{"id":19579,"date":"2023-07-20T15:18:51","date_gmt":"2023-07-20T09:48:51","guid":{"rendered":"https:\/\/ivaluegroup.com\/en-in\/?p=19579"},"modified":"2023-07-20T15:20:58","modified_gmt":"2023-07-20T09:50:58","slug":"unified-application-resilience-ivalue-opentext","status":"publish","type":"post","link":"https:\/\/ivaluegroup.com\/en-in\/oems\/demo\/unified-application-resilience-ivalue-opentext\/","title":{"rendered":"Unified Application Resilience &#8211; iValue | Opentext"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"19579\" class=\"elementor elementor-19579\" data-elementor-post-type=\"post\">\n\t\t\t\t<div class=\"elementor-element elementor-element-ceb450a e-flex e-con-boxed e-con e-parent\" data-id=\"ceb450a\" data-element_type=\"container\" data-core-v316-plus=\"true\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-a4d98b1 elementor-widget elementor-widget-image\" data-id=\"a4d98b1\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<style>\/*! elementor - v3.20.0 - 26-03-2024 *\/\n.elementor-widget-image{text-align:center}.elementor-widget-image a{display:inline-block}.elementor-widget-image a img[src$=\".svg\"]{width:48px}.elementor-widget-image img{vertical-align:middle;display:inline-block}<\/style>\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"1024\" height=\"577\" src=\"https:\/\/ivaluegroup.com\/en-in\/wp-content\/uploads\/sites\/2\/2023\/07\/Application-Delivery-1-1024x577.png\" class=\"attachment-large size-large wp-image-19581\" alt=\"\" srcset=\"https:\/\/ivaluegroup.com\/en-in\/wp-content\/uploads\/sites\/2\/2023\/07\/Application-Delivery-1-1024x577.png 1024w, https:\/\/ivaluegroup.com\/en-in\/wp-content\/uploads\/sites\/2\/2023\/07\/Application-Delivery-1-300x169.png 300w, https:\/\/ivaluegroup.com\/en-in\/wp-content\/uploads\/sites\/2\/2023\/07\/Application-Delivery-1-768x433.png 768w, https:\/\/ivaluegroup.com\/en-in\/wp-content\/uploads\/sites\/2\/2023\/07\/Application-Delivery-1-1536x865.png 1536w, https:\/\/ivaluegroup.com\/en-in\/wp-content\/uploads\/sites\/2\/2023\/07\/Application-Delivery-1-24x14.png 24w, https:\/\/ivaluegroup.com\/en-in\/wp-content\/uploads\/sites\/2\/2023\/07\/Application-Delivery-1-36x20.png 36w, https:\/\/ivaluegroup.com\/en-in\/wp-content\/uploads\/sites\/2\/2023\/07\/Application-Delivery-1-48x27.png 48w, https:\/\/ivaluegroup.com\/en-in\/wp-content\/uploads\/sites\/2\/2023\/07\/Application-Delivery-1.png 1640w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-9d143e2 e-flex e-con-boxed e-con e-parent\" data-id=\"9d143e2\" data-element_type=\"container\" data-core-v316-plus=\"true\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-acdd6e5 elementor-widget elementor-widget-text-editor\" data-id=\"acdd6e5\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<style>\/*! elementor - v3.20.0 - 26-03-2024 *\/\n.elementor-widget-text-editor.elementor-drop-cap-view-stacked .elementor-drop-cap{background-color:#69727d;color:#fff}.elementor-widget-text-editor.elementor-drop-cap-view-framed .elementor-drop-cap{color:#69727d;border:3px solid;background-color:transparent}.elementor-widget-text-editor:not(.elementor-drop-cap-view-default) .elementor-drop-cap{margin-top:8px}.elementor-widget-text-editor:not(.elementor-drop-cap-view-default) .elementor-drop-cap-letter{width:1em;height:1em}.elementor-widget-text-editor .elementor-drop-cap{float:left;text-align:center;line-height:1;font-size:50px}.elementor-widget-text-editor .elementor-drop-cap-letter{display:inline-block}<\/style>\t\t\t\t<p>Web applications are a growing focus point for cyber criminals. Motivated by financial outcomes, they understand the value of the information exchanged and stored in web applications. The 2020 Verizon Data Breach Investigations Report (DBIR) confirms that this is the case: 43% of data breaches are tied to web application vulnerabilities\u2014which more than doubled year over year. Legacy, outside-in DevOps security is failing, and a new approach is needed that takes an inside-out approach.<\/p><p>Implementing Fortify on Demand, Static Application Security Testing (SAST), and Dynamic Application Security Testing (DAST) in an organization&#8217;s application infrastructure can provide several important benefits.<\/p><p>\u00a0<\/p><p>Reach Out to the Team for a Quick Demo<\/p><p>Fill the form Beside.<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Web applications are a growing focus point for cyber criminals. Motivated by financial outcomes, they understand the value of the information exchanged and stored in web applications. The 2020 Verizon Data Breach Investigations Report (DBIR) confirms that this is the case: 43% of data breaches are tied to web application vulnerabilities\u2014which more than doubled year &hellip;<\/p>\n<p class=\"read-more\"> <a class=\"\" href=\"https:\/\/ivaluegroup.com\/en-in\/oems\/demo\/unified-application-resilience-ivalue-opentext\/\"> <span class=\"screen-reader-text\">Unified Application Resilience &#8211; iValue | Opentext<\/span> Read More \u00bb<\/a><\/p>\n","protected":false},"author":27,"featured_media":15073,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"default","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"disabled","ast-breadcrumbs-content":"","ast-featured-img":"disabled","footer-sml-layout":"","theme-transparent-header-meta":"default","adv-header-id-meta":"","stick-header-meta":"default","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","footnotes":"","_links_to":"","_links_to_target":""},"categories":[110],"tags":[],"whitepapers":[],"case_studies":[],"acf":[],"_links":{"self":[{"href":"https:\/\/ivaluegroup.com\/en-in\/wp-json\/wp\/v2\/posts\/19579"}],"collection":[{"href":"https:\/\/ivaluegroup.com\/en-in\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/ivaluegroup.com\/en-in\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/ivaluegroup.com\/en-in\/wp-json\/wp\/v2\/users\/27"}],"replies":[{"embeddable":true,"href":"https:\/\/ivaluegroup.com\/en-in\/wp-json\/wp\/v2\/comments?post=19579"}],"version-history":[{"count":0,"href":"https:\/\/ivaluegroup.com\/en-in\/wp-json\/wp\/v2\/posts\/19579\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/ivaluegroup.com\/en-in\/wp-json\/wp\/v2\/media\/15073"}],"wp:attachment":[{"href":"https:\/\/ivaluegroup.com\/en-in\/wp-json\/wp\/v2\/media?parent=19579"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ivaluegroup.com\/en-in\/wp-json\/wp\/v2\/categories?post=19579"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ivaluegroup.com\/en-in\/wp-json\/wp\/v2\/tags?post=19579"},{"taxonomy":"whitepapers","embeddable":true,"href":"https:\/\/ivaluegroup.com\/en-in\/wp-json\/wp\/v2\/whitepapers?post=19579"},{"taxonomy":"case_studies","embeddable":true,"href":"https:\/\/ivaluegroup.com\/en-in\/wp-json\/wp\/v2\/case_studies?post=19579"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}