Statements (71)
Predicate | Object |
---|---|
gptkbp:instance_of |
gptkb:test_subjects
|
gptkbp:aims_to |
Improve Software Security
|
gptkbp:developed_by |
gptkb:Veracode
|
gptkbp:enables |
Continuous Security Monitoring
|
gptkbp:focuses_on |
Vulnerability Assessment
|
gptkbp:helps |
Identify Security Flaws
|
https://www.w3.org/2000/01/rdf-schema#label |
Veracode Security Labs
|
gptkbp:integrates_with |
gptkb:developers
|
gptkbp:is_available_on |
Multiple Platforms
|
gptkbp:is_compatible_with |
Cloud Environments
Third-Party Libraries |
gptkbp:is_designed_for |
gptkb:Risk_Management
Enterprise Applications |
gptkbp:is_designed_to |
Enhance Security Posture
Reduce Security Risks |
gptkbp:is_focused_on |
gptkb:security
Compliance Standards Software Supply Chain Security |
gptkbp:is_integrated_with |
Development Frameworks
Security Information and Event Management (SIEM) Systems CI/ CD Pipelines |
gptkbp:is_part_of |
gptkb:Risk_Management
gptkb:Veracode_Platform Enterprise Security Strategy Application Security Lifecycle Application Development Process |
gptkbp:is_recognized_by |
Industry Analysts
|
gptkbp:is_recognized_for |
Customer Satisfaction
Innovation in Security Testing Thought Leadership in Security |
gptkbp:is_respected_by |
Global Enterprises
|
gptkbp:is_used_by |
Software Development Teams
|
gptkbp:is_used_for |
Code Review
Threat Detection |
gptkbp:is_utilized_by |
Compliance Officers
IT Security Teams Security Professionals Risk Management Teams |
gptkbp:offers |
gptkb:test_subjects
gptkb:security Compliance Reporting Threat Modeling Penetration Testing Services API Security Testing Container Security Testing Security Risk Assessment Tools Web Application Security Testing Security Incident Response Plans Security Policy Management Interactive Application Security Testing (IAST) Mobile Application Security Testing |
gptkbp:provides |
gptkb:Risk_Management
gptkb:security_services gptkb:security Security Best Practices Security Audits Security Training Security Assessments Security Frameworks Security Metrics Remediation Guidance Incident Response Support Security Compliance Solutions |
gptkbp:supports |
gptkb:vulnerability
gptkb:administration Agile Development Incident Management Dev Sec Ops Practices |
gptkbp:utilizes |
Automated Scanning
|
gptkbp:bfsParent |
gptkb:Veracode
|
gptkbp:bfsLayer |
5
|