For various use cases and case studies, please click on + sign to see more details.

Feel free to contact us for help.

Check our Products, Services and Resources. Also, check our Calculator.

Partner with Glog team on mission to make software more secure. Boost your software immunity, remove vulnerable spots.


Leading provider of SAST tool on the market asked us to analyze their scan results and security vulnerabilities findings in two popular projects. Here are results (names and results redacted due to confidentiality and sensitivity).

Here are results of Glog solution work on it:

False Positives Case Study

Applications AH and OAM scanned by leading SAST tool on the marked and 24,988 security findings reported in total by that tool.

Based on experience, average time to analyze and resolve 2 hours per finding (Note: it can vary from couple of minutes to even weeks per security finding)

Estimated total time to resolve these findings using standard methods:

  • ~ 49,976 hours
  • ~ 329 man/months (effective 152 hours / month)
  • ~ 27.4 man/years

Glog did it in less then 4 man/days for these big projects, together with remediation advice!

Glog confirmed total of 49 true positive (TP) findings and offered very precise remediation advice.

Work in progress with couple of popular tools including messengers and similar.

You are software development company and you haven’t implemented software/application security practice and process as part of your SDLC – Software Development Lifecycle.

Your product is deployed on production environment. Hackers quickly spot vulnerable product, exploit vulnerabilities. Data are stolen, altered or damaged by unauthorized parties.

You face with liability toward customers and regulators. Your reputation is ruined or damaged.

What to do?

You need to implement software security practice and process as soon as possible. We can help. Feel free to contact us.

Glog solution helps you to reduce or eliminate security debt. Otherwise, it will grow and can reach level which you might not be able to resolve in future.

Security debt growth over time

You are founder of startup.With your founders and development team you rush to create your MVP – Minimum Viable Product and to put it live. Hackers spot that your MVP is live. For them it is also MVP but they see it as Most Vulnerable Product!

Regulators see it as MLP – Massive Liability Product.

What to do?

You need to implement software security practice and process as soon as possible. It should be part of process from the beginning!

Contact us to help you.

You are company or individual using software from vendor and want to make sure software is as secure as possible.
Ask your software provider or vendor if he has security as part of their SDLC – Software Development Lifecycle. Have they performed necessary security testing and remediated vulnerabilities? What to do if there haven’t done it?

Direct them to us to help them to secure their software and software supply chain,

Contact us to help you.

You are regulatory body and want to make sure software is as secure according standards and regulations.
Ask your software provider or vendor if he has security as part of their SDLC – Software Development Lifecycle. Have they performed necessary security testing and remediated vulnerabilities? Can they prove it? What to do if there haven’t done it?

Direct them to us to help them to secure their software and software supply chain.

Contact us to help you.

You have to be compliant wit various security and privacy standards and regulations (e.g. ISO 27001, ISO 5055, PA DSS / PCI DSS, WLA SCS, HIPPA. GDPR etc.)

With proper software and security processes and practices in place, as part of your SDLC – Software Development Lifecycle, you are much better positioned to be compliant.
How? Contact us to help you.