II SBIR contract D11PC20010; SBIR Data Rights apply [DFARS 252.227-7018, June 1995]).
Code Dx is now an integral part of the DHS software assurance strategy, and has been featured in the DHS Software Assurance (SwA) Tools Overview at https://buildsecurityin.us-cert.gov/swa/swa-tools-overview. Code Dx was selected for integration into the Software Assurance Marketplace (SWAMP), a national resource for continuous software assurance. The SWAMP enabled its Initial Operational Capability in February 2014. SWAMP is managed by the Morgridge Institute for Research, under the sponsorship of DHS Science & Technology Directorate (DHS S&T).
Code Dx was tested and evaluated by the most demanding users at government agencies, Fortune 500 corporations, and universities prior to its commercial release. The lessons learned from those customers are embodied in the Code Dx that you can purchase today.
This work is sponsored in part by the U.S. Dept. of Homeland Security Science & Technology Directorate. This information does not necessarily reflect the policy of the Government, and no official endorsement should be inferred.