Veracode

GPTKB entity

Statements (105)
Predicate Object
gptkbp:instance_of gptkb:Company
gptkbp:acquired_by gptkb:CA_Technologies
gptkbp:founded gptkb:2006
gptkbp:founder gptkb:Chris_Wysopal
gptkbp:has_part gptkb:Veracode_Code_Review
gptkb:Veracode_Dev_Sec_Ops
gptkb:Veracode_Dynamic_Analysis
gptkb:Veracode_Greenlight
gptkb:Veracode_Platform
gptkb:Veracode_Security_Labs
gptkb:Veracode_Security_Services
gptkb:Veracode_Security_Testing_Services
gptkb:Veracode_Software_Composition_Analysis
gptkb:Veracode_Static_Analysis
Veracode Security Incident Response Planning Services
Veracode API
Veracode Application Security Program
Veracode Compliance
Veracode Governance
Veracode Integrations
Veracode Penetration Testing
Veracode Reporting
Veracode Risk Management
Veracode Security Alerts
Veracode Security Assessment
Veracode Security Assessment Services
Veracode Security Awareness
Veracode Security Best Practices
Veracode Security Compliance Services
Veracode Security Consulting
Veracode Security Culture
Veracode Security Dashboard
Veracode Security Framework
Veracode Security Incident Analysis Services
Veracode Security Incident Management Services
Veracode Security Incident Prevention Services
Veracode Security Incident Recovery Services
Veracode Security Incident Response Activities
Veracode Security Incident Response Analysis
Veracode Security Incident Response Approaches
Veracode Security Incident Response Assessment
Veracode Security Incident Response Audit
Veracode Security Incident Response Best Practices
Veracode Security Incident Response Checklists
Veracode Security Incident Response Collaboration
Veracode Security Incident Response Communication
Veracode Security Incident Response Coordination
Veracode Security Incident Response Documentation
Veracode Security Incident Response Drills
Veracode Security Incident Response Evaluation
Veracode Security Incident Response Exercises
Veracode Security Incident Response Frameworks
Veracode Security Incident Response Guidelines
Veracode Security Incident Response Initiatives
Veracode Security Incident Response Inspection
Veracode Security Incident Response Management
Veracode Security Incident Response Methodologies
Veracode Security Incident Response Models
Veracode Security Incident Response Monitoring
Veracode Security Incident Response Operations
Veracode Security Incident Response Plans
Veracode Security Incident Response Policies
Veracode Security Incident Response Practices
Veracode Security Incident Response Procedures
Veracode Security Incident Response Programs
Veracode Security Incident Response Projects
Veracode Security Incident Response Reporting
Veracode Security Incident Response Resources
Veracode Security Incident Response Review
Veracode Security Incident Response Services
Veracode Security Incident Response Simulations
Veracode Security Incident Response Solutions
Veracode Security Incident Response Strategies
Veracode Security Incident Response Surveillance
Veracode Security Incident Response Techniques
Veracode Security Incident Response Templates
Veracode Security Incident Response Tools
Veracode Security Incident Response Tracking
Veracode Security Metrics
Veracode Security Notifications
Veracode Security Policy
Veracode Security Recommendations
Veracode Security Reports
Veracode Security Risk Assessment Services
Veracode Security Solutions
Veracode Security Standards
Veracode Security Testing
Veracode Security Tools
Veracode Security Training
Veracode Threat Modeling
Veracode Training
Veracode Vulnerability Management
Veracode Security Incident Response Training Services
gptkbp:headquarters gptkb:Burlington,_Massachusetts
https://www.w3.org/2000/01/rdf-schema#label Veracode
gptkbp:industry application security
gptkbp:offers dynamic analysis
static analysis
application security testing
software composition analysis
gptkbp:serves enterprise customers
gptkbp:website www.veracode.com
gptkbp:bfsParent gptkb:Snyk
gptkb:CA_Technologies
gptkbp:bfsLayer 4