Statements (105)
Predicate | Object |
---|---|
gptkbp:instance_of |
gptkb:Company
|
gptkbp:acquired_by |
gptkb:CA_Technologies
|
gptkbp:founded |
gptkb:2006
|
gptkbp:founder |
gptkb:Chris_Wysopal
|
gptkbp:has_part |
gptkb:Veracode_Code_Review
gptkb:Veracode_Dev_Sec_Ops gptkb:Veracode_Dynamic_Analysis gptkb:Veracode_Greenlight gptkb:Veracode_Platform gptkb:Veracode_Security_Labs gptkb:Veracode_Security_Services gptkb:Veracode_Security_Testing_Services gptkb:Veracode_Software_Composition_Analysis gptkb:Veracode_Static_Analysis Veracode Security Incident Response Planning Services Veracode API Veracode Application Security Program Veracode Compliance Veracode Governance Veracode Integrations Veracode Penetration Testing Veracode Reporting Veracode Risk Management Veracode Security Alerts Veracode Security Assessment Veracode Security Assessment Services Veracode Security Awareness Veracode Security Best Practices Veracode Security Compliance Services Veracode Security Consulting Veracode Security Culture Veracode Security Dashboard Veracode Security Framework Veracode Security Incident Analysis Services Veracode Security Incident Management Services Veracode Security Incident Prevention Services Veracode Security Incident Recovery Services Veracode Security Incident Response Activities Veracode Security Incident Response Analysis Veracode Security Incident Response Approaches Veracode Security Incident Response Assessment Veracode Security Incident Response Audit Veracode Security Incident Response Best Practices Veracode Security Incident Response Checklists Veracode Security Incident Response Collaboration Veracode Security Incident Response Communication Veracode Security Incident Response Coordination Veracode Security Incident Response Documentation Veracode Security Incident Response Drills Veracode Security Incident Response Evaluation Veracode Security Incident Response Exercises Veracode Security Incident Response Frameworks Veracode Security Incident Response Guidelines Veracode Security Incident Response Initiatives Veracode Security Incident Response Inspection Veracode Security Incident Response Management Veracode Security Incident Response Methodologies Veracode Security Incident Response Models Veracode Security Incident Response Monitoring Veracode Security Incident Response Operations Veracode Security Incident Response Plans Veracode Security Incident Response Policies Veracode Security Incident Response Practices Veracode Security Incident Response Procedures Veracode Security Incident Response Programs Veracode Security Incident Response Projects Veracode Security Incident Response Reporting Veracode Security Incident Response Resources Veracode Security Incident Response Review Veracode Security Incident Response Services Veracode Security Incident Response Simulations Veracode Security Incident Response Solutions Veracode Security Incident Response Strategies Veracode Security Incident Response Surveillance Veracode Security Incident Response Techniques Veracode Security Incident Response Templates Veracode Security Incident Response Tools Veracode Security Incident Response Tracking Veracode Security Metrics Veracode Security Notifications Veracode Security Policy Veracode Security Recommendations Veracode Security Reports Veracode Security Risk Assessment Services Veracode Security Solutions Veracode Security Standards Veracode Security Testing Veracode Security Tools Veracode Security Training Veracode Threat Modeling Veracode Training Veracode Vulnerability Management Veracode Security Incident Response Training Services |
gptkbp:headquarters |
gptkb:Burlington,_Massachusetts
|
https://www.w3.org/2000/01/rdf-schema#label |
Veracode
|
gptkbp:industry |
application security
|
gptkbp:offers |
dynamic analysis
static analysis application security testing software composition analysis |
gptkbp:serves |
enterprise customers
|
gptkbp:website |
www.veracode.com
|
gptkbp:bfsParent |
gptkb:Snyk
gptkb:CA_Technologies |
gptkbp:bfsLayer |
4
|