Security in the Software Development Lifecycle

Application security is an important emerging requirement in software development. This article introduces CLASP, an application security process and plug-in to IBM 's Rational Unified Process environment. It was developed by Secure Software, and gives organizations a structured way to address security concerns during the software development lifecycle.

Featured Software Research:

Selecting ERP Software for the Mining Industry

  • Source: IFS
  • Written By:
  • Published:
Most ERP products have been designed from repetitive manufacturing, and thus lack the powerful asset management and project management functionality that mining companies require. But ERP is becoming a higher priority for these organizations. This white paper offers tips on selecting ERP software for the mining industry. Learn how you can you select ERP that can handle the entire mining project and asset lifecycle. Read More

The C-Suite's Guide to Moving to Google Apps

Google Apps can help improve your business, but it’s important for the C-Suite to prepare for the switch by developing an implementation strategy before the actual switch to Google Apps occurs.

This white paper provides answers for the common questions that may arise before you make the change to Google Apps, and addresses specific areas of concern that each member of the C-Suite might have before and during the system changeover. Learn how to deal with potential issues such as access and security controls, recurring costs, how software as a service (SaaS) functions, and how browser-based access will allow for easier telecommuting. Read in depth about how Google Apps will help your organization with compliance, archiving, document management, and what updates for data sharing and terms of service operations really mean for your business.

Each of the CIO, CFO, CLO, and COO members of the C-Suite may have their own concerns, specific to their areas of expertise. These are addressed as well. Potential and projected overall benefits to each member of the C-Suite as a result of Google Apps implementation are also highlighted. Read this Google Apps white paper as the first step to facilitating a smooth transition. With the development of a strategy across the C-Suite, you’ll maximize the benefits of Google Apps for your entire organization. Read More

Reinventing Data Masking: Secure Data Across Application Landscapes: On Premise, Offsite and in the Cloud

Be it personal customer details or confidential internal analytic information, ensuring the protection of your organization’s sensitive data inside and outside of production environments is crucial. Multiple copies of data and constant transmission of sensitive information stream back and forth across your organization. As information shifts between software development, testing, analysis, and reporting departments, a large "surface area of risk" is created. This area of risk increases even more when sensitive information is sent into public or hybrid clouds. Traditional data masking methods protect information, but don’t have the capability to respond to different application updates. Traditional masking also affects analysis as sensitive data isn’t usually used in these processes. This means that analytics are often performed with artificially generated data, which can yield inaccurate results.

In this white paper, read a comprehensive overview of Delphix Agile Masking, a new security solution that goes far beyond the limitations of traditional masking solutions. Learn how Delphix Agile Masking can reduce your organization’s surface area risk by 90%. By using patented data masking methods, Delphix Agile Masking secures data across all application lifecycle environments, providing a dynamic masking solution for production systems and persistent masking in non-production environments. Delphix’s Virtual Data Platform eliminates distribution challenges through their virtual data delivery system, meaning your data can be remotely synchronized, consolidated, and takes up less space overall. Read detailed scenarios on how Delphix Agile Data Masking can benefit your data security with end-to-end masking, selective masking, and dynamic masking.  Read More

You may also be interested in these related documents:

How to Maximize Your IT Services with Lifecycle Management

As businesses become increasingly dependent on technology, service quality becomes more important. With so much riding on IT’s performance, a new service-centric model has emerged: service lifecycle management (SLcM). Based on the Information Technology Infrastructure Library (ITIL) principles, SLcM provides a framework that enables organizations to optimize business outcomes and facilitate continual service improvement. Read More

Enabling Security in the Software Development Life Cycle

When companies discover new security vulnerabilities, they must retrofit the affected software with an appropriate patch and fend off the wrath of customers. Each newly discovered vulnerability results in a frantic patch, halfway deployed, and potentially opens up another hole. That’s why you should address security vulnerabilities during the software development process—before you get locked into a game of catch-up. Read More

Productvine for Collaborative Product Lifecycle Management (PLM)

GNX ProductVine is an enterprise software suite that enables retailers with private brand food programs to seamlessly integrate and manage all elements of brand integrity, regulatory and food safety compliance, and new product development and introduction, with an automated, web-based process. Read More
 
comments powered by Disqus