ENJOYING OPEN SOURCE WITHOUT COMPROMISING BUSINESS. Dr. Ron Rymon Founder, White Source Software
|
|
|
- Jesse Haynes
- 10 years ago
- Views:
Transcription
1 ENJOYING OPEN SOURCE WITHOUT COMPROMISING BUSINESS Dr. Ron Rymon Founder, White Source Software
2 Background I am a software entrepreneur, not a legal expert My own experience with the dark side of open source We sold our software company in 2008 In the DD, we reported 25 libraries and licenses We ended up with 350! (dependencies anyone?) We were lucky! - no major hidden surprises What could we have (practically) done better? We started White Source
3 Open Source is Great, But Open source substantially boosts developers productivity 85% of new software projects, according to Gartner* 80% of code in commercial products is actually OSS But, to enjoy the full value of open source, you must properly manage its use * Source: Gartner User Survey Analysis: Open-Source Software, Worldwide
4 Three Main Areas To Manage Security and Quality Issues License Risks and Compliance Ineffective Management and Unnecessary Burden
5 Security and Quality Most companies continue to ship products with open source that contains vulnerabilities, even long after these were fixed 85% of software projects contain outdated open source * Like any other software, open source is likely to contain security vulnerabilities and other bugs Rate of defects is 1 per 1,000 lines of code ** 70% of software applications contain security issues *** Open source communities are often quick to fix But OSS users are slow to update Why? Its difficult and out of scope for developers to be in the know Vulnerabilities in open source you use are YOUR responsibility Sources: * White Source, ** Coverity, *** Vercode
6 License Risks and Compliance Most companies lack a complete picture of all OSS libraries and licenses In 60% of cases, gaps between reported and actual * License documentation is extremely tedious Where done manually, lots of (hated) work, lots of errors With scanners, lots of sifting through false matches, delay release schedules One big reason is missed dependencies 91% of open source libraries have dependencies * 64% have a different license * Also, very few companies have license policies, and even fewer enforce policies in a consistent manner Improper handling may result in legal, technical, and business risks * Source: White Source
7 Ineffective Management and Unnecessary Burden Companies that do make an effort to manage their open source properly are wasting much effort 95% use manual processes Licensing is the biggest challenge and one of most time consuming nondevelopment task for developers * And after expanding those efforts, lots of misses and errors lead to high risks Few use scanners Expensive to buy; more expensive to operate beyond the reach of any but the biggest companies Issues are often discovered at worst time M&A, OEM, Release when most expensive to fix rip and recode/replace Developers shall develop. OSS management shall be automated. * Source: JFrog
8 Bring Back the Full Value of Open Source Adopt a lifecycle approach Deal with issues at the door and not post-hoc when difficult to discover and expensive to fix Always updated inventory and risks dashboard at your fingertips Automate the discovery process Don t depend on developers, and don t waste their time Enforce consistent license policy Automate enforce when possible Automate and document decision workflow when necessary Automate monitoring Security issues and other bugs New versions and fixes
9 White Source Modern, cloud-based, SaaS service Nothing to deploy and keep updating No training needed Not exposed to your proprietary code Integrates into your dev environment Plugins to your build/ci server Always current inventory and licenses Enforces license policy at the door Detects new open source Auto approve/reject Approval workflow if necessary
10 White Source (2) Proactive alerts on security issues and fixes Dashboards and reports in a click Ops: Inventory, Requests, Release automation Compliance: licenses, risks Quality and security: vulnerabilities, fixes
11 Case Study Background before White Source ~200 developers in 22 different scrum groups Manually tracking open source usage and licenses Forms-and- s approval process Used a scanner in some transactions, requiring some fixes White Source implementation Fully implemented in a few days Use Maven plugin to automatically create projects Automatic policies and processes Results Full and reliable picture of open source inventory and licenses Discovered and replaced libraries with licensing issues Full visibility of licensing issues, security issues, and outdated libraries Fully automated
12 THANK YOU! To manage OSS, adopt an approach that fits into and does not over-burden your development cycle
BOM based on what they input into fossology.
SPDX Tool Website SPDX Tool Description License and copyright scanner that emits license names that conform to SPDX. In March a module should be added that gives the user an SPDX FOSSology fossology.org
How To Improve Your Software
Driving Quality, Security and Compliance in Third- Party Code Dave Gruber Director of Product Marketing, Black Duck Keri Sprinkle Sr Product Marketing Manager, Coverity Jon Jarboe Sr Technical Marketing
Driving Operations through Better, Faster Decision Making
Driving Operations through Better, Faster Decision Making Driving Operations through Better, Faster Decision Making Operations faces increasing pressure from all sides. Picky customers know that your competitors
Extreme Networks Security Analytics G2 Vulnerability Manager
DATA SHEET Extreme Networks Security Analytics G2 Vulnerability Manager Improve security and compliance by prioritizing security gaps for resolution HIGHLIGHTS Help prevent security breaches by discovering
IT Security & Compliance. On Time. On Budget. On Demand.
IT Security & Compliance On Time. On Budget. On Demand. IT Security & Compliance Delivered as a Service For businesses today, managing IT security risk and meeting compliance requirements is paramount
IT Asset Management. White Paper
IT Asset Management A modern ITAM solution allows organizations to consolidate legacy systems into one system of record and automate the full asset lifecycle. Historically, IT Asset Management (ITAM) systems
8 Tips for Winning the IT Asset Management Challenge START
Tips for Winning the IT Asset Management Challenge START A successful IT Asset Management (ITAM) program can help you lower your costs and increase your asset utilization. You benefit by avoiding unplanned
SOLUTION BRIEF: CA IT ASSET MANAGER. How can I reduce IT asset costs to address my organization s budget pressures?
SOLUTION BRIEF: CA IT ASSET MANAGER How can I reduce IT asset costs to address my organization s budget pressures? CA IT Asset Manager helps you optimize your IT investments and avoid overspending by enabling
IT ASSET MANAGEMENT. www.servicenow.com
IT ASSET MANAGEMENT www.servicenow.com WHITE PAPER IT ASSET MANAGEMENT IT ASSET MANAGEMENT A modern ITAM solution allows organizations to consolidate legacy systems into one system of record and automate
BUILDING AGILE OPS WITH A PROACTIVE AND UNIFIED INFRASTRUCTURE MANAGEMENT APPROACH
BUILDING AGILE OPS WITH A PROACTIVE AND UNIFIED INFRASTRUCTURE MANAGEMENT APPROACH March, 2015 Jim Rapoza, Senior Research Analyst & Editorial Director, Information Technology Report Highlights p3 p4 p8
Scanning Open Source Software and Managing License Obligations on IBM SmartCloud. Because code travels
Scanning Open Source Software and Managing License Obligations on IBM SmartCloud Because code travels 1 Webinar Agenda Protecode & IBM SmartCloud Company IBM Partnership Solutions Managing Code Obligations
Authentication as a Service (AaaS): Creating A New Revenue Stream with AuthAnvil
Authentication as a Service (AaaS): Creating A New Revenue Stream with AuthAnvil SaaS, PaaS, IaaS Powered by advancements in cloud technology, the X as a Service model has become exceptionally popular
IBM Security QRadar Vulnerability Manager
IBM Security QRadar Vulnerability Manager Improve security and compliance by prioritizing security gaps for resolution Highlights Help prevent security breaches by discovering and highlighting high-risk
How Can I Better Manage My Software Assets And Mitigate The Risk Of Compliance Audits?
SOLUTION BRIEF CA SERVICE MANAGEMENT - SOFTWARE ASSET MANAGEMENT How Can I Better Manage My Software Assets And Mitigate The Risk Of Compliance Audits? SOLUTION BRIEF CA DATABASE MANAGEMENT FOR DB2 FOR
How To Standardize Itil V3.3.5
Business white paper Standardize your ITSM An HP approach based on best practices Table of contents 3 Introduction 3 Benefits and challenges 5 The HP approach to standardizing ITSM 6 Establish an IT operations
agility made possible
SOLUTION BRIEF CA IT Asset Manager how can I manage my asset lifecycle, maximize the value of my IT investments, and get a portfolio view of all my assets? agility made possible helps reduce costs, automate
The AppSec How-To: 10 Steps to Secure Agile Development
The AppSec How-To: 10 Steps to Secure Agile Development Source Code Analysis Made Easy 10 Steps In Agile s fast-paced environment and frequent releases, security reviews and testing sound like an impediment
Table of contents. Best practices in open source governance. Managing the selection and proliferation of open source software across your enterprise
Best practices in open source governance Managing the selection and proliferation of open source software across your enterprise Table of contents The importance of open source governance... 2 Executive
with Managing RSA the Lifecycle of Key Manager RSA Streamlining Security Operations Data Loss Prevention Solutions RSA Solution Brief
RSA Solution Brief Streamlining Security Operations with Managing RSA the Lifecycle of Data Loss Prevention and Encryption RSA envision Keys with Solutions RSA Key Manager RSA Solution Brief 1 Who is asking
Table of contents. Standardizing IT Service Management. Best practices based on HP experience in ITSM consolidation. White paper
Standardizing IT Service Management Best practices based on HP experience in ITSM consolidation White paper Table of contents Go!... 2 Benefits and challenges... 2 The HP approach to standardizing ITSM...
Align IT Operations with Business Priorities SOLUTION WHITE PAPER
Align IT Operations with Business Priorities SOLUTION WHITE PAPER Table of Contents Executive summary............................................... 1 the Need for Aligning IT Operations with Business
White Paper. Automating Your Code Review: Moving to a SaaS Model for Application Security
White Paper Automating Your Code Review: Moving to a SaaS Model for Application Security Contents Overview... 3 Executive Summary... 3 Code Review and Security Analysis Methods... 5 Source Code Review
End-user Security Analytics Strengthens Protection with ArcSight
Case Study for XY Bank End-user Security Analytics Strengthens Protection with ArcSight INTRODUCTION Detect and respond to advanced persistent threats (APT) in real-time with Nexthink End-user Security
NeXUS REPOSITORY managers
PRODUCT OVERVIEW NeXUS REPOSITORY managers Nexus OSS, Nexus Pro and Nexus Pro+ Nexus repository managers help organizations build better software, faster. Like a supply chain, applications are built by
Getting a head start in Software Asset Management
Getting a head start in Software Asset Management Managing software for improved cost control, better security and reduced risk A guide from Centennial Software September 2007 Abstract Software Asset Management
ForeScout MDM Enterprise
Highlights Features Automated real-time detection of mobile Seamless enrollment & installation of MDM agents on unmanaged Policy-based blocking of unauthorized Identify corporate vs. personal Identify
Continuous Network Monitoring
Continuous Network Monitoring Eliminate periodic assessment processes that expose security and compliance programs to failure Continuous Network Monitoring Continuous network monitoring and assessment
Thought Leadership White Paper
Thought Leadership White Paper Introduction Contracts form the foundation of all businesses and every business relationship. They define every aspect of a business s activities procurement, sales, marketing,
The Convergence of IT Security and Compliance with a Software as a Service (SaaS) approach
The Convergence of IT Security and Compliance with a Software as a Service (SaaS) approach by Philippe Courtot, Chairman and CEO, Qualys Inc. Information Age Security Conference - London - September 25
StruxureWare TM Data Center Operation
StruxureWare TM Data Center End to end Management (DCIM) software for monitoring, control of power, cooling, security and energy usage from the building through IT systems Part of StruxureWare for Data
5 Steps for a Winning Open Source Compliance Program
5 Steps for a Winning Open Source Compliance Program Kellan Ponikiewicz Peter Vescuso @black_duck_sw Black Duck 2013 Speakers Peter Vescuso EVP of Marketing Black Duck Software Kellan Ponikiewicz IP Counsel
The IT Administrator s Guide to Software Asset Management
The IT Administrator s Guide to Software Asset Management A ScriptLogic Positioning Paper 1. 8 0 0. 4 2 4. 9 4 1 1 w w w. s c r i p t l o g i c. c o m Introduction IT administrators are faced with more
The SMB IT Decision Maker s Guide: Choosing a SaaS Service Management Solution
BEST PRACTICES WHITE PAPER The SMB IT Decision Maker s Guide: Choosing a SaaS Service Management Solution Nine Things to Look For in Your Next SaaS Service Desk Table of Contents Introduction...................................................
Why Your Library Should Move to Ex Libris Alma. An Ex Libris Alma Solution Brief
Why Your Library Should Move to Ex Libris Alma An Ex Libris Alma Solution Brief Why Your Library Should Move to Ex Libris Alma To meet the evolving needs of users in the rapidly changing research and learning
RESEARCH NOTE THE ENTERPRISE CASE FOR TELECOM EXPENSE MANAGEMENT THE BOTTOM LINE THE SITUATION. January 2013. Document N3
RESEARCH NOTE THE ENTERPRISE CASE FOR TELECOM EXPENSE MANAGEMENT THE BOTTOM LINE Nucleus has found that multiple companies reduced unmanaged telecom, network, and wireless costs up to 25 percent on a one-time
Meister Going Beyond Maven
Meister Going Beyond Maven A technical whitepaper comparing OpenMake Meister and Apache Maven OpenMake Software 312.440.9545 800.359.8049 Winners of the 2009 Jolt Award Introduction There are many similarities
SAME PRINCIPLES APPLY, BUT NEW MANDATES FOR CHANGE
Information is an organization s most important strategic asset the lifeblood of the organization s knowledge, processes, transactions, and decisions. With information continuing to grow exponentially,
Welcome to Modulo Risk Manager Next Generation. Solutions for GRC
Welcome to Modulo Risk Manager Next Generation Solutions for GRC THE COMPLETE SOLUTION FOR GRC MANAGEMENT GRC MANAGEMENT AUTOMATION EASILY IDENTIFY AND ADDRESS RISK AND COMPLIANCE GAPS INTEGRATED GRC SOLUTIONS
SAP Solution Brief SAP Technology SAP IT Infrastructure Management. Unify Infrastructure and Application Lifecycle Management
SAP Brief SAP Technology SAP IT Infrastructure Management Objectives Unify Infrastructure and Application Lifecycle Management Supercharge your IT infrastructure Supercharge your IT infrastructure What
Supplier Relationship Management Tools
Supplier Relationship Management Tools Contents The Need for Supplier Management Automation VSAAM Capabilities The Magic of VSAAM The VSAAM Value Proposition VSAAM System Integration and Deployment Process
Buyers Guide to ERP Business Management Software
Buyers Guide to ERP Business Management Software one 1. Introduction When you search for ERP or Enterprise Resource Planning on the web, the sheer amount of information that appears can be overwhelming
IT INFRASTRUCTURE MANAGEMENT SERVICE ADDING POWER TO YOUR NETWORKS
IT INFRASTRUCTURE MANAGEMENT SERVICE ADDING POWER TO YOUR NETWORKS IT INFRASTRUCTURE MANAGEMENT SERVICES Nortech Remote management IT security Services provide around clock remote Management, real time
WHITE PAPER. Extending the Reach of the Help Desk With Web-based Asset Management Will Significantly Improve Your Support Operations
Extending the Reach of the Help Desk With WHITE PAPER By Mark Krieger, Vice President of Product Development, Edison Numara Software OVERVIEW Today s IT support operations are confronted with the challenge
SECURITY POLICY MANAGEMENT ACROSS THE NEXT GENERATION DATA CENTER
SECURITY POLICY MANAGEMENT ACROSS THE NEXT GENERATION DATA CENTER An AlgoSec Whitepaper MANAGE SECURITY AT THE SPEED OF BUSINESS AlgoSec Whitepaper Introduction Corporate networks today must deliver hundreds
! Resident of Kauai, Hawaii
SECURE SDLC Jim Manico @manicode! OWASP Volunteer! Global OWASP Board Member! Manager of several OWASP secure coding projects! Security Instructor, Author! 17 years of web-based, databasedriven software
The Impact of Transaction-based Application Performance Management
An AppDynamics Business White Paper MASTERING APPLICATION PERFORMANCE IN FINANCIAL SERVICES The Impact of Transaction-based Application Performance Management Managing applications in the world of Financial
The ForeScout Difference
The ForeScout Difference Mobile Device Management (MDM) can help IT security managers secure mobile and the sensitive corporate data that is frequently stored on such. However, ForeScout delivers a complete
Thinking about APM? 4 key considerations for buy vs. build your own
An AppDynamics Business White Paper Thinking about APM? 4 key considerations for buy vs. build your own Most technology folks have heard Marc Andreessen s provocative statement, Software is eating the
Reining in the Effects of Uncontrolled Change
WHITE PAPER Reining in the Effects of Uncontrolled Change The value of IT service management in addressing security, compliance, and operational effectiveness In IT management, as in business as a whole,
Introduction: 1. Daily 360 Website Scanning for Malware
Introduction: SiteLock scans your website to find and fix any existing malware and vulnerabilities followed by using the protective TrueShield firewall to keep the harmful traffic away for good. Moreover
Spreadsheets and Access Databases Enterprise Control, Efficiency and Insight. Find It. Audit. Profit
Spreadsheets and Access Databases Enterprise Control, Efficiency and Insight Find It. Audit. Profit Everybody has problems with spreadsheets Clients Exec Brand Protection Loss of Reputation Avoiding major
DISCOVER, MONITOR AND PROTECT YOUR SENSITIVE INFORMATION Symantec Data Loss Prevention. symantec.com
DISCOVER, MONITOR AND PROTECT YOUR SENSITIVE INFORMATION Symantec Data Loss Prevention symantec.com One of the interesting things we ve found is that a lot of the activity you d expect to be malicious
Whitepaper. Advanced Threat Hunting with Carbon Black
Advanced Threat Hunting with Carbon Black TABLE OF CONTENTS Overview Threat Hunting Defined Existing Challenges and Solutions Prioritize Endpoint Data Collection Over Detection Leverage Comprehensive Threat
How to Ensure IT Compliance Without Compromising Innovation. Nik Teshima, IBM Phil Odence, Black Duck
How to Ensure IT Compliance Without Compromising Innovation Nik Teshima, IBM Phil Odence, Black Duck Black Duck 2013 Speakers Phil Odence VP of Business Development Black Duck Software Nik Teshima Senior
Software License Asset Management (SLAM) Part III
LANDesk White Paper Software License Asset Management (SLAM) Part III Structuring SLAM to Solve Business Challenges Contents The Third Step in SLAM: Optimizing Your Operations.... 3 Benefiting from Step
Cloud Managed Printing
Cloud Managed Printing Driverless Printing ezeep for desktop is a virtual print driver for Mac and Windows. It enables users to print to any printer right from their desktop applications without the need
Emptoris Contract Management for Healthcare HIPAA Compliance
Emptoris Contract Management for Healthcare HIPAA Compliance An Emptoris White Paper Emptoris, an IBM Company www.emptoris.com ECHHC-4/12 Executive Summary Provider contracts are complex, dynamic, and
Securing Privileges in the Cloud. A Clear View of Challenges, Solutions and Business Benefits
A Clear View of Challenges, Solutions and Business Benefits Introduction Cloud environments are widely adopted because of the powerful, flexible infrastructure and efficient use of resources they provide
Application Security Center overview
Application Security overview Magnus Hillgren Presales HP Software Sweden Fredrik Möller Nordic Manager - Fortify Software HP BTO (Business Technology Optimization) Business outcomes STRATEGY Project &
Interactive Application Security Testing (IAST)
WHITEPAPER Interactive Application Security Testing (IAST) The World s Fastest Application Security Software Software affects virtually every aspect of an individual s finances, safety, government, communication,
Detecta SQL Server Monitoring Solution
Detecta SQL Server Monitoring Solution 2016. Contents Abstract........................................... 3 The Problem........................................ 3 History............................................
"Service Lifecycle Management strategies for CIOs"
"Service Lifecycle strategies for CIOs" Ralf Hart, Sales Manager CEE Europe FrontRange Solutions 10th December 2008 Agenda FrontRange Solutions The challenges the IT community faces What is the solution?
Top Ten Keys to Gaining Enterprise Configuration Visibility TM WHITEPAPER
Top Ten Keys to Gaining Enterprise Configuration Visibility TM WHITEPAPER Regulatory compliance. Server virtualization. IT Service Management. Business Service Management. Business Continuity planning.
Best Practices for Building a Security Operations Center
OPERATIONS SECURITY Best Practices for Building a Security Operations Center Diana Kelley and Ron Moritz If one cannot effectively manage the growing volume of security events flooding the enterprise,
10 Hidden IT Risks That Might Threaten Your Business
(Plus 1 Fast Way to Find Them) Your business depends on intelligence. But can you count on your technology? You may not be in the intelligence technology business, but it s probably impossible to imagine
Proven deployments across different Industry verticals; Being used by leading brands
What is SapphireIMS? Comprehensive IT Service Management Suite consisting of IT Service desk certified as per ITIL 3.0 (ITSM) IT Asset management (ITAM) Business Service Monitoring (BSM) IT Automation
RayManageSoft. infinity. The new generation of Application Lifecycle Management
The new generation of Application Lifecycle Management RayManageSoft Appliance The new solution for small and medium businesses IT administrators today face many challenges in their desktop and security
NICE BACK OFFICE SOLUTIONS. Improve the Efficiency and Effectiveness of Your Back Office Operations. www.nice.com. Insight from Interactions
NICE BACK OFFICE SOLUTIONS Improve the Efficiency and Effectiveness of Your Back Office Operations Insight from Interactions www.nice.com INTRODUCTION In today s competitive marketplace, your company has
Upping the game. Improving your software development process
Upping the game Improving your software development process John Ferguson Smart Principle Consultant Wakaleo Consulting Email: [email protected] Web: http://www.wakaleo.com Twitter: wakaleo Presentation
Effective Threat Management. Building a complete lifecycle to manage enterprise threats.
Effective Threat Management Building a complete lifecycle to manage enterprise threats. Threat Management Lifecycle Assimilation of Operational Security Disciplines into an Interdependent System of Proactive
DELL BACKUP ADMINISTRATION & MANAGEMENT SERVICES
DELL BACKUP ADMINISTRATION & MANAGEMENT SERVICES SIMPLIFY DATA BACKUP MANAGEMENT BACKUP ADMINISTRATION & MANAGEMENT SERVICES DELL S APPROACH Dell brings predictability and manageability into backup environments
Mark Rohlfing. Vice President of Operations Almac Clinical Services Souderton, Pennsylvania
Mark Rohlfing Vice President of Operations Almac Clinical Services Souderton, Pennsylvania Confidential Almac Group 2014 Who We Are Almac is a global drug development services provider. Our mission is
High Availability Server Management
High Availability Server Management Maintain high server availability through active performance monitoring and low-impact, on-demand remote management services. Maintain high server availability with
How to Define SIEM Strategy, Management and Success in the Enterprise
How to Define SIEM Strategy, Management and Success in the Enterprise Security information and event management (SIEM) projects continue to challenge enterprises. The editors at SearchSecurity.com have
Taking a Proactive Approach to Linux Server Patch Management Linux server patching
Taking a Proactive Approach to Linux Server Patch Management Linux server patching In years past, Linux server patch management was often thought of in terms of we don t patch our servers unless there
Releasing High Quality Applications More Quickly with vrealize Code Stream
Releasing High Quality Applications More Quickly with vrealize Code Stream T E C H N I C A L W H I T E P A P E R A B S T R A C T : If your company relies on applications to enable new business opportunities
About me - Joel Montvelisky
About me - Joel Montvelisky PractiTest Co Founder & Prod. Architect QA Instructor & Consultant Mercury Interactive - QA Manager (retired ) TD, QC, WR, QTP, etc ITCB (IL) Advisory Board QABlog.practitest.com
Automated Invoice Matching
White Paper Automated Invoice Matching Reduce Matching Cycle Times. Increase ROI Version 1.0 Last Updated: 11-06-2010 www.sutisoft.com 1 2 3 4 5 6 7 8 Abstract Introduction Need for Automating Finding
Reducing Cost and Risk Through Software Asset Management
RESEARCH SUMMARY NOVEMBER 2013 Reducing Cost and Risk Through Software Asset Management A survey conducted by CA Technologies among delegate attendees at the 2013 Gartner IT Financial, Procurement & Asset
Software License Management: 2012 Software License Management Benchmark Survey SOLUTION WHITE PAPER
Software License Management: 2012 Software License Management Benchmark Survey SOLUTION WHITE PAPER TABLE OF CONTENTS EXECUTIVE SUMMARY................................................ 1 WHAT IS SOFTWARE
Managing non-microsoft updates
Managing non-microsoft updates With Microsoft s System Center Configuration Manager secunia.com 1 How to patch all your programs directly in Microsoft System Center 2012 A common perception is that System
Why is it so difficult to grow revenue, identify emerging customers and partners, and expand into new markets through the indirect sales channel?
1 Spring, 2012 Increase Revenues with Channel Sales Management www.channelinsight.com EXECUTIVE SUMMARY Why is it so difficult to grow revenue, identify emerging customers and partners, and expand into
SAP IT Infrastructure Management. Dirk Smit ALM Engagement Manager SAP Africa [email protected]
SAP IT Infrastructure Management Dirk Smit ALM Engagement Manager SAP Africa [email protected] Challenges in managing heterogeneous IT environments Determine the value that IT contributes to the business
Minimize Access Risk and Prevent Fraud With SAP Access Control
SAP Solution in Detail SAP Solutions for Governance, Risk, and Compliance SAP Access Control Minimize Access Risk and Prevent Fraud With SAP Access Control Table of Contents 3 Quick Facts 4 The Access
Managing Open Source Code Best Practices
Managing Open Source Code Best Practices September 24, 2008 Agenda Welcome and Introduction Eran Strod Open Source Best Practices Hal Hearst Questions & Answers Next Steps About Black Duck Software Accelerate
Application Security in the Software Development Lifecycle
Application Security in the Software Development Lifecycle Issues, Challenges and Solutions www.quotium.com 1/15 Table of Contents EXECUTIVE SUMMARY... 3 INTRODUCTION... 4 IMPACT OF SECURITY BREACHES TO
