{"id":1503,"date":"2016-11-15T13:37:02","date_gmt":"2016-11-15T12:37:02","guid":{"rendered":"https:\/\/www.devon.nl\/?page_id=1503"},"modified":"2025-07-31T14:05:24","modified_gmt":"2025-07-31T12:05:24","slug":"devsecops","status":"publish","type":"page","link":"https:\/\/old.devon.nl\/en\/devsecops\/","title":{"rendered":"DevSecOps"},"content":{"rendered":"<div class=\"wpb-content-wrapper\">[mk_page_section bg_image=&#8221;https:\/\/old.devon.nl\/wp-content\/uploads\/2017\/05\/banner.png&#8221; bg_position=&#8221;center center&#8221; bg_stretch=&#8221;true&#8221; video_color_mask=&#8221;#000000&#8243; video_opacity=&#8221;0.5&#8243; min_height=&#8221;250&#8243; js_vertical_centered=&#8221;true&#8221; sidebar=&#8221;sidebar-1&#8243;][vc_column][mk_padding_divider][mk_fancy_title tag_name=&#8221;h1&#8243; color=&#8221;#ffffff&#8221; size=&#8221;50&#8243; force_font_size=&#8221;true&#8221; size_smallscreen=&#8221;35&#8243; size_tablet=&#8221;35&#8243; size_phone=&#8221;35&#8243; margin_bottom=&#8221;0&#8243; font_family=&#8221;Josefin+Sans&#8221; font_type=&#8221;google&#8221; align=&#8221;center&#8221;]DevSecOps[\/mk_fancy_title][\/vc_column][\/mk_page_section][mk_page_section sidebar=&#8221;sidebar-1&#8243;][vc_column width=&#8221;2\/3&#8243;][mk_padding_divider][mk_fancy_title color=&#8221;#ff5000&#8243; size=&#8221;30&#8243; force_font_size=&#8221;true&#8221; size_smallscreen=&#8221;20&#8243; size_tablet=&#8221;20&#8243; size_phone=&#8221;20&#8243; font_weight=&#8221;400&#8243; txt_transform=&#8221;uppercase&#8221; font_family=&#8221;Josefin+Sans&#8221; font_type=&#8221;google&#8221;]Security[\/mk_fancy_title][vc_column_text css=&#8221;.vc_custom_1540827492955{margin-bottom: 0px !important;}&#8221;]Software security is no longer optional. Headlines have put pressure on businesses to strike threats with iron fists. Hackers on the other end, are finding alternative ways of accessing private and confidential data. In 2017 alone, attacks via web-based software amounted to over 92% of hacking incidents. Only a combination of static, dynamic and hybrid application scanning tools, combined with developer training, standards and security intelligence, can improve security in the software development life cycle. We call it\u00a0<strong>DevSecOps<\/strong>, the program that helps detect and prevent software vulnerabilities even before code is written until the software hits end of life.<\/p>\n<p>Our Software Security Consultants are highly skilled at penetrating and securing Financial and e-commerce solutions. We leave no stone unturned until our partner attains a certain level of maturity at continuously delivering Secure Software. No matter the size of the organization or the level of security knowledge, DevOn guides at every step with its broad experience, preventing from falling into pitfalls and spending time in figuring out how to do it right. Our Consultants work with some of the best Open Source Projects with OWASP and have won bounties with many Internet Giants for responsibly disclosing vulnerabilities in their systems.<\/p>\n<p>Take control of your Software Development endeavor and start building security into the software itself, right from the beginning. Gain the confidence to continuously ship your software at a faster speed, yet ensuring security is not compromised. The integral elements of DevOn\u2019s DevSecOps Framework include education, manual verification and automated verification using dynamic and static application security testing, software build integrations, security requirements, software operational environment and incident response. All the elements integrate very well with the Software Development Lifecycle.[\/vc_column_text][mk_padding_divider][\/vc_column][vc_column width=&#8221;1\/3&#8243;][mk_padding_divider][mk_fancy_title color=&#8221;#ff5000&#8243; size=&#8221;30&#8243; force_font_size=&#8221;true&#8221; size_smallscreen=&#8221;20&#8243; size_tablet=&#8221;20&#8243; size_phone=&#8221;20&#8243; font_weight=&#8221;400&#8243; txt_transform=&#8221;uppercase&#8221; font_family=&#8221;Josefin+Sans&#8221; font_type=&#8221;google&#8221;]Whitepaper[\/mk_fancy_title][mk_image src=&#8221;https:\/\/old.devon.nl\/wp-content\/uploads\/2017\/06\/front-security.jpg&#8221; image_size=&#8221;full&#8221; link=&#8221;https:\/\/old.devon.nl\/en\/whitepaper-continuous-software-security-maturity-model\/&#8221;][mk_button dimension=&#8221;flat&#8221; corner_style=&#8221;rounded&#8221; size=&#8221;large&#8221; letter_spacing=&#8221;1&#8243; url=&#8221;https:\/\/old.devon.nl\/en\/whitepaper-continuous-software-security-maturity-model\/&#8221; fullwidth=&#8221;true&#8221;]Download the whitepaper[\/mk_button][\/vc_column][\/mk_page_section][vc_row][vc_column][mk_fancy_title color=&#8221;#ff5000&#8243; size=&#8221;22&#8243; font_weight=&#8221;400&#8243; txt_transform=&#8221;uppercase&#8221; letter_spacing=&#8221;1&#8243; margin_bottom=&#8221;0&#8243; font_family=&#8221;Josefin+Sans&#8221; font_type=&#8221;google&#8221;]PRINCIPLES[\/mk_fancy_title][mk_padding_divider][mk_steps step=&#8221;5&#8243; icon_1=&#8221;mk-icon-building&#8221; title_1=&#8221;Build Security in&#8221; icon_2=&#8221;mk-moon-screen&#8221; title_2=&#8221;Automate as much as possible&#8221; icon_3=&#8221;mk-moon-target-3&#8243; title_3=&#8221;Let people focus on what tools cannot find&#8221; icon_4=&#8221;mk-moon-brain&#8221; title_4=&#8221;Train everyone involved with Software Development&#8221; icon_5=&#8221;mk-icon-bell&#8221; title_5=&#8221;Be vigilant about every line of code, If security fails, prudently avoid Software Delivery&#8221;][\/vc_column][\/vc_row][mk_page_section bg_color=&#8221;#e0e0e0&#8243; sidebar=&#8221;sidebar-1&#8243;][vc_column][mk_padding_divider size=&#8221;20&#8243;][mk_fancy_title color=&#8221;#000000&#8243; size=&#8221;30&#8243; force_font_size=&#8221;true&#8221; size_smallscreen=&#8221;20&#8243; size_tablet=&#8221;20&#8243; size_phone=&#8221;20&#8243; font_weight=&#8221;300&#8243; margin_top=&#8221;20&#8243; font_family=&#8221;Josefin+Sans&#8221; font_type=&#8221;google&#8221;]\u201cDevSecOps helps build security within the software aggressively, while delivering at a faster pace.\u201d[\/mk_fancy_title][mk_padding_divider size=&#8221;20&#8243;][\/vc_column][\/mk_page_section][mk_page_section][vc_column][mk_padding_divider size=&#8221;20&#8243;][mk_fancy_title color=&#8221;#ff5000&#8243; size=&#8221;30&#8243; force_font_size=&#8221;true&#8221; size_smallscreen=&#8221;20&#8243; size_tablet=&#8221;20&#8243; size_phone=&#8221;20&#8243; font_weight=&#8221;400&#8243; txt_transform=&#8221;uppercase&#8221; letter_spacing=&#8221;1&#8243; margin_bottom=&#8221;0&#8243; font_family=&#8221;Josefin+Sans&#8221; font_type=&#8221;google&#8221;]DevSecOps[\/mk_fancy_title][\/vc_column][\/mk_page_section][mk_page_section][vc_column width=&#8221;1\/3&#8243;][mk_custom_box corner_radius=&#8221;5&#8243; bg_color=&#8221;#498fab&#8221; elevation_effect=&#8221;true&#8221;][vc_icon icon_fontawesome=&#8221;fa fa-lock&#8221; color=&#8221;white&#8221; align=&#8221;center&#8221;][mk_fancy_title color=&#8221;#ffffff&#8221; size=&#8221;22&#8243; font_weight=&#8221;400&#8243; txt_transform=&#8221;uppercase&#8221; letter_spacing=&#8221;1&#8243; margin_bottom=&#8221;0&#8243; font_family=&#8221;Josefin+Sans&#8221; font_type=&#8221;google&#8221;]SecDevOps[\/mk_fancy_title][vc_column_text css=&#8221;.vc_custom_1534855651035{margin-bottom: 0px !important;}&#8221;]<span style=\"color: #ffffff;\">Get Security at Speed. Take advantage of automation to tackle security issues including configuration management, securing images\/containers, use of immutable servers, and other techniques to address security challenges facing operations teams. When there is a software delivery, be confident about the software\u2019s state of security. Integrate security into the existing DevOps process and to your Continuous Integration and Continuous Delivery pipelines. Establish control of what changes are made and what happens when those are done.<\/span>[\/vc_column_text][\/mk_custom_box][mk_custom_box corner_radius=&#8221;5&#8243; bg_color=&#8221;#ff5000&#8243; elevation_effect=&#8221;true&#8221;][vc_icon type=&#8221;linecons&#8221; icon_linecons=&#8221;vc_li vc_li-search&#8221; color=&#8221;white&#8221; align=&#8221;center&#8221;][mk_fancy_title color=&#8221;#ffffff&#8221; size=&#8221;22&#8243; font_weight=&#8221;400&#8243; txt_transform=&#8221;uppercase&#8221; letter_spacing=&#8221;1&#8243; margin_bottom=&#8221;0&#8243; font_family=&#8221;Josefin+Sans&#8221; font_type=&#8221;google&#8221;]Vulnerability Analysis and Penetration Testing[\/mk_fancy_title][vc_column_text css=&#8221;.vc_custom_1534856244548{margin-bottom: 0px !important;}&#8221;]<span style=\"color: #ffffff;\">Get insight in the weaknesses in your software and how they translate to real world risks. A Penetration Test focuses on evaluating the security of a web application by looking for weak spots and how to successfully exploit them to prove the existence of a threat. The process involves an active analysis of the application for any vulnerabilities, either technical or business flaws. Identified security issues will be presented to the system owner, along with an assessment of the impact, a proposal for mitigation or a technical solution.<\/span>[\/vc_column_text][\/mk_custom_box][\/vc_column][vc_column width=&#8221;1\/3&#8243;][mk_custom_box corner_radius=&#8221;5&#8243; bg_color=&#8221;#55bdc6&#8243; elevation_effect=&#8221;true&#8221;][vc_icon icon_fontawesome=&#8221;fa fa-user-secret&#8221; color=&#8221;white&#8221; align=&#8221;center&#8221;][mk_fancy_title color=&#8221;#ffffff&#8221; size=&#8221;22&#8243; font_weight=&#8221;400&#8243; txt_transform=&#8221;uppercase&#8221; letter_spacing=&#8221;1&#8243; margin_bottom=&#8221;0&#8243; font_family=&#8221;Josefin+Sans&#8221; font_type=&#8221;google&#8221;]Software Security Audit Services[\/mk_fancy_title][vc_column_text css=&#8221;.vc_custom_1534856115850{margin-bottom: 0px !important;}&#8221;]<span style=\"color: #ffffff;\">Our Software Security audit services is\u00a0\u00a0<\/span><span style=\"color: #ffffff;\">designed to assess and identify threats in a Software portfolio managed by an Enterprise at designated intervals matching the release schedules or simply on demand. Software Security Audit offers a comprehensive perspective on the security state of the Application while it is running, the source code, and the network environment that hosts the application. This combined perspective of Dynamic Application Security Testing (DAST) or Penetration Testing, Static Application Security Testing (SAST) and Network.<\/span>[\/vc_column_text][\/mk_custom_box][mk_custom_box corner_radius=&#8221;5&#8243; bg_color=&#8221;#ff9868&#8243; elevation_effect=&#8221;true&#8221;][vc_icon icon_fontawesome=&#8221;fa fa-code&#8221; color=&#8221;white&#8221; align=&#8221;center&#8221;][mk_fancy_title color=&#8221;#ffffff&#8221; size=&#8221;22&#8243; font_weight=&#8221;400&#8243; txt_transform=&#8221;uppercase&#8221; letter_spacing=&#8221;1&#8243; margin_bottom=&#8221;0&#8243; font_family=&#8221;Josefin+Sans&#8221; font_type=&#8221;google&#8221;]Secure Source Code Reviews[\/mk_fancy_title][vc_column_text css=&#8221;.vc_custom_1534855774790{margin-bottom: 0px !important;}&#8221;]<span style=\"color: #ffffff;\">Identify the root cause of a weakness in software to implement security controls in the most cost-effective way. Save costs by discovering security flaws in code before the application is deployed. Security code review is the process of auditing the source code for an application to verify that the proper security controls are present, that they work as intended, and that they have been invoked in all the right places. Code review is a way of ensuring that the application has been developed so as to be \u201cself-defending\u201d in its given environment.<\/span>[\/vc_column_text][\/mk_custom_box][\/vc_column][vc_column width=&#8221;1\/3&#8243;][mk_custom_box corner_radius=&#8221;5&#8243; bg_color=&#8221;#51bcb9&#8243; elevation_effect=&#8221;true&#8221;][vc_icon icon_fontawesome=&#8221;fa fa-puzzle-piece&#8221; color=&#8221;white&#8221; align=&#8221;center&#8221;][mk_fancy_title color=&#8221;#ffffff&#8221; size=&#8221;22&#8243; font_weight=&#8221;400&#8243; txt_transform=&#8221;uppercase&#8221; letter_spacing=&#8221;1&#8243; margin_bottom=&#8221;0&#8243; font_family=&#8221;Josefin+Sans&#8221; font_type=&#8221;google&#8221;]Environment Vulnerability Testing[\/mk_fancy_title][vc_column_text css=&#8221;.vc_custom_1534856131470{margin-bottom: 0px !important;}&#8221;]<span style=\"color: #ffffff;\">Environment Vulnerability Testing helps an Enterprise prioritize risks aptly and build security controls to prevent threats just in time. We understand the business logic of an Application to detect functional level security vulnerabilities behind the hood along with technical security vulnerabilities. After an audit has been done,\u00a0reverification \u00a0<\/span><span style=\"color: #ffffff;\">of the fixed vulnerabilities are conducted as a part of the next Audit cycle as defined. Software Security Audit Services model is offered on a one-off, bi-weekly, monthly, and quarterly basis.<\/span>[\/vc_column_text][\/mk_custom_box][mk_custom_box corner_radius=&#8221;5&#8243; bg_color=&#8221;#d80041&#8243; elevation_effect=&#8221;true&#8221;][vc_icon icon_fontawesome=&#8221;fa fa-shield&#8221; color=&#8221;white&#8221; align=&#8221;center&#8221;][mk_fancy_title color=&#8221;#ffffff&#8221; size=&#8221;22&#8243; font_weight=&#8221;400&#8243; txt_transform=&#8221;uppercase&#8221; letter_spacing=&#8221;1&#8243; margin_bottom=&#8221;0&#8243; font_family=&#8221;Josefin+Sans&#8221; font_type=&#8221;google&#8221;]Secure Environment Scans[\/mk_fancy_title][vc_column_text css=&#8221;.vc_custom_1534856194395{margin-bottom: 0px !important;}&#8221;]<span style=\"color: #ffffff;\">Ensure the safety of your operation network by scanning your environment for vulnerabilities. Loopholes in the infrastructure can provide alternate ways of accessing confidential information. If a breach occurs, it only means that a vulnerability inside your network allowed it to happen. Reviewing the network configurations and scanning the network periodically gives us insight in the weaknesses present in the network.<\/span>[\/vc_column_text][\/mk_custom_box][\/vc_column][\/mk_page_section][vc_row fullwidth=&#8221;true&#8221; fullwidth_content=&#8221;false&#8221; css=&#8221;.vc_custom_1534777553406{background-color: #e7e7e7 !important;}&#8221;][vc_column width=&#8221;2\/3&#8243;][mk_padding_divider][mk_fancy_title color=&#8221;#ff5000&#8243; size=&#8221;22&#8243; font_weight=&#8221;400&#8243; txt_transform=&#8221;uppercase&#8221; letter_spacing=&#8221;1&#8243; margin_bottom=&#8221;0&#8243; font_family=&#8221;Josefin+Sans&#8221; font_type=&#8221;google&#8221;]Training[\/mk_fancy_title][vc_column_text css=&#8221;.vc_custom_1540462299253{margin-bottom: 0px !important;}&#8221;]Make sure that your people are capable of fending off cyber-attacks. Equip them with the latest knowledge on how to hack through an application, so they understand how to better protect them. DevOn offers classroom based workshops to understand how to hack applications, how to write defensive code, and to automate security. Take a look at our\u00a0<a href=\"https:\/\/old.devon.nl\/en\/training-courses\/\">training catalog.<\/a>[\/vc_column_text][mk_padding_divider][\/vc_column][vc_column width=&#8221;1\/3&#8243;][mk_padding_divider][mk_button dimension=&#8221;flat&#8221; corner_style=&#8221;rounded&#8221; size=&#8221;large&#8221; letter_spacing=&#8221;1&#8243; url=&#8221;https:\/\/old.devon.nl\/en\/training-courses\/devsecops\/&#8221; fullwidth=&#8221;true&#8221; margin_top=&#8221;40&#8243;]Check our DevSecOps trainings[\/mk_button][\/vc_column][\/vc_row][vc_row][vc_column][mk_padding_divider][\/vc_column][\/vc_row][mk_page_section sidebar=&#8221;sidebar-1&#8243;][vc_column width=&#8221;1\/4&#8243;][mk_fancy_title color=&#8221;#ff5000&#8243; size=&#8221;25&#8243; force_font_size=&#8221;true&#8221; size_smallscreen=&#8221;20&#8243; size_tablet=&#8221;20&#8243; size_phone=&#8221;20&#8243; margin_top=&#8221;20&#8243; font_family=&#8221;Josefin+Sans&#8221; font_type=&#8221;google&#8221;]Downloads[\/mk_fancy_title][vc_accordions style=&#8221;simple-style&#8221; container_bg_color=&#8221;#ffffff&#8221;][vc_accordion_tab title=&#8221;Case Study &#8211; Implementing Security into DevOps&#8221;][mk_button dimension=&#8221;flat&#8221; corner_style=&#8221;rounded&#8221; size=&#8221;medium&#8221; url=&#8221;https:\/\/old.devon.nl\/en\/case-studies\/&#8221; target=&#8221;_blank&#8221; align=&#8221;center&#8221;]Download[\/mk_button][\/vc_accordion_tab][vc_accordion_tab title=&#8221;Whitepaper &#8211; Continuous Software Security Maturity Model&#8221;][vc_column_text]Download the whitepaper by Security Expert Marudhamaran Gunasekaran below.[\/vc_column_text][mk_button dimension=&#8221;flat&#8221; corner_style=&#8221;rounded&#8221; size=&#8221;medium&#8221; url=&#8221;https:\/\/old.devon.nl\/en\/whitepaper-continuous-software-security-maturity-model\/&#8221; target=&#8221;_blank&#8221; align=&#8221;center&#8221; fullwidth=&#8221;true&#8221; margin_bottom=&#8221;0&#8243; margin_right=&#8221;0&#8243;]Download[\/mk_button][\/vc_accordion_tab][vc_accordion_tab title=&#8221;OWASP Contribution&#8221;][vc_column_text]Download our Open Source contribution the OWASP ZAP DOT NET API on nuget.org[\/vc_column_text][\/vc_accordion_tab][\/vc_accordions][\/vc_column][vc_column width=&#8221;1\/4&#8243;][mk_fancy_title color=&#8221;#ff5000&#8243; size=&#8221;25&#8243; force_font_size=&#8221;true&#8221; size_smallscreen=&#8221;20&#8243; size_tablet=&#8221;20&#8243; size_phone=&#8221;20&#8243; margin_top=&#8221;20&#8243; font_family=&#8221;Josefin+Sans&#8221; font_type=&#8221;google&#8221;]Assessment[\/mk_fancy_title][vc_column_text]Take a few minutes for our online assessment, get insight in your current state of security and get concrete proposals for improvement.[\/vc_column_text][mk_button dimension=&#8221;flat&#8221; corner_style=&#8221;rounded&#8221; size=&#8221;medium&#8221; url=&#8221;https:\/\/old.devon.nl\/en\/secure-software-assessment\/&#8221; target=&#8221;_blank&#8221; align=&#8221;center&#8221;]To the assessment[\/mk_button][\/vc_column][vc_column width=&#8221;1\/4&#8243;][mk_fancy_title color=&#8221;#ff5000&#8243; size=&#8221;25&#8243; force_font_size=&#8221;true&#8221; size_smallscreen=&#8221;20&#8243; size_tablet=&#8221;20&#8243; size_phone=&#8221;20&#8243; margin_top=&#8221;20&#8243; font_family=&#8221;Josefin+Sans&#8221; font_type=&#8221;google&#8221;]Events[\/mk_fancy_title][vc_accordions style=&#8221;simple-style&#8221; open_toggle=&#8221;-1&#8243; container_bg_color=&#8221;#ffffff&#8221;][vc_accordion_tab title=&#8221;Meetup Bangalore &#8211; India&#8221;][mk_button dimension=&#8221;flat&#8221; corner_style=&#8221;rounded&#8221; size=&#8221;medium&#8221; url=&#8221;https:\/\/www.meetup.com\/nl-NL\/SoftwareSecurityBangalore\/&#8221; align=&#8221;center&#8221;]To Meetup[\/mk_button][\/vc_accordion_tab][vc_accordion_tab title=&#8221;Meetup Delft &#8211; the Netherlands&#8221;][mk_button dimension=&#8221;flat&#8221; corner_style=&#8221;rounded&#8221; size=&#8221;medium&#8221; url=&#8221;https:\/\/www.meetup.com\/nl-NL\/SoftwareSecurityNetherlands\/&#8221; align=&#8221;center&#8221;]To Meetup[\/mk_button][\/vc_accordion_tab][\/vc_accordions][\/vc_column][vc_column width=&#8221;1\/4&#8243;][mk_fancy_title color=&#8221;#ff5000&#8243; size=&#8221;25&#8243; force_font_size=&#8221;true&#8221; size_smallscreen=&#8221;20&#8243; size_tablet=&#8221;20&#8243; size_phone=&#8221;20&#8243; margin_top=&#8221;20&#8243; font_family=&#8221;Josefin+Sans&#8221; font_type=&#8221;google&#8221;]Training[\/mk_fancy_title][vc_accordions style=&#8221;simple-style&#8221; open_toggle=&#8221;-1&#8243; container_bg_color=&#8221;#ffffff&#8221;][vc_accordion_tab title=&#8221;Hack Yourself First&#8221;][vc_column_text]Web Application Security Testing<br \/>\n\u201cHow can I test my applications for security so that security bugs can be fixed?\u201d[\/vc_column_text][mk_button dimension=&#8221;flat&#8221; corner_style=&#8221;rounded&#8221; size=&#8221;medium&#8221; url=&#8221;https:\/\/devonacademy.com\/training\/hack-yourself-first\/&#8221; target=&#8221;_blank&#8221; align=&#8221;center&#8221;]Read more[\/mk_button][\/vc_accordion_tab][vc_accordion_tab title=&#8221;Defensive Programming Workshop&#8221;][vc_column_text]\u201cHow can I ensure that I write bullet proof code that repels hackers?\u201d[\/vc_column_text][mk_button dimension=&#8221;flat&#8221; corner_style=&#8221;rounded&#8221; size=&#8221;medium&#8221; url=&#8221;https:\/\/devonacademy.com\/training\/defensive-programming\/&#8221; align=&#8221;center&#8221;]Read More[\/mk_button][\/vc_accordion_tab][\/vc_accordions][\/vc_column][\/mk_page_section][mk_page_section bg_color=&#8221;#e0e0e0&#8243; padding_top=&#8221;30&#8243; sidebar=&#8221;sidebar-1&#8243;][vc_column][mk_fancy_title tag_name=&#8221;span&#8221; color=&#8221;#000000&#8243; size=&#8221;22&#8243; font_weight=&#8221;300&#8243; txt_transform=&#8221;uppercase&#8221; letter_spacing=&#8221;1&#8243; margin_bottom=&#8221;0&#8243; font_family=&#8221;Josefin+Sans&#8221; font_type=&#8221;google&#8221; align=&#8221;center&#8221;]Meet our experts[\/mk_fancy_title][\/vc_column][vc_column][mk_image src=&#8221;https:\/\/old.devon.nl\/wp-content\/uploads\/2017\/07\/phani-bhushan-600&#215;600-500&#215;500-1.png&#8221; image_width=&#8221;150&#8243; image_height=&#8221;150&#8243; target=&#8221;_blank&#8221; align=&#8221;center&#8221; el_class=&#8221;popmake-phani_nl&#8221;][mk_fancy_title tag_name=&#8221;span&#8221; color=&#8221;#ff5000&#8243; size=&#8221;20&#8243; margin_bottom=&#8221;0&#8243; font_family=&#8221;Josefin+Sans&#8221; font_type=&#8221;google&#8221; align=&#8221;center&#8221; el_class=&#8221;popmake-phani_nl&#8221;]Phani Bhushan[\/mk_fancy_title][mk_fancy_title tag_name=&#8221;span&#8221; size=&#8221;15&#8243; margin_bottom=&#8221;0&#8243; font_family=&#8221;none&#8221; align=&#8221;center&#8221; el_class=&#8221;popmake-phani_nl&#8221;]<em>&#8220;Actions over Intentions&#8221;<\/em>[\/mk_fancy_title][vc_btn title=&#8221;&#8221; align=&#8221;center&#8221; i_icon_fontawesome=&#8221;fa fa-envelope&#8221; css=&#8221;.vc_custom_1523951097775{background-color: #e0e0e0 !important;}&#8221; add_icon=&#8221;true&#8221; link=&#8221;url:mailto%3Ap.bhushan%40devon.nl|||&#8221;][\/vc_column][\/mk_page_section]\n<\/div>","protected":false},"excerpt":{"rendered":"<p>[mk_page_section bg_image=&#8221;https:\/\/old.devon.nl\/wp-content\/uploads\/2017\/05\/banner.png&#8221; bg_position=&#8221;center center&#8221; bg_stretch=&#8221;true&#8221; video_color_mask=&#8221;#000000&#8243; video_opacity=&#8221;0.5&#8243; min_height=&#8221;250&#8243; js_vertical_centered=&#8221;true&#8221; sidebar=&#8221;sidebar-1&#8243;][vc_column][mk_padding_divider][mk_fancy_title tag_name=&#8221;h1&#8243; color=&#8221;#ffffff&#8221; size=&#8221;50&#8243; force_font_size=&#8221;true&#8221; size_smallscreen=&#8221;35&#8243; size_tablet=&#8221;35&#8243; size_phone=&#8221;35&#8243; margin_bottom=&#8221;0&#8243; font_family=&#8221;Josefin+Sans&#8221; font_type=&#8221;google&#8221; align=&#8221;center&#8221;]DevSecOps[\/mk_fancy_title][\/vc_column][\/mk_page_section][mk_page_section sidebar=&#8221;sidebar-1&#8243;][vc_column width=&#8221;2\/3&#8243;][mk_padding_divider][mk_fancy_title color=&#8221;#ff5000&#8243; size=&#8221;30&#8243; force_font_size=&#8221;true&#8221; size_smallscreen=&#8221;20&#8243; size_tablet=&#8221;20&#8243; size_phone=&#8221;20&#8243; font_weight=&#8221;400&#8243; txt_transform=&#8221;uppercase&#8221; font_family=&#8221;Josefin+Sans&#8221; font_type=&#8221;google&#8221;]Security[\/mk_fancy_title][vc_column_text css=&#8221;.vc_custom_1540827492955{margin-bottom: 0px !important;}&#8221;]Software security is no longer optional. Headlines have put pressure on businesses to strike threats with iron fists. Hackers on [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"content-type":"","footnotes":""},"class_list":["post-1503","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>DevSecOps - Technology Consulting - DevOn<\/title>\n<meta name=\"description\" content=\"DevSecOps | Secure Software Development is no longer optional. But how can you make sure that you&#039;re able to develop at the speed of innovation, while staying secure?\" \/>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"DevSecOps - Technology Consulting - DevOn\" \/>\n<meta property=\"og:description\" content=\"DevSecOps | Secure Software Development is no longer optional. But how can you make sure that you&#039;re able to develop at the speed of innovation, while staying secure?\" \/>\n<meta property=\"og:url\" content=\"https:\/\/old.devon.nl\/en\/devsecops\/\" \/>\n<meta property=\"og:site_name\" content=\"DevOn\" \/>\n<meta property=\"article:modified_time\" content=\"2025-07-31T12:05:24+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/old.devon.nl\/en\/devsecops\/\",\"url\":\"https:\/\/old.devon.nl\/en\/devsecops\/\",\"name\":\"DevSecOps - Technology Consulting - DevOn\",\"isPartOf\":{\"@id\":\"https:\/\/old.devon.nl\/#website\"},\"datePublished\":\"2016-11-15T12:37:02+00:00\",\"dateModified\":\"2025-07-31T12:05:24+00:00\",\"description\":\"DevSecOps | Secure Software Development is no longer optional. But how can you make sure that you're able to develop at the speed of innovation, while staying secure?\",\"breadcrumb\":{\"@id\":\"https:\/\/old.devon.nl\/en\/devsecops\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/old.devon.nl\/en\/devsecops\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/old.devon.nl\/en\/devsecops\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/old.devon.nl\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"DevSecOps\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/old.devon.nl\/#website\",\"url\":\"https:\/\/old.devon.nl\/\",\"name\":\"DevOn\",\"description\":\"Transforming organizations to disruptive digital enterprises.\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/old.devon.nl\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"DevSecOps - Technology Consulting - DevOn","description":"DevSecOps | Secure Software Development is no longer optional. But how can you make sure that you're able to develop at the speed of innovation, while staying secure?","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"DevSecOps - Technology Consulting - DevOn","og_description":"DevSecOps | Secure Software Development is no longer optional. But how can you make sure that you're able to develop at the speed of innovation, while staying secure?","og_url":"https:\/\/old.devon.nl\/en\/devsecops\/","og_site_name":"DevOn","article_modified_time":"2025-07-31T12:05:24+00:00","twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/old.devon.nl\/en\/devsecops\/","url":"https:\/\/old.devon.nl\/en\/devsecops\/","name":"DevSecOps - Technology Consulting - DevOn","isPartOf":{"@id":"https:\/\/old.devon.nl\/#website"},"datePublished":"2016-11-15T12:37:02+00:00","dateModified":"2025-07-31T12:05:24+00:00","description":"DevSecOps | Secure Software Development is no longer optional. But how can you make sure that you're able to develop at the speed of innovation, while staying secure?","breadcrumb":{"@id":"https:\/\/old.devon.nl\/en\/devsecops\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/old.devon.nl\/en\/devsecops\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/old.devon.nl\/en\/devsecops\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/old.devon.nl\/en\/"},{"@type":"ListItem","position":2,"name":"DevSecOps"}]},{"@type":"WebSite","@id":"https:\/\/old.devon.nl\/#website","url":"https:\/\/old.devon.nl\/","name":"DevOn","description":"Transforming organizations to disruptive digital enterprises.","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/old.devon.nl\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/old.devon.nl\/en\/wp-json\/wp\/v2\/pages\/1503","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/old.devon.nl\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/old.devon.nl\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/old.devon.nl\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/old.devon.nl\/en\/wp-json\/wp\/v2\/comments?post=1503"}],"version-history":[{"count":8,"href":"https:\/\/old.devon.nl\/en\/wp-json\/wp\/v2\/pages\/1503\/revisions"}],"predecessor-version":[{"id":27173,"href":"https:\/\/old.devon.nl\/en\/wp-json\/wp\/v2\/pages\/1503\/revisions\/27173"}],"wp:attachment":[{"href":"https:\/\/old.devon.nl\/en\/wp-json\/wp\/v2\/media?parent=1503"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}