NowSecure Unveils Its Latest Offering, Mobile Pen Testing-as-a-Service (PTaaS)

NowSecure | January 03, 2023 | Read time : 02:50 min

NowSecure Unveils Its Latest Offering, Mobile Pen Testing-as-a-Service

NowSecure, the leader in standards-based mobile app security and privacy software, announced the introduction of its latest solution, NowSecure Mobile Pen Testing as a Service (PTaaS), which will bridge the gap between manual and automated mobile security assessments for continuous security.

NowSecure PTaaS is designed to provide mobile developers and security teams with a more cost-effective and efficient pen testing solution. The solution combines periodic expert manual assessments with continuous automated testing to optimize comprehensive coverage at a higher frequency. With this combination, the all-inclusive portal and service can instantly discover concerns early in the developer pipeline, provide consulting help to repair security issues promptly, and accelerate the release of high-quality software into production.

As organizations struggle with tightening budgets in conjunction with an increased threat of mobile cyber assaults, there is an industry demand for a cost-effective, higher-coverage, higher-frequency, mobile AppSec testing solution.

"According to Coalfire and NowSecure's 4th Annual Penetration Risk Report, 99% of mobile applications pose security or privacy threats."

By integrating NowSecure's latest offering, Mobile PTaaS, CISOs and security leaders can optimize their budget for penetration testing while prioritizing continuous, comprehensive security testing. The NowSecure Mobile PTaaS cloud-based platform, built on tens of thousands of pen tests and over 12 years of mobile application security experience, provides a comprehensive set of automatic, continuous, and manual assessments, including:

  • Expert pen testing periodically depending on the specific demand and timeline
  • On-demand and continuous security testing is built into the CD/CI and dev toolchains
  • Automatic ticket generation with incorporated remedial resources
  • Consultation with an experienced pen tester on remediation
  • Optional industry standard(s) certifications and validations
  • All-in-one SAST, IAST, DAST, APISec, and SBOM
  • Simple-to-use dedicated SaaS platform

About NowSecure

A Chicago-based mobile security company, NowSecure safeguards the worldwide mobile app economy as the leading authority in standards-based mobile application privacy and security automation. The company is trusted by the most demanding enterprises for its comprehensive security testing solution package for DevSecOps, mobile app supply-chain monitoring, Pen Testing as a Service (PTaaS), professional mobile pen testing, and training courseware.

NowSecure actively contributes to and supports the open-source mobile security community, industry standards, and certifications such as ADA MASA, OWASP MASVS, NIAP, ioXt, and others. The firm is SOC 2-certified and has been recognized by Gartner, IDC, TAG Cyber, and Deloitte Fast 500.


Businesses must leverage operating systems (OSs) that meet their unique needs. Many consider using unpaid solutions to save money—but there’s another option. This infographic reveals 5 benefits your company can expect from a move to Red Hat® Enterprise Linux®, including: Greater cost savings over time than unpaid options Streaml


Businesses must leverage operating systems (OSs) that meet their unique needs. Many consider using unpaid solutions to save money—but there’s another option. This infographic reveals 5 benefits your company can expect from a move to Red Hat® Enterprise Linux®, including: Greater cost savings over time than unpaid options Streaml

Related News


Living Security Announces Partnership Agreement with GuidePoint Security

Living Security | January 02, 2023

Living Security, the pioneer in human risk management, announced entering into a strategic partnership with GuidePoint Security, a renowned value-added reseller (VAR) that enables enterprises to make more informed cybersecurity decisions and reduce their risk exposure. The partnership will combine GuidePoint Security's ecosystem with Living Security's industry-leading human risk management products and security awareness training. "According to the Computer Emergency Response, cyberattacks have been ranked as the fifth most significant danger for the year 2020 and have become the standard in both the public and private sectors." Each day, the number of cybersecurity events continues to rise, and the vast majority of these problems can be traced back to human action. Using a data-driven methodology, Living Security enables security directors to identify the most vulnerable elements of their workforce in order to decrease human risk exposure, control the contribution to overall risk over time, and alter organizational behavior. About Living Security Living Security's objective is to transform human risk in order to generate a dramatic increase in human behavior, organizational security culture, and information security program efficacy. With the company's Human Risk Management platform, Living Security connects each employee with creative and pertinent context and content while simultaneously enabling management to recognize, report on, and proactively mitigate the risk posed by human behavior. Living Security is trusted by security-conscious firms such as MasterCard, MassMutual, Verizon, Biogen, Hewlett Packard, AmerisourceBergen, and Target. About GuidePoint Security GuidePoint Security offers dependable cybersecurity insights, solutions, and services that enable businesses to make risk-averse decisions. The company's specialists serve as trusted advisors by evaluating the cybersecurity posture and ecosystem in order to identify risks, maximize resources, and deploy the most appropriate solutions. GuidePoint's unparalleled knowledge has enabled a third of Fortune 500 organizations and over half of U.S. cabinet-level agencies to enhance their security posture and decrease risk.

Read More


Orca Announces New Capabilities to Optimize Cloud Security and Cost

Orca Security | February 17, 2023

On February 16, 2023, Orca Security, a pioneer in agentless cloud security, announced that the Orca Cloud Security Platform now includes a cloud cost optimization framework, which assists organizations in reducing unnecessary cloud consumption and optimizing cloud costs while providing unrivaled security with the deepest and broadest visibility. By using its proprietary SideScanning™ technology, Orca is now applying unparalleled insights into cloud environments, thereby allowing organizations to track and manage cloud spend. Unlike other cloud cost management tools, Orca's platform has the ability to identify more opportunities for cloud cost savings by having a deeper understanding of cloud workloads and their operations. Despite considering cost efficiency a motivator for cloud adoption, several organizations are experiencing high expenses in their monthly cloud bills, mainly due to underutilization and forgotten cloud infrastructure resources. The 2022 State of the Cloud Report by Flexera indicates that organizations lose up to 32% of their monthly cloud expenses. Orca's Cloud Cost Optimization feature addresses the problem of wasteful cloud spending by continuously aggregating relevant alerts about unnecessary cloud infrastructure spending across all supported cloud service providers. These providers include Microsoft Azure, Amazon Web Services, Google Cloud, and Alibaba Cloud. In addition, the Orca platform simplifies the cost optimization process by categorizing alerts based on cloud infrastructure that is causing excessive spending, such as virtual machines, databases, keys, and load balancers, making deallocation quick and easy for organizations. Even though Stopped VMs on Google Cloud and AWS and deallocated VMs on Azure do not incur charges, many organizations are unaware that they still incur costs for the resources associated with those VMs until they are deleted. Orca assists organizations in recognizing resources attached to stopped or deallocated VMs to avoid incurring undesired charges, including Elastic IP addresses and EBS volumes on AWS, OS and data storage disks on Azure, and persistent disks and external IP addresses on Google Cloud. About Orca Security Founded in 2019, Orca Security is a leading global firm that provides agentless cloud security solutions to hundreds of enterprises. Its Cloud Security Platform can detect, prioritize, and fix security risks and compliance issues across cloud environments such as Azure, AWS, Google Cloud, and Kubernetes. The company's patented SideScanning™ technology and Unified Data Model make security possible for organizations moving to and scaling in the cloud and enable them to secure their cloud infrastructure while providing comprehensive coverage and visibility of all risks. With continuous first-to-market innovations, the Orca Platform ensures security teams can quickly identify and remediate risks, keeping businesses secure.

Read More


BlueVoyant Enhances its Cloud-Native Splunk Managed Detection & Response (MDR), Consulting, and Implementation Services

BlueVoyant | March 20, 2023

BlueVoyant, a cybersecurity company that illuminates, validates, and remediates internal and external risks in one platform, announced enhanced Splunk capabilities, with end-to-end consulting, implementation, and Managed Detection & Response (MDR) services. With the increasing adoption of cloud technologies, organizations face a complex and rapidly evolving threat landscape. The service helps clients maximize their Splunk investment whether it be on the Splunk Cloud Platform or Splunk Enterprise. "Splunk Your Way with BlueVoyant enables our clients to have industry-leading consulting, implementation, and cyber defense in a cost-effective manner," said Drew Gibson, BlueVoyant senior director for the company's Splunk Alliance. "BlueVoyant has a strong relationship with Splunk, and is known for its dynamic expertise in the company's products, helping our joint clients have greater control and visibility of their data usage and security posture." Key components of Splunk Your Way with BlueVoyant include: Enabling clients to collect, monitor, and analyze security data across on-premise, hybrid, and multi-cloud environments in a single platform Cloud-native SIEM (security information and event management) with real-time visibility to identify security threats and remediate them quickly Clients can reduce their data burden by 20% or more with a proprietary Data Readiness model that improves data quality and reduces costs Onboarding within a month for Existing Splunk users to quickly see the benefits of BlueVoyant Continuously improving client's Splunk instance by using faster security content delivery, and parity between different SIEM and EDR (endpoint detection and response) tools Availability of numerous bundles of workshops, retainers, and MDR services to help clients optimize, implement, manage, and monitor and protect their Splunk instance "BlueVoyant has the strength of our MDR for Splunk which we launched in 2021, aided by the expertise of thousands of Splunk deployments by our Concanon Professional Services division to provide a compelling service which helps the client get the most their Splunk investment, whether Splunk is installed 'on-prem' or via Splunk Cloud," said Michael Cormier, managing director for Concanon, a BlueVoyant company. BlueVoyant acquired Conanon in fall 2021 to enhance its end-to-end Splunk platform capabilities. Splunk recognized BlueVoyant as a key MSP (managed service provider) partner with the new Premier Manage designation. BlueVoyant also earned core competency badges for Cloud Migration and Cloud Migration: Co-Delivery. The company has 200 active Splunk certifications. In 2022, BlueVoyant expanded its Splunk go-to-market by including its offerings on the Amazon Web Services (AWS) Marketplace. BlueVoyant is hosting a webinar at 1 p.m. EDT Thursday, April 13 to discuss what the company has learned from our Splunk deployments and clients, and to answer questions. Current clients, security professionals, and other parties are encouraged to attend. About BlueVoyant BlueVoyant combines internal and external cyber defense capabilities into an outcomes-based cloud-native platform by continuously monitoring your network, endpoints, attack surface, and supply chain, as well as the clear, deep, and dark web for threats. The full-spectrum cyber defense platform illuminates, validates, and quickly remediates threats to protect your enterprise. BlueVoyant leverages both machine-learning-driven automation and human-led expertise to deliver industry-leading cybersecurity to more than 900 clients across the globe.

Read More