The CA Technologies | Veracode Platform: A 360-Degree View of Your Application's Security

Writer and Editor um CA Technologies
11. Jan 2018
The CA Technologies | Veracode Platform: A 360-Degree View of Your Application's Security
The CA Technologies | Veracode Platform: A 360-Degree View of Your Application's Security
The CA Technologies | Veracode Platform: A 360-Degree View of Your Application's Security
The CA Technologies | Veracode Platform: A 360-Degree View of Your Application's Security
The CA Technologies | Veracode Platform: A 360-Degree View of Your Application's Security
The CA Technologies | Veracode Platform: A 360-Degree View of Your Application's Security
The CA Technologies | Veracode Platform: A 360-Degree View of Your Application's Security
The CA Technologies | Veracode Platform: A 360-Degree View of Your Application's Security
The CA Technologies | Veracode Platform: A 360-Degree View of Your Application's Security
The CA Technologies | Veracode Platform: A 360-Degree View of Your Application's Security
The CA Technologies | Veracode Platform: A 360-Degree View of Your Application's Security
The CA Technologies | Veracode Platform: A 360-Degree View of Your Application's Security
The CA Technologies | Veracode Platform: A 360-Degree View of Your Application's Security
1 von 13

Más contenido relacionado

Was ist angesagt?

Securing 100 products - How hard can it be?Securing 100 products - How hard can it be?
Securing 100 products - How hard can it be?Priyanka Aash
Empowering Financial Institutions to Use Open Source With ConfidenceEmpowering Financial Institutions to Use Open Source With Confidence
Empowering Financial Institutions to Use Open Source With ConfidenceWhiteSource
Practical DevSecOps Using Security InstrumentationPractical DevSecOps Using Security Instrumentation
Practical DevSecOps Using Security InstrumentationVMware Tanzu
Continuous Application Security at Scale with IAST and RASP -- Transforming D...Continuous Application Security at Scale with IAST and RASP -- Transforming D...
Continuous Application Security at Scale with IAST and RASP -- Transforming D...Jeff Williams
Collaborative security : Securing open source softwareCollaborative security : Securing open source software
Collaborative security : Securing open source softwarePriyanka Aash
The DevSecOps Showdown: How to Bridge the Gap Between Security and DevelopersThe DevSecOps Showdown: How to Bridge the Gap Between Security and Developers
The DevSecOps Showdown: How to Bridge the Gap Between Security and DevelopersDevOps.com

Was ist angesagt?(20)

Similar a The CA Technologies | Veracode Platform: A 360-Degree View of Your Application's Security

Securing Your Enterprise Continuous Delivery Pipelines with CA Automation Sol...Securing Your Enterprise Continuous Delivery Pipelines with CA Automation Sol...
Securing Your Enterprise Continuous Delivery Pipelines with CA Automation Sol...CA Technologies
When You Test Matters: Why Testing Early in the SDLC is ImportantWhen You Test Matters: Why Testing Early in the SDLC is Important
When You Test Matters: Why Testing Early in the SDLC is ImportantCA Technologies
Shifting Left…AND Right to Ensure Full Application Security CoverageShifting Left…AND Right to Ensure Full Application Security Coverage
Shifting Left…AND Right to Ensure Full Application Security CoverageDevOps.com
Veracode Corporate Overview - PrintVeracode Corporate Overview - Print
Veracode Corporate Overview - PrintAndrew Kanikuru
Coverity Data SheetCoverity Data Sheet
Coverity Data SheetJon Lundquist
Dev{sec}opsDev{sec}ops
Dev{sec}opsSteven Carlson

Similar a The CA Technologies | Veracode Platform: A 360-Degree View of Your Application's Security(20)

Más de CA Technologies

CA Mainframe Resource IntelligenceCA Mainframe Resource Intelligence
CA Mainframe Resource IntelligenceCA Technologies
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...CA Technologies
Case Study: How The Home Depot Built Quality Into Software DevelopmentCase Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software DevelopmentCA Technologies
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...CA Technologies
Case Study: Privileged Access in a World on TimeCase Study: Privileged Access in a World on Time
Case Study: Privileged Access in a World on TimeCA Technologies
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...CA Technologies

Más de CA Technologies(20)

Último

Product Listing Presentation_Cathy.pptxProduct Listing Presentation_Cathy.pptx
Product Listing Presentation_Cathy.pptxCatarinaTorrenuevaMa
Easy Salesforce CI/CD with Open Source Only - Dreamforce 23Easy Salesforce CI/CD with Open Source Only - Dreamforce 23
Easy Salesforce CI/CD with Open Source Only - Dreamforce 23NicolasVuillamy1
Roottoo Innovation V24_CP.pdfRoottoo Innovation V24_CP.pdf
Roottoo Innovation V24_CP.pdfroottooinnovation
Navigating the FutureNavigating the Future
Navigating the FutureOnBoard
Prompt Engineering - an Art, a Science, or your next Job Title?Prompt Engineering - an Art, a Science, or your next Job Title?
Prompt Engineering - an Art, a Science, or your next Job Title?Maxim Salnikov
Take Control of Podcasting thanks to Open Source and Podcasting 2.0Take Control of Podcasting thanks to Open Source and Podcasting 2.0
Take Control of Podcasting thanks to Open Source and Podcasting 2.0🎙 Benjamin Bellamy

The CA Technologies | Veracode Platform: A 360-Degree View of Your Application's Security