Truth in IT
    • Sign In
    • Register
        • Videos
        • Channels
        • Pages
        • Galleries
        • News
        • Events
        • All
Truth in IT Truth in IT
  • Data Management ▼
    • Converged Infrastructure
    • DevOps
    • Networking
    • Storage
    • Virtualization
  • Cybersecurity ▼
    • Application Security
    • Backup & Recovery
    • Data Security
    • Identity & Access Management (IAM)
    • Zero Trust
  • Cloud ▼
    • Hybrid Cloud
    • Private Cloud
    • Public Cloud
  • Webinar Library
  • TiPs

Legit Security: Legit Obsessed with SDLC Security

Truth in IT
05/05/2025
56
0 (0%)
Share
  • Comments
  • Download
  • Transcript
Report Like Favorite
  • Share/Embed
  • Email
Link
Embed

Transcript


Hi Mike Matchett with Small World Big Data. We are here at RSAC 2025. We are live on the show floor talking to some very innovative cybersecurity vendors who are going to tell us all about their latest and greatest stuff I've got Legit here. I mean Legitimate, I'm sure that's great. Legit Security I've got live. How are you doing Liav? I'm doing great. Thank you. So Legit Security obviously in the application security space. But what does that mean? What should someone think about when they're thinking about Legit? So we are, uh, a category, a new category of tools called application security posture management. The whole idea is to finally create one platform that helps you do the entire life cycle of releasing secure applications. So today, in our modern world, where AI is being used everywhere and creating an application is super easy, super fast, but also super dangerous, you've got so many layers of application you need to care about their security. And then we are taking the journey from the developer when they write the first line of code until it's deployed to make sure all the boxes are checked, that your software is secure, it's Legitimate to run in the cloud. We're using a bunch of technologies, including AI, to help get all the vulnerabilities into one place, find or remediate them, and ensure that your your build pipelines are ultimately secure and producing secure software. All right. Is this something that happens in a CI CD space or in a in a IDE or across all those things? So it's across all those things. So it's it starts with the IDE then in the ci CD as code is being built. And then we also integrate with all the cloud environments just to make sure that what's running is actually vulnerability free. Okay. So so this would be something that actually is life cycle. You're following it all along there and continuously operating then on that um, who who sort of operates this. Is this a security tool then, or is this an application development tool who's sort of got the primary responsibility here. Yeah. So that's that's a great question. So that's this is a control center mainly for the security folks. Their application security are in most cases outnumbered by developers and the speed of of their, of their code creation. So they see the picture. They finally have visibility into the poster of the application, all the changes that are being made. Our customers make thousands or tens of thousands of changes a day, and they have no idea how many of them are actually introducing something like a new API, a new AI model. So they have complete visibility into the poster, but then ultimately they have to interact with the developers. So when we've got the means in our tool to send information to developer where they work, whether it's a JIRA ticket or their IDE or their pipeline or GitHub. So the security owns the control, but then they fire instructions and remediation guidance to developers. Yeah, I mean, I like that kind of model because you've got someone who's responsible at the at the high level for compliance and making sure everything's governed properly. But when you go to remediate, you're getting it to the people who actually can make those operational implementations. Let me ask you about the show. Right. So a couple of themes at RSA, see here. Obviously AI is a big topic. You mentioned you've got some AI things going on there. Uh, AI people are people are using AI for coding, uh, stuff like, uh, if you had to sort of summarize up like what AI is doing to application security, how would you do that? So I, I think for us is has the ability which hasn't been in the past has been very hard in the past to understand code really well and faster across all the tech stack. So we are leveraging the power of AI to understand first what are the most interesting or critical real critical problems the organization has through understanding the actual flow of the code, what's really exposed to the internet, what's really touches data. So we actually able to prioritize that 1% of of interesting risk through AI and then generate the actual remediation for, which is not just what a lot of other, you know, legacy products did, which was general guidance, go and upgrade a package. We tell them exactly to which version, exactly where, how to make the code compatible with the new package. So it's like creating they're like making the remediation so fast. So we believe like we're where this is going is that ultimately it's almost like an autonomous security that is a copilot for the developers as they work. I mean, that's great. Uh, if you looked around then and said, I want to give one message to the 25,000 people here to take away concerning application security and Legit. What would that be? I would say application security is hard. If you don't do this, you're moving fast. You're very, very insecure. If you try to do this the old way, there's frustration and you're slowing yourself down. There is a win win and it works. It goes with us with security. All right. If someone wants to learn more about Legit, you've probably got a website. But think of this RSA crowd. What would you point them at as a place to start? So just hit Legit Security comm. We've got demos, we've got materials. You can ask us for a demo. We'll be happy to show you what we've gotten and let you test this in real in real scenarios. All right. That's great. This is really interesting stuff that you can cover that whole space and operationalize it, not just say you're compliant with it. I think that's really the future tightening that, tightening that feedback loop and making sure developers can remediate things before they become a problem downstream. So thank you Liav. Thank you very much. Yeah. Take care.
Legit Security maps your entire software supply chain and flags security issues across dev tools, repos, and CI/CD pipelines. Their platform helps organizations govern AppSec posture with visibility, guardrails, and continuous compliance. It's security for the whole SDLC—not just for devs, not just for prod. Legit connects the dots between code, people, and processes to keep your software factory locked down.
Categories:
  • » Data Management
  • » Cybersecurity Webinars » Data Security
  • » Cybersecurity Webinars » Application Security
  • » Data Management » DevOps
  • » Small World Big Data
  • » Cybersecurity Webinars
Channels:
  • Mike Matchett: Small World Big Data
News:
Events:
Tags:
  • rsac2025
  • cybersecurity
  • matchett
  • legit
  • security
  • sdlc
  • supply
  • chain
  • security
  • ci/cd
  • devops
  • appsec
  • governance
  • compliance
  • secure
  • software
  • development
Show more Show less

Browse videos

  • Related
  • Featured
  • By date
  • Most viewed
  • Top rated
  •  

              Video's comments: Legit Security: Legit Obsessed with SDLC Security

              Upcoming Webinar Calendar

              • 12/02/2025
                01:00 PM
                12/02/2025
                The Invisible Threat: How Polymorphic Malware is Outsmarting Your Email Security
                https://www.truthinit.com/index.php/channel/1629/the-invisible-threat-how-polymorphic-malware-is-outsmarting-your-email-security/
              • 12/02/2025
                01:00 PM
                12/02/2025
                Kickstart Your Journey with Netwrix
                https://www.truthinit.com/index.php/channel/1631/kickstart-your-journey-with-netwrix/
              • 12/04/2025
                12:00 PM
                12/04/2025
                Insights from an OSC and C3PAO Assessor on CMMC Level 2 Evaluation
                https://www.truthinit.com/index.php/channel/1557/insights-from-an-osc-and-c3pao-assessor-on-cmmc-level-2-evaluation/
              • 12/04/2025
                01:00 PM
                12/04/2025
                CMMC Success: Enhancing Compliance with Intelligent Endpoint Protection Solutions
                https://www.truthinit.com/index.php/channel/1650/cmmc-success-enhancing-compliance-with-intelligent-endpoint-protection-solutions/
              • 12/09/2025
                01:00 PM
                12/09/2025
                Energize Your Connections with Netskope and Presidio Insights
                https://www.truthinit.com/index.php/channel/1553/energize-your-connections-with-netskope-and-presidio-insights/
              • 12/10/2025
                01:00 PM
                12/10/2025
                The Next Generation of Managed Data Security Services
                https://www.truthinit.com/index.php/channel/1620/cyera-the-next-generation-of-managed-data-security-services/
              • 12/10/2025
                10:00 PM
                12/10/2025
                Partner Tech Talk: Bridge Gaps and Boost Revenue with Druva’s Microsoft Expansion in APAC
                https://www.truthinit.com/index.php/channel/1624/partner-tech-talk-bridge-gaps-and-boost-revenue-with-druvas-microsoft-expansion-in-apac/
              • 12/11/2025
                05:00 AM
                12/11/2025
                Maximize Revenue Opportunities with Druva’s Microsoft Expansion Strategies in EMEA.
                https://www.truthinit.com/index.php/channel/1625/maximize-revenue-opportunities-with-druvas-microsoft-expansion-strategies-in-emea/
              • 12/11/2025
                12:00 PM
                12/11/2025
                Secureframe: Addressing the Top 5 Compliance Challenges for Startup Leaders and Solutions
                https://www.truthinit.com/index.php/channel/1526/addressing-the-top-5-compliance-challenges-for-startup-leaders-and-solutions/
              • 12/11/2025
                01:00 PM
                12/11/2025
                Maximize Revenue Opportunities with Druva's Microsoft Expansion Insights.
                https://www.truthinit.com/index.php/channel/1623/maximize-revenue-opportunities-with-druvas-microsoft-expansion-insights/
              • 12/16/2025
                01:00 PM
                12/16/2025
                HUMAN Dialogue: Uncovering Insights and Safeguarding Performance through Page-Level Intelligence
                https://www.truthinit.com/index.php/channel/1630/human-dialogue-uncovering-insights-and-safeguarding-performance-through-page-level-intelligence/
              • 12/18/2025
                11:00 AM
                12/18/2025
                Trend Micro Webinar: Smarter Decision Making via Network Intelligence
                https://www.truthinit.com/index.php/channel/1372/unlocking-network-intelligence-for-smarter-risk-decisions/
              • 12/18/2025
                12:00 PM
                12/18/2025
                360View: 2026 IT Predictions & Emerging Trends
                https://www.truthinit.com/index.php/channel/933/360view-2026-it-predictions-emerging-trends/
              • 12/18/2025
                01:00 PM
                12/18/2025
                Insightful Perspectives on IconAds, SlopAds, and AI Threats in 2026
                https://www.truthinit.com/index.php/channel/1649/insightful-perspectives-on-iconads-slopads-and-ai-threats-in-2026/

              Upcoming Spotlight Events

              • Dec
                02

                The Invisible Threat: How Polymorphic Malware is Outsmarting Your Email Security

                12/02/202501:00 PM ET
                • Dec
                  10

                  The Next Generation of Managed Data Security Services

                  12/10/202501:00 PM ET
                  More events

                  Upcoming Industry Events

                  • Dec
                    04

                    Insights from an OSC and C3PAO Assessor on CMMC Level 2 Evaluation

                    12/04/202512:00 PM ET
                    • Dec
                      04

                      CMMC Success: Enhancing Compliance with Intelligent Endpoint Protection Solutions

                      12/04/202501:00 PM ET
                      • Dec
                        09

                        Energize Your Connections with Netskope and Presidio Insights

                        12/09/202501:00 PM ET
                        More events

                        Upcoming 360 View Events

                        • Dec
                          18

                          360View: 2026 IT Predictions & Emerging Trends

                          12/18/202512:00 PM ET
                          More events

                          Recent Spotlight Events

                          • Nov
                            20

                            Rethinking Hybrid Access: Securing Users, Vendors, and Infrastructure in the Zero Trust Era

                            11/20/202501:00 PM ET
                            • Nov
                              18

                              Microsoft Advanced Group Policy Management (AGPM) End of Life: Your Practical Migration Playbook

                              11/18/202501:00 PM ET
                              • Oct
                                22

                                Cut Ticket Resolution Time in Half with Smarter IT Documentation

                                10/22/202501:00 PM ET
                                More events

                                Recent Industry Events

                                • Nov
                                  20

                                  CMMC Certification: Next Steps for Continuous Monitoring and Management

                                  11/20/202512:00 PM ET
                                  • Nov
                                    19

                                    Deep Packet Inspection (DPI) Insights within Endpoint Protector Learning Lab

                                    11/19/202511:00 AM ET
                                    • Nov
                                      18

                                      HUMAN Dialogue: Cultivating Trust Amidst the Rise of Agentic Commerce

                                      11/18/202501:00 PM ET
                                      More events
                                      Truth in IT
                                      • Sponsor
                                      • About Us
                                      • Terms of Service
                                      • Privacy Policy
                                      • Contact Us
                                      • Preference Management
                                      Desktop version
                                      Standard version