Truth in IT
    • Sign In
    • Register
        • Videos
        • Channels
        • Pages
        • Galleries
        • News
        • Events
        • All
Truth in IT Truth in IT
  • Data Management ▼
    • Converged Infrastructure
    • DevOps
    • Networking
    • Storage
    • Virtualization
  • Cybersecurity ▼
    • Application Security
    • Backup & Recovery
    • Data Security
    • Identity & Access Management (IAM)
    • Zero Trust
  • Cloud ▼
    • Hybrid Cloud
    • Private Cloud
    • Public Cloud
  • Webinar Library
  • TiPs

Legit Security: Legit Obsessed with SDLC Security

Truth in IT
05/05/2025
56
0 (0%)
Share
  • Comments
  • Download
  • Transcript
Report Like Favorite
  • Share/Embed
  • Email
Link
Embed

Transcript


Hi Mike Matchett with Small World Big Data. We are here at RSAC 2025. We are live on the show floor talking to some very innovative cybersecurity vendors who are going to tell us all about their latest and greatest stuff I've got Legit here. I mean Legitimate, I'm sure that's great. Legit Security I've got live. How are you doing Liav? I'm doing great. Thank you. So Legit Security obviously in the application security space. But what does that mean? What should someone think about when they're thinking about Legit? So we are, uh, a category, a new category of tools called application security posture management. The whole idea is to finally create one platform that helps you do the entire life cycle of releasing secure applications. So today, in our modern world, where AI is being used everywhere and creating an application is super easy, super fast, but also super dangerous, you've got so many layers of application you need to care about their security. And then we are taking the journey from the developer when they write the first line of code until it's deployed to make sure all the boxes are checked, that your software is secure, it's Legitimate to run in the cloud. We're using a bunch of technologies, including AI, to help get all the vulnerabilities into one place, find or remediate them, and ensure that your your build pipelines are ultimately secure and producing secure software. All right. Is this something that happens in a CI CD space or in a in a IDE or across all those things? So it's across all those things. So it's it starts with the IDE then in the ci CD as code is being built. And then we also integrate with all the cloud environments just to make sure that what's running is actually vulnerability free. Okay. So so this would be something that actually is life cycle. You're following it all along there and continuously operating then on that um, who who sort of operates this. Is this a security tool then, or is this an application development tool who's sort of got the primary responsibility here. Yeah. So that's that's a great question. So that's this is a control center mainly for the security folks. Their application security are in most cases outnumbered by developers and the speed of of their, of their code creation. So they see the picture. They finally have visibility into the poster of the application, all the changes that are being made. Our customers make thousands or tens of thousands of changes a day, and they have no idea how many of them are actually introducing something like a new API, a new AI model. So they have complete visibility into the poster, but then ultimately they have to interact with the developers. So when we've got the means in our tool to send information to developer where they work, whether it's a JIRA ticket or their IDE or their pipeline or GitHub. So the security owns the control, but then they fire instructions and remediation guidance to developers. Yeah, I mean, I like that kind of model because you've got someone who's responsible at the at the high level for compliance and making sure everything's governed properly. But when you go to remediate, you're getting it to the people who actually can make those operational implementations. Let me ask you about the show. Right. So a couple of themes at RSA, see here. Obviously AI is a big topic. You mentioned you've got some AI things going on there. Uh, AI people are people are using AI for coding, uh, stuff like, uh, if you had to sort of summarize up like what AI is doing to application security, how would you do that? So I, I think for us is has the ability which hasn't been in the past has been very hard in the past to understand code really well and faster across all the tech stack. So we are leveraging the power of AI to understand first what are the most interesting or critical real critical problems the organization has through understanding the actual flow of the code, what's really exposed to the internet, what's really touches data. So we actually able to prioritize that 1% of of interesting risk through AI and then generate the actual remediation for, which is not just what a lot of other, you know, legacy products did, which was general guidance, go and upgrade a package. We tell them exactly to which version, exactly where, how to make the code compatible with the new package. So it's like creating they're like making the remediation so fast. So we believe like we're where this is going is that ultimately it's almost like an autonomous security that is a copilot for the developers as they work. I mean, that's great. Uh, if you looked around then and said, I want to give one message to the 25,000 people here to take away concerning application security and Legit. What would that be? I would say application security is hard. If you don't do this, you're moving fast. You're very, very insecure. If you try to do this the old way, there's frustration and you're slowing yourself down. There is a win win and it works. It goes with us with security. All right. If someone wants to learn more about Legit, you've probably got a website. But think of this RSA crowd. What would you point them at as a place to start? So just hit Legit Security comm. We've got demos, we've got materials. You can ask us for a demo. We'll be happy to show you what we've gotten and let you test this in real in real scenarios. All right. That's great. This is really interesting stuff that you can cover that whole space and operationalize it, not just say you're compliant with it. I think that's really the future tightening that, tightening that feedback loop and making sure developers can remediate things before they become a problem downstream. So thank you Liav. Thank you very much. Yeah. Take care.
Legit Security maps your entire software supply chain and flags security issues across dev tools, repos, and CI/CD pipelines. Their platform helps organizations govern AppSec posture with visibility, guardrails, and continuous compliance. It's security for the whole SDLC—not just for devs, not just for prod. Legit connects the dots between code, people, and processes to keep your software factory locked down.
Categories:
  • » Data Management
  • » Cybersecurity Webinars » Data Security
  • » Cybersecurity Webinars » Application Security
  • » Data Management » DevOps
  • » Small World Big Data
  • » Cybersecurity Webinars
Channels:
  • Mike Matchett: Small World Big Data
News:
Events:
Tags:
  • rsac2025
  • cybersecurity
  • matchett
  • legit
  • security
  • sdlc
  • supply
  • chain
  • security
  • ci/cd
  • devops
  • appsec
  • governance
  • compliance
  • secure
  • software
  • development
Show more Show less

Browse videos

  • Related
  • Featured
  • By date
  • Most viewed
  • Top rated
  •  

              Video's comments: Legit Security: Legit Obsessed with SDLC Security

              Upcoming Webinar Calendar

              • 01/20/2026
                01:00 PM
                01/20/2026
                Beyond The Basics: IT Service Delivery Workflows That Close the Efficiency Gap
                https://www.truthinit.com/index.php/channel/1756/beyond-the-basics-it-service-delivery-workflows-that-close-the-efficiency-gap/
              • 01/22/2026
                01:00 PM
                01/22/2026
                Netskope: Securing Access: Go Beyond VPN and NAC to Universal ZTNA
                https://www.truthinit.com/index.php/channel/1668/netskope-securing-access-go-beyond-vpn-and-nac-to-universal-ztna/
              • 01/27/2026
                01:00 PM
                01/27/2026
                AI & Quantum Attacks Exposed: Your Survival Guide for the Next-Gen Threat Era
                https://www.truthinit.com/index.php/channel/1759/ai-quantum-attacks-exposed-your-survival-guide-for-the-next-gen-threat-era/
              • 01/27/2026
                01:00 PM
                01/27/2026
                Mastering AD CS Protection for Enhanced Threat Prevention 8.0
                https://www.truthinit.com/index.php/channel/1775/mastering-ad-cs-protection-for-enhanced-threat-prevention-8-0/
              • 01/29/2026
                10:00 AM
                01/29/2026
                Preparing Your Cybersecurity Strategy for the Challenges of 2026
                https://www.truthinit.com/index.php/channel/1705/preparing-your-cybersecurity-strategy-for-the-challenges-of-2026/
              • 02/03/2026
                01:00 PM
                02/03/2026
                Evolution of Cloud Adaptability and AI Performance
                https://www.truthinit.com/index.php/channel/1760/evolution-of-cloud-adaptability-and-ai-performance/

              Upcoming Spotlight Events

              • Jan
                20

                Beyond The Basics: IT Service Delivery Workflows That Close the Efficiency Gap

                01/20/202601:00 PM ET
                • Jan
                  22

                  Netskope: Securing Access: Go Beyond VPN and NAC to Universal ZTNA

                  01/22/202601:00 PM ET
                  More events

                  Upcoming Industry Events

                  • Jan
                    27

                    Mastering AD CS Protection for Enhanced Threat Prevention 8.0

                    01/27/202601:00 PM ET
                    • Jan
                      29

                      Preparing Your Cybersecurity Strategy for the Challenges of 2026

                      01/29/202610:00 AM ET
                      More events

                      Recent Spotlight Events

                      • Dec
                        10

                        The Next Generation of Managed Data Security Services

                        12/10/202501:00 PM ET
                        • Dec
                          02

                          The Invisible Threat: How Polymorphic Malware is Outsmarting Your Email Security

                          12/02/202501:00 PM ET
                          • Nov
                            20

                            Rethinking Hybrid Access: Securing Users, Vendors, and Infrastructure in the Zero Trust Era

                            11/20/202501:00 PM ET
                            More events

                            Recent Industry Events

                            • Dec
                              18

                              Insight into IconAds, SlopAds, and AI Threats on the 2026 Horizon

                              12/18/202501:00 PM ET
                              • Dec
                                16

                                HUMAN Dialogue: Discover the True Insights Behind Page-Level Performance Intelligence

                                12/16/202501:00 PM ET
                                • Dec
                                  11

                                  Partner Tech Insights: Bridge Gaps and Enhance Revenue with Druva’s Microsoft Expansion.

                                  12/11/202501:00 PM ET
                                  More events
                                  Truth in IT
                                  • Sponsor
                                  • About Us
                                  • Terms of Service
                                  • Privacy Policy
                                  • Contact Us
                                  • Preference Management
                                  Desktop version
                                  Standard version