What types of support does Secure Code Warrior offer?
We have a fully-integrated support system built into the Platform through which we can communicate with an individual developer who requests help. We can also accept feedback on the Platform and individual challenges in the Platform from any user through the platform. We also provide email support to Training Administrators as required.
Can we download the training data into our organization? Can you integrate into our LMS?
Yes, all the data that we create in our training/evaluation platform is downloadable by the Training Administrator in your organization anytime that they log into the Secure Code Warrior Learning Platform.
Is the Training self-paced? How much time does a typical developer spend on the platform?
Yes, the training is self-paced. According to Deloitte’s “Meet the Modern Learner,” typically 1% of a typical workweek is all that employees have to focus on training and development. Our platform is built to ensure that this available time is hands-on and effective but it is also designed with the goal that Developers can utilise it outside work hours. On-demand learning in an 'everywhere available' format is critical for today’s learner.
Do developers require a certain skill level before they start using the Secure Code Warrior Learning Platform?
No. We have new developers with little secure code experience and seasoned developers with lots of experience on the platform. For new developers, we have built in Learning and Knowledge Transfer to help them shape their basic skills and understanding of the leading vulnerabilities. As their skills develop and, like seasoned developers, they become more aware they are challenged by the gamified engagement and increasingly difficulty of the content challenges to constantly improve and become a Secure Code Warrior.
What do you do around Security and Customer Data Protection?
We limit the storage of any Customer or Personal Identifiable data as much as possible and any customer data is stored in production systems only and saved until the customer decides to delete it, or their license is not extended and the customer requests to delete the data. For more information, read here.
Why does Secure Code Warrior’s approach improve software security?
Current software security tools and processes focus on moving from right to left, so called 'shifting left' in the Software Development Life Cycle (SDLC) – an approach that supports detection and reaction – detect the vulnerabilities in the written code and then react to fix them.
Secure Code Warrior takes a different approach by 'starting left' and creating the Secure Software Development Life Cycle (SSDLC). This focus makes the developer the first line of defense in their organization and prevents vulnerabilities in the first place.
Do you offer volume discounting for large teams and organizations?
Yes, we offer tiered pricing starting at 100+ users.
What is Secure Code Warrior’s subscription model?
Access to Secure Code Warrior's Learning Platform is available on an annual or multi-year subscription. Our user-based pricing scales to support the size and needs of your organisation's AppSec program.
What analytics does the Secure Code Warrior platform provide?
The Learning Platform measures a developer’s progress throughout their secure coding journey. Depending upon account configuration, Administrators, Team Managers and Developers have the ability to track progress on challenges completed, time spent on training, strengths and weaknesses and accuracy and confidence score.
How does Secure Code Warrior keep up to date with relevant vulnerabilities?
Our challenges are continuously revised and updated with new challenges and new language:frameworks to cover new vulnerability types. Right now, we have thousands of challenges in different languages:frameworks covering the OWASP Top 10, OWASP Mobile Top 10, OWASP API Security Top 10, CWE and SANS Top 25. If you don’t see your language:framework of choice, drop us a note.
What vulnerabilities does the Secure Code Warrior Learning Platform cover?`
We have an extensive catalog of challenges and missions covering a large number of different vulnerability types - including OWASP Top 10, find out more here.
Embrace developer-driven secure coding
Contact us today and make software security an intrinsic part of your development process.