Hi [[ session.user.profile.firstName ]]

Steps to Ensure your Organization’s Software Security

Organizations today face increasing threats to their data, from ever-more nefarious, cutting-edge hackers who put any large company with a website or an app at risk.

But there are steps that can be taken to thwart the theft of digital data:

o Ensure compliance to standards. There are several code security standards out there, but the question is, how do organizations understand what they mean and apply them to their own software development efforts.

o Identify security flaws across the organization. Code coming from your developers, COTS and (most suspect) open source can all have potentially damaging flaws.

o Stay informed with reporting and metrics. Organizations must measure and gauge the effectiveness of their defect reduction efforts.

We invite you to join Rod Cope and Roy Sarkar of Rogue Wave Software for a unique webinar discussion of the security issues and threats organizations face today.
Recorded Feb 18 2015 45 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Rod Cope, CTO; Roy Sarkar, Technical Journalist, Rogue Wave Software
Presentation preview: Steps to Ensure your Organization’s Software Security

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Embedding database analytics as stored external procedures Recorded: Dec 10 2015 53 mins
    Wendy Hou, product manager and Mark Sweeney, sales engineer, Rogue Wave Software
    Inside or outside, which is better? You know that embedding analytics in databases offer several benefits including security, performance, and enabling users to take advantage of the analytics more readily. But how do you do it?

    In this installment of our embedded analytics series we discuss embedding analytics using stored external procedures – an option provided by all major commercial RDBMS providers. These procedures are invoked in the same manner as internal stored SQL procedures but they run in a process space separate from that of the database itself. This separation can be advantageous in certain scenarios. In particular, if a data set is selected for analysis that pushes the limits of physical memory then the database is isolated from any issues that arise in running the analytics on this problematic data.

    In this webinar, you will see detailed steps on how to implement the analytics as a shared library using IMSL Libraries for C for illustration.

    If you missed part one of the series, watch the recording here: https://www.brighttalk.com/webcast/12285/164525
  • OSS has taken over the enterprise: The top five OSS trends of 2015 Recorded: Nov 19 2015 54 mins
    Richard Sherrard, director of product management, Rogue Wave Software
    It’s everywhere. From your phone to the enterprise, open source software (OSS) is running far and wide. Gartner predicts that by 2016, 99 percent of Global 2000 enterprises will use open source in mission-critical software. While it’s free, easy to find, and pushes software to the market faster, it’s vital to understand how to use OSS safely.

    Join Richard Sherrard, director of product management at Rogue Wave, for a live webinar reviewing the top five OSS trends of 2015. From OSS discovery, to risk, and governance, we’ll take a deep dive into the trends we’ve noticed this year while providing you with some predictions for 2016.

    In this webinar you’ll learn how to:

    -Discover the OSS in your codebase to ensure that code is free of bugs, security vulnerabilities, and license conflicts

    -Implement controls on OSS usage at your organization

    -Create a multitier approach to OSS risk reduction with open source tools, static code analysis and dynamic analysis
  • Java in the database–is it really useful? Solving impossible Big Data challenges Recorded: Oct 8 2015 46 mins
    Wendy Hou, Product Manager & Mark Sweeney, Sales Engineer, Rogue Wave Software
    Since 1999, Oracle has included a Java Virtual Machine (JVM) within the database. That makes it old enough to drive and well past time to get a real job. In today’s data-obsessed world, that job is fortifying Oracle’s database with a healthy dose of analytics to give your database the power to handle the data challenges of the 21st century.

    There are numerous advantages to adopting a 100% Java code base for in-database analytics. Security is doubly enhanced by performing all analytics in the database. The code is highly portable as the identical java classes that run in the database will run on any client with any operating system. Plus the modern paradigm of taking the algorithms to the data is elegantly achieved with minimal effort.

    Until now, a single Java solution with all these qualities wasn’t available. By using JMSL Numerical Libraries, you get a suite of algorithms with routines for predictive analytics, data mining, regression, forecasting, and data cleaning. JMSL is scalable and can be used in Hadoop MapReduce applications. Now, JMSL Numerical Libraries makes Java in the database more than useful -- it makes it unbeatable.

    This webinar walks through the argument of why embedded analytics is better and provides examples using an Oracle database and JMSL. And if you’re not convinced, tell us so in the live, interactive Q&A!
  • Shifting the conversation from active interception to proactive neutralization Recorded: Aug 26 2015 41 mins
    Rod Cope, CTO, Rogue Wave
    When did we forget that old saying, “prevention is the best medicine”, when it comes to cybersecurity? The current focus on mitigating real-time attacks and creating stronger defensive networks has overshadowed the many ways to prevent attacks right at the source – where security management has the biggest impact. Source code is where it all begins and where attack mitigation is the most effective.

    In this webinar we’ll discuss methods of proactive threat assessment and mitigation that organizations use to advance cybersecurity goals today. From using static analysis to detect vulnerabilities as early as possible, to managing supply chain security through standards compliance, to scanning for and understanding potential risks in open source, these methods shift attack mitigation efforts left to simplify fixes and enable more cost-effective solutions.
  • Create agile confidence for better application security Recorded: Jun 16 2015 50 mins
    Christine Bottagaro, Rogue Wave Software, CMO
    With many organizations transforming development efforts from traditional environments toward agile development, the need to redefine and establish security standards and testing methods is more important than ever.

    In this second one-hour webinar you'll learn how to:

    -Integrate security and compliance testing with agile development
    -Provide context for fast triage and remediation
    -Create policies for code management in integrated testing environments

    This is an interactive session where we’ll answer your questions on improving your application security processes. Any unanswered questions will be collected and answered in our third webinar in the series.
  • Steps to Ensure your Organization’s Software Security Recorded: Feb 18 2015 45 mins
    Rod Cope, CTO; Roy Sarkar, Technical Journalist, Rogue Wave Software
    Organizations today face increasing threats to their data, from ever-more nefarious, cutting-edge hackers who put any large company with a website or an app at risk.

    But there are steps that can be taken to thwart the theft of digital data:

    o Ensure compliance to standards. There are several code security standards out there, but the question is, how do organizations understand what they mean and apply them to their own software development efforts.

    o Identify security flaws across the organization. Code coming from your developers, COTS and (most suspect) open source can all have potentially damaging flaws.

    o Stay informed with reporting and metrics. Organizations must measure and gauge the effectiveness of their defect reduction efforts.

    We invite you to join Rod Cope and Roy Sarkar of Rogue Wave Software for a unique webinar discussion of the security issues and threats organizations face today.
Rogue Wave Software
Rogue Wave Software

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Steps to Ensure your Organization’s Software Security
  • Live at: Feb 18 2015 6:00 pm
  • Presented by: Rod Cope, CTO; Roy Sarkar, Technical Journalist, Rogue Wave Software
  • From:
Your email has been sent.
or close