OOONA Adopts Astra Security’s Pentest Suite

Astra Security announces that its newly launched Pentest Suite has been chosen by OOONA, a globally active developer of professional management and production tools for the media localization industry, to provide continuous online business protection.
Astra’s Pentest Suite simplifies the task of vulnerability assessment and management. Client applications are tested against an ever-evolving list of vulnerabilities, Pentest Suite provides data-backed insights which help prioritize fixes. Developers receive tailored guidance on how to repair vulnerabilities plus the ability to collaborate with Astra’s security specialists.
“We are pleased to have OOONA as one of the first customers to adopt our continuous security scanner,” says Astra Security CTO Ananda Krishna. “The OOONA team’s keenness to maintain the highest standards of security makes very good business sense, safeguarding the services it offers its customers around the world. Our Pentest Suite makes application security super simple, continuous and easy to manage for both CXOs and developers.”
“Astra’s Pentest Suite provides exactly the features we need to maximize the security of the service we provide to our clients,” adds OOONA CEO Wayne Garb. “We are impressed by their commitment to continuous rather than sporadic testing and the way in which their technology blends with ours.”
Pentests until now were typically a yearly or quarterly occurrence, currently exceeding 2,500,” details Astra Security CEO Shikhil Sharma. “New vulnerabilities come up almost every day. With our new continuous pentesting and vulnerability management offering, we are making the entire process of vulnerability assessment and penetration testing easy and efficient for businesses, especially those involved in B2B transactions. To maintain transparency, we offer a publicly verifiable certification, which our customers can provide their clients as proof of continuous pentest on their infrastructure. We would like to see security certification adopted more widely. This will save businesses multiple pentests for different partners and ensure their apps are security-tested with every code push.”
You might also like...
Microphones: Part 10 - Mid-Side (M-S) Recording And Processing
M-S techniques provide useful sound-field positioning and a convenient way to check mono compatibility. We explain the hard science behind this often misunderstood technique.
Microphones: Part 9 - The Science Of Stereo Capture & Reproduction
Here we look at the science of using a matched pair of microphones positioned as a coincident pair to capture stereo sound images.
Microphones: Part 8 - Audio Vectorscopes
The audio vectorscope is an excellent tool for assuring quality in stereo sound production, because it makes the virtual sound image visible in the same way that a television vectorscope allows the color signals to be seen.
Microphones: Part 7 - Microphones For Stereophony
Once the basic requirements for reproducing sound were in place, the most significant next step was to reproduce to some extent the spatial attributes of sound. Stereophony, using two channels, was the first successful system.
IP Security For Broadcasters: Part 12 - Zero Trust
As users working from home are no longer limited to their working environment by the concept of a physical location, and infrastructures are moving more and more to the cloud-hybrid approach, the outdated concept of perimeter security is moving aside…