Quotium announced the release of Seeker(R) 2.6. Seeker(R) is the new generation of application security testing for accurate detection and evaluation of vulnerabilities and associated business risk in applications. Seeker 2.6 identifies actual threats to business applications by analyzing the application run-time code and data flow and correlates that with simulated hacker's attacks on the application. Seeker 2.6 introduces the revolutionary Vulnerabilities Impact Business Intelligence Engine, which evaluates the impact of security flaws based on their interaction with other vulnerabilities in the system.

With its Vulnerability Impact BI Engine, Seeker works just like a hacker would. It does not just identify individual vulnerabilities, it creates threat maps that involve combinations of vulnerabilities, which could be of low risk when found separately but become critical when exploited together with another vulnerability by a skilled attacker. This allows Seeker to identify real business threats to the application, and transform the impact information of individual vulnerabilities into detailed risk analysis these vulnerabilities together pose to business critical data.

The result is a clear map of the actual business threats to the application with context based remediation instructions, allowing organizations to secure their applications to the level along their development.