跳至正文

HongKe News | HongKe Formalizes Partnership with Mend

Recently, HongKe and Mend formalized partnership to work together on an automated remediation solution dedicated to securing applications in today’s digital world.

“ We are excited to work with Mend to provide application security solutions as well as localized custom project solutions for the China market,” said Lashare Chen, CEO of HongKe. ” We are committed to providing a more secure and reliable program building environment for our customers in the China market. We look forward to working with Mend to help secure applications and reduce risk for our customers.”

 

◊ About Mend ◊

Mend, formerly known as WhiteSource, is an application security company designed to protect today’s digital world. The first company in the industry to offer proactive remediation performance for custom code security issues, Mend wants developers to do what they do best: build applications that power the world. And it’s our job to make sure those applications are secure.

For Mend, application security is all about remediation, and Mend’s unique automated remediation technology goes beyond traditional detection-oriented solutions to solve the real problem: reducing application risk without compromising on demanding development deadlines.

 

◊ Mend Solution ◊

→ Mend SCA、Mend SAST

 

SCA

Used to manage the security, quality and license compliance risks associated with using open source and third-party code in applications and containers. Provides users with unparalleled visibility into third-party code and the ability to manage it through the software supply chain and throughout the application lifecycle.

SAST (Static Application Security Testing)

The main purpose of SAST is to analyze the source code of an application to find vulnerabilities in it. SAST scans code before it is compiled, so it is a white box test.

Performance

① Ensure the security compliance governance of enterprise self-research code.

②  security compliance review of 3rd party code.

③  software infringement analysis.

④ Auditing of enterprise M&A projects.

Technical features

① Code fragment identification, dependency identification, file identification, component identification.

② Flexible deployment methods (SaaS deployment, local deployment).

③ Powerful database.Mend Renovate

 

→ Mend SCA、Mend SAST

Save time and reduce risk by automatically updating dependencies in software projects.

 

→ Mend Supply Chain Defender

Use Mend Supply Chain Defender to mitigate open source supply chain risks to prevent malicious open source software from entering your code base.

 

◊ About HongKe Cyber Security ◊

 

Network security starts with network visualization. Network security and monitoring has become the most important concern and responsibility of our people.

With more than a decade of industry experience and technology accumulation, in recent years, we have established a long and deep technical cooperation with the world’s top vendors in the field, such as CUBRO, LiveAction, Ntop, IoT-Inspector, etc., and formally entered the field of network visualization on a large scale. We provide: network traffic, message detection and monitoring, network performance simulation, analysis and optimization, OT network security threat detection, Moving Target Defense technology for IT networks, and time synchronization solutions for our customers.