Election Security

Protecting our democratic right for free and fair elections

Our nation’s electoral systems are challenged by security vulnerabilities to voting machines, voter registration systems and other election infrastructure. The massive amount of cyber-risk that currently threatens our election systems includes intrusions into government-owned voter registration systems by adversaries and the relative ease of hackers executing data breaches that compromise voter privacy.

The security of the overall infrastructure and the applications that run the voting systems is a top priority for those in-charge of overseeing U.S. elections in 2020. Many of these systems are technologically outdated and lack even the most basic cybersecurity protections needed to counter today’s threats. The voter registration databases that store personal voter information such as names, addresses, and ID numbers, are particularly vulnerable to adversaries seeking to impersonate voters or engage in other malicious activities. Election officials need help ensuring that these applications are secured against any threats, and that bad actors are unable to compromise election results.

WhiteHat secures the applications that run our elections

WhiteHat Security works with election officials, as a true partner, to help secure the applications that run our elections. In addition, WhiteHat Security provides state and election security teams with the necessary security knowledge and skills to systematically find and remediate vulnerabilities. Here’s how we do it:


WhiteHat Static Application Security Testing - SAST
Allows development teams to review code and catch high- and critical-level security vulnerabilities that might put an application at risk for an attack.
LEARN MORE

WhiteHat Dynamic Application Security Testing - DAST
Enables the security teams find runtime vulnerabilities that are tough to spot through source code analysis.
LEARN MORE

WhiteHat Software Composition Analysis - SCA
Analyzes applications for third parties and open source software to detect illegal, dangerous, or outdated code.
LEARN MORE

WhiteHat Mobile Application Security Testing - MAST
Helps your development teams create a safer ecosystem for mobile applications by systematically finding security vulnerabilities.
LEARN MORE
Sentinel Source (SAST)

Allows development teams to review code and catch high- and critical-level security vulnerabilities that might put an application at risk for an attack.

Learn More
Sentinel Dynamic (DAST)

Enables the security teams find runtime vulnerabilities that are tough to spot through source code analysis.

Learn More
WhiteHat Software Composition Analysis (SCA)

Analyzes applications for third parties and open source software to detect illegal, dangerous, or outdated code.

Learn More
Sentinel Mobile

Helps your development teams create a safer ecosystem for mobile applications by systematically finding security vulnerabilities.

Learn More

Additional Resources

Election 2020 Cybersecurity checklist
Election 2020 Cybersecurity Checklist
DOWNLOAD
Application Security for their Voter Registration System
How a Northeastern State Strengthened Application Security for their Voter Registration System
DOWNLOAD
Protecting our democratic right for free and fair elections
Protecting our democratic right for free and fair elections
DOWNLOAD

SPECIAL OFFER!

Available for a limited time from WhiteHat Security for any local, state, or federal agency. Please fill out the form below or send an inquiry to us at [email protected]