Truth in IT
    • Sign In
    • Register
        • Videos
        • Channels
        • Pages
        • Galleries
        • News
        • Events
        • All
Truth in IT Truth in IT
  • Data Management ▼
    • Converged Infrastructure
    • DevOps
    • Networking
    • Storage
    • Virtualization
  • Cybersecurity ▼
    • Application Security
    • Backup & Recovery
    • Data Security
    • Identity & Access Management (IAM)
    • Zero Trust
  • Cloud ▼
    • Hybrid Cloud
    • Private Cloud
    • Public Cloud
  • Webinar Library
  • TiPs

Legit Security: Legit Obsessed with SDLC Security

Truth in IT
05/05/2025
56
0 (0%)
Share
  • Comments
  • Download
  • Transcript
Report Like Favorite
  • Share/Embed
  • Email
Link
Embed

Transcript


Hi Mike Matchett with Small World Big Data. We are here at RSAC 2025. We are live on the show floor talking to some very innovative cybersecurity vendors who are going to tell us all about their latest and greatest stuff I've got Legit here. I mean Legitimate, I'm sure that's great. Legit Security I've got live. How are you doing Liav? I'm doing great. Thank you. So Legit Security obviously in the application security space. But what does that mean? What should someone think about when they're thinking about Legit? So we are, uh, a category, a new category of tools called application security posture management. The whole idea is to finally create one platform that helps you do the entire life cycle of releasing secure applications. So today, in our modern world, where AI is being used everywhere and creating an application is super easy, super fast, but also super dangerous, you've got so many layers of application you need to care about their security. And then we are taking the journey from the developer when they write the first line of code until it's deployed to make sure all the boxes are checked, that your software is secure, it's Legitimate to run in the cloud. We're using a bunch of technologies, including AI, to help get all the vulnerabilities into one place, find or remediate them, and ensure that your your build pipelines are ultimately secure and producing secure software. All right. Is this something that happens in a CI CD space or in a in a IDE or across all those things? So it's across all those things. So it's it starts with the IDE then in the ci CD as code is being built. And then we also integrate with all the cloud environments just to make sure that what's running is actually vulnerability free. Okay. So so this would be something that actually is life cycle. You're following it all along there and continuously operating then on that um, who who sort of operates this. Is this a security tool then, or is this an application development tool who's sort of got the primary responsibility here. Yeah. So that's that's a great question. So that's this is a control center mainly for the security folks. Their application security are in most cases outnumbered by developers and the speed of of their, of their code creation. So they see the picture. They finally have visibility into the poster of the application, all the changes that are being made. Our customers make thousands or tens of thousands of changes a day, and they have no idea how many of them are actually introducing something like a new API, a new AI model. So they have complete visibility into the poster, but then ultimately they have to interact with the developers. So when we've got the means in our tool to send information to developer where they work, whether it's a JIRA ticket or their IDE or their pipeline or GitHub. So the security owns the control, but then they fire instructions and remediation guidance to developers. Yeah, I mean, I like that kind of model because you've got someone who's responsible at the at the high level for compliance and making sure everything's governed properly. But when you go to remediate, you're getting it to the people who actually can make those operational implementations. Let me ask you about the show. Right. So a couple of themes at RSA, see here. Obviously AI is a big topic. You mentioned you've got some AI things going on there. Uh, AI people are people are using AI for coding, uh, stuff like, uh, if you had to sort of summarize up like what AI is doing to application security, how would you do that? So I, I think for us is has the ability which hasn't been in the past has been very hard in the past to understand code really well and faster across all the tech stack. So we are leveraging the power of AI to understand first what are the most interesting or critical real critical problems the organization has through understanding the actual flow of the code, what's really exposed to the internet, what's really touches data. So we actually able to prioritize that 1% of of interesting risk through AI and then generate the actual remediation for, which is not just what a lot of other, you know, legacy products did, which was general guidance, go and upgrade a package. We tell them exactly to which version, exactly where, how to make the code compatible with the new package. So it's like creating they're like making the remediation so fast. So we believe like we're where this is going is that ultimately it's almost like an autonomous security that is a copilot for the developers as they work. I mean, that's great. Uh, if you looked around then and said, I want to give one message to the 25,000 people here to take away concerning application security and Legit. What would that be? I would say application security is hard. If you don't do this, you're moving fast. You're very, very insecure. If you try to do this the old way, there's frustration and you're slowing yourself down. There is a win win and it works. It goes with us with security. All right. If someone wants to learn more about Legit, you've probably got a website. But think of this RSA crowd. What would you point them at as a place to start? So just hit Legit Security comm. We've got demos, we've got materials. You can ask us for a demo. We'll be happy to show you what we've gotten and let you test this in real in real scenarios. All right. That's great. This is really interesting stuff that you can cover that whole space and operationalize it, not just say you're compliant with it. I think that's really the future tightening that, tightening that feedback loop and making sure developers can remediate things before they become a problem downstream. So thank you Liav. Thank you very much. Yeah. Take care.
Legit Security maps your entire software supply chain and flags security issues across dev tools, repos, and CI/CD pipelines. Their platform helps organizations govern AppSec posture with visibility, guardrails, and continuous compliance. It's security for the whole SDLC—not just for devs, not just for prod. Legit connects the dots between code, people, and processes to keep your software factory locked down.
Categories:
  • » Data Management
  • » Cybersecurity » Data Security
  • » Cybersecurity » Application Security
  • » Data Management » DevOps
  • » Small World Big Data
  • » Cybersecurity
Channels:
  • Mike Matchett: Small World Big Data
News:
Events:
Tags:
  • rsac2025
  • cybersecurity
  • matchett
  • legit
  • security
  • sdlc
  • supply
  • chain
  • security
  • ci/cd
  • devops
  • appsec
  • governance
  • compliance
  • secure
  • software
  • development
Show more Show less

Browse videos

  • Related
  • Featured
  • By date
  • Most viewed
  • Top rated
  •  

              Video's comments: Legit Security: Legit Obsessed with SDLC Security

              Upcoming Webinar Calendar

              • 02/26/2026
                09:30 PM
                02/26/2026
                Strategies for Safeguarding Data Amidst AI Innovations with DSPM
                https://www.truthinit.com/index.php/channel/1827/strategies-for-safeguarding-data-amidst-ai-innovations-with-dspm/
              • 03/03/2026
                01:00 PM
                03/03/2026
                Energize Your Connections with Netskope and Presidio Insights
                https://www.truthinit.com/index.php/channel/1803/energize-your-connections-with-netskope-and-presidio-insights/
              • 03/05/2026
                01:00 PM
                03/05/2026
                "VMware Alternative" or "Private Cloud OS"?
                https://www.truthinit.com/index.php/channel/1834/vmware-alternative-or-private-cloud-os/
              • 03/11/2026
                01:00 PM
                03/11/2026
                AI-Driven Endpoint Management: Scale IT Operations with Fewer Tools, Faster Tickets
                https://www.truthinit.com/index.php/channel/1838/ai-driven-endpoint-management-scale-it-operations-with-fewer-tools-faster-tickets/
              • 03/11/2026
                01:00 PM
                03/11/2026
                Introducing the Netskope AI Launch for the Americas
                https://www.truthinit.com/index.php/channel/1850/introducing-the-netskope-ai-launch-for-the-americas/
              • 03/12/2026
                12:00 AM
                03/12/2026
                Unveiling the Netskope AI Initiative in the APAC Region
                https://www.truthinit.com/index.php/channel/1849/unveiling-the-netskope-ai-initiative-in-the-apac-region/
              • 03/12/2026
                06:00 AM
                03/12/2026
                Introducing the Netskope AI Revolution in EMEA
                https://www.truthinit.com/index.php/channel/1848/introducing-the-netskope-ai-revolution-in-emea/
              • 03/17/2026
                06:00 AM
                03/17/2026
                L'importance cruciale de l’ITDR pour 2026 et au-delà
                https://www.truthinit.com/index.php/channel/1856/limportance-cruciale-de-litdr-pour-2026-et-au-delà/
              • 03/18/2026
                01:00 PM
                03/18/2026
                Beyond Chatbots: Agentic AI That Actually Fixes Identity Risk
                https://www.truthinit.com/index.php/channel/1847/beyond-chatbots-agentic-ai-that-actually-fixes-identity-risk/
              • 03/19/2026
                01:00 PM
                03/19/2026
                Cyber CSI 2.0: Phishing Forensics in the Age of AI and Deepfakes
                https://www.truthinit.com/index.php/channel/1842/cyber-csi-2-0-phishing-forensics-in-the-age-of-ai-and-deepfakes/
              • 03/26/2026
                01:00 AM
                03/26/2026
                Reclaim Network Clarity and Accountability with Netskope DEM
                https://www.truthinit.com/index.php/channel/1846/reclaim-network-clarity-and-accountability-with-netskope-dem/
              • 03/26/2026
                01:00 PM
                03/26/2026
                HUMAN Dialogue: Transforming Municipal Risk Through AI-Driven Cyber Resilience
                https://www.truthinit.com/index.php/channel/1835/human-dialogue-transforming-municipal-risk-through-ai-driven-cyber-resilience/
              • 03/26/2026
                01:00 PM
                03/26/2026
                Making GPUs Available On Demand (Without Breaking the Budget)
                https://www.truthinit.com/index.php/channel/1858/making-gpus-available-on-demand-without-breaking-the-budget/

              Upcoming Spotlight Events

              • Mar
                05

                "VMware Alternative" or "Private Cloud OS"?

                03/05/202601:00 PM ET
                • Mar
                  11

                  AI-Driven Endpoint Management: Scale IT Operations with Fewer Tools, Faster Tickets

                  03/11/202601:00 PM ET
                  • Mar
                    18

                    Beyond Chatbots: Agentic AI That Actually Fixes Identity Risk

                    03/18/202601:00 PM ET
                    More events

                    Upcoming Industry Events

                    • Feb
                      26

                      Strategies for Safeguarding Data Amidst AI Innovations with DSPM

                      02/26/202609:30 PM ET
                      • Mar
                        03

                        Energize Your Connections with Netskope and Presidio Insights

                        03/03/202601:00 PM ET
                        • Mar
                          11

                          Introducing the Netskope AI Launch for the Americas

                          03/11/202601:00 PM ET
                          More events

                          Recent Spotlight Events

                          • Feb
                            19

                            The CISO Dilemma: Fostering Innovation & Security in the Age of AI

                            02/19/202601:00 PM ET
                            • Feb
                              03

                              Evolution of Cloud Adaptability and AI Performance

                              02/03/202601:00 PM ET
                              • Jan
                                27

                                AI & Quantum Attacks Exposed: Your Survival Guide for the Next-Gen Threat Era

                                01/27/202601:00 PM ET
                                More events

                                Recent Industry Events

                                • Feb
                                  26

                                  HUMAN Dialogue: Examining the Effects of OWASP's Top Ten Agentic Risks on Builders and Defenders

                                  02/26/202601:00 PM ET
                                  • Feb
                                    26

                                    Demonstrating and Ensuring Endpoint Compliance in the Age of AI

                                    02/26/202612:00 PM ET
                                    • Feb
                                      26

                                      Insights and Updates from the Keepit Product Webinar on February 26

                                      02/26/202610:00 AM ET
                                      More events
                                      Truth in IT
                                      • Sponsor
                                      • About Us
                                      • Terms of Service
                                      • Privacy Policy
                                      • Contact Us
                                      • Preference Management
                                      Desktop version
                                      Standard version