{"id":1505,"date":"2017-05-02T17:16:37","date_gmt":"2017-05-02T15:16:37","guid":{"rendered":"https:\/\/www.devon.nl\/?page_id=1505"},"modified":"2023-10-13T16:13:12","modified_gmt":"2023-10-13T14:13:12","slug":"secure-software-assessment","status":"publish","type":"page","link":"https:\/\/old.devon.nl\/en\/secure-software-assessment\/","title":{"rendered":"Secure Software Assessment"},"content":{"rendered":"<div class=\"wpb-content-wrapper\">[mk_page_section bg_image=&#8221;https:\/\/www.prowareness.nl\/wp-content\/uploads\/2016\/04\/shutterstock_349541210-oranje.jpg&#8221; bg_position=&#8221;center center&#8221; bg_repeat=&#8221;no-repeat&#8221; video_color_mask=&#8221;#498fab&#8221; min_height=&#8221;250&#8243; js_vertical_centered=&#8221;true&#8221; padding_top=&#8221;0&#8243; padding_bottom=&#8221;0&#8243; top_shape_color=&#8221;#ffffff&#8221; bottom_shape_color=&#8221;#ffffff&#8221; sidebar=&#8221;sidebar-1&#8243;][vc_column][mk_fancy_title tag_name=&#8221;h1&#8243; color=&#8221;#ffffff&#8221; size=&#8221;50&#8243; force_font_size=&#8221;true&#8221; size_smallscreen=&#8221;45&#8243; size_tablet=&#8221;45&#8243; size_phone=&#8221;45&#8243; margin_bottom=&#8221;0&#8243; font_family=&#8221;Josefin+Sans&#8221; font_type=&#8221;google&#8221; align=&#8221;center&#8221;]Continuous Security Assessment[\/mk_fancy_title][\/vc_column][\/mk_page_section][mk_page_section sidebar=&#8221;sidebar-1&#8243;][vc_column width=&#8221;2\/3&#8243;][mk_padding_divider size=&#8221;25&#8243;][mk_icon_box icon=&#8221;mk-li-pencil&#8221; title=&#8221;HOW IT WORKS&#8221; text_size=&#8221;20&#8243; style=&#8221;simple_ultimate&#8221; icon_size=&#8221;large&#8221; icon_color=&#8221;&#8221; title_color=&#8221;#ff5000&#8243;]This mini-assessment gives you direct insight in the current state of your Secure Software Development and provides you with suggestions to improve the security of your software development. The full assessment consists of an online survey on all elements of security.<br \/>\nThis mini-assessment is based on our knowledge of and experience towards Secure Software Development and is a sneak preview of what to expect from our services in this domain.<\/p>\n<p>If you like to know more about the Secure Software\u00a0Assessment and\/or our Secure Software approach, please don\u2019t hesitate to contact us.<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>Assessment is available on request. Please <a href=\"https:\/\/old.devon.nl\/en\/contact\/\">contact us\u00a0<\/a>[\/mk_icon_box][mk_padding_divider size=&#8221;25&#8243;][\/vc_column][vc_column width=&#8221;1\/3&#8243;][mk_padding_divider size=&#8221;25&#8243;][mk_icon_box icon=&#8221;mk-li-help&#8221; title=&#8221;NEED HELP?&#8221; text_size=&#8221;20&#8243; style=&#8221;simple_ultimate&#8221; icon_size=&#8221;large&#8221; icon_color=&#8221;&#8221; title_color=&#8221;#ff5000&#8243;]Please contact us via our <strong>live chat<\/strong> or call us by phone:<br \/>\n<strong>+31 (0) 15-241 19 00<\/strong>.<br \/>\nWe are more than happy to help you.[\/mk_icon_box][vc_row_inner][vc_column_inner css=&#8221;.vc_custom_1467390273531{margin-left: 20px !important;}&#8221;][mk_button dimension=&#8221;flat&#8221; corner_style=&#8221;rounded&#8221; icon=&#8221;mk-icon-lightbulb-o&#8221; url=&#8221;https:\/\/old.devon.nl\/en\/about-devon\/&#8221; target=&#8221;_blank&#8221; align=&#8221;center&#8221; margin_bottom=&#8221;0&#8243; margin_right=&#8221;0&#8243; bg_color=&#8221;#777777&#8243; btn_hover_bg=&#8221;#ff5000&#8243; btn_hover_txt_color=&#8221;#ffffff&#8221;]TALK TO OUR SECURE SOFTWARE EXPERTS[\/mk_button][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner css=&#8221;.vc_custom_1467390273531{margin-left: 20px !important;}&#8221;][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/mk_page_section]\n<\/div>","protected":false},"excerpt":{"rendered":"<p>[mk_page_section bg_image=&#8221;https:\/\/www.prowareness.nl\/wp-content\/uploads\/2016\/04\/shutterstock_349541210-oranje.jpg&#8221; bg_position=&#8221;center center&#8221; bg_repeat=&#8221;no-repeat&#8221; video_color_mask=&#8221;#498fab&#8221; min_height=&#8221;250&#8243; js_vertical_centered=&#8221;true&#8221; padding_top=&#8221;0&#8243; padding_bottom=&#8221;0&#8243; top_shape_color=&#8221;#ffffff&#8221; bottom_shape_color=&#8221;#ffffff&#8221; sidebar=&#8221;sidebar-1&#8243;][vc_column][mk_fancy_title tag_name=&#8221;h1&#8243; color=&#8221;#ffffff&#8221; size=&#8221;50&#8243; force_font_size=&#8221;true&#8221; size_smallscreen=&#8221;45&#8243; size_tablet=&#8221;45&#8243; size_phone=&#8221;45&#8243; margin_bottom=&#8221;0&#8243; font_family=&#8221;Josefin+Sans&#8221; font_type=&#8221;google&#8221; align=&#8221;center&#8221;]Continuous Security Assessment[\/mk_fancy_title][\/vc_column][\/mk_page_section][mk_page_section sidebar=&#8221;sidebar-1&#8243;][vc_column width=&#8221;2\/3&#8243;][mk_padding_divider size=&#8221;25&#8243;][mk_icon_box icon=&#8221;mk-li-pencil&#8221; title=&#8221;HOW IT WORKS&#8221; text_size=&#8221;20&#8243; style=&#8221;simple_ultimate&#8221; icon_size=&#8221;large&#8221; icon_color=&#8221;&#8221; title_color=&#8221;#ff5000&#8243;]This mini-assessment gives you direct insight in the current state of your Secure Software Development and provides you [&hellip;]<\/p>\n","protected":false},"author":9,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"content-type":"","footnotes":""},"class_list":["post-1505","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Secure Software Assessment - DevOn<\/title>\n<meta name=\"description\" content=\"The Secure Software assessment gives you direct insight in the current state of your Security and provides you with suggestions to improve.\" \/>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Secure Software Assessment - DevOn\" \/>\n<meta property=\"og:description\" content=\"The Secure Software assessment gives you direct insight in the current state of your Security and provides you with suggestions to improve.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/old.devon.nl\/en\/secure-software-assessment\/\" \/>\n<meta property=\"og:site_name\" content=\"DevOn\" \/>\n<meta property=\"article:modified_time\" content=\"2023-10-13T14:13:12+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/old.devon.nl\/en\/secure-software-assessment\/\",\"url\":\"https:\/\/old.devon.nl\/en\/secure-software-assessment\/\",\"name\":\"Secure Software Assessment - DevOn\",\"isPartOf\":{\"@id\":\"https:\/\/old.devon.nl\/#website\"},\"datePublished\":\"2017-05-02T15:16:37+00:00\",\"dateModified\":\"2023-10-13T14:13:12+00:00\",\"description\":\"The Secure Software assessment gives you direct insight in the current state of your Security and provides you with suggestions to improve.\",\"breadcrumb\":{\"@id\":\"https:\/\/old.devon.nl\/en\/secure-software-assessment\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/old.devon.nl\/en\/secure-software-assessment\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/old.devon.nl\/en\/secure-software-assessment\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/old.devon.nl\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Secure Software Assessment\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/old.devon.nl\/#website\",\"url\":\"https:\/\/old.devon.nl\/\",\"name\":\"DevOn\",\"description\":\"Transforming organizations to disruptive digital enterprises.\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/old.devon.nl\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Secure Software Assessment - DevOn","description":"The Secure Software assessment gives you direct insight in the current state of your Security and provides you with suggestions to improve.","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"Secure Software Assessment - DevOn","og_description":"The Secure Software assessment gives you direct insight in the current state of your Security and provides you with suggestions to improve.","og_url":"https:\/\/old.devon.nl\/en\/secure-software-assessment\/","og_site_name":"DevOn","article_modified_time":"2023-10-13T14:13:12+00:00","twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/old.devon.nl\/en\/secure-software-assessment\/","url":"https:\/\/old.devon.nl\/en\/secure-software-assessment\/","name":"Secure Software Assessment - DevOn","isPartOf":{"@id":"https:\/\/old.devon.nl\/#website"},"datePublished":"2017-05-02T15:16:37+00:00","dateModified":"2023-10-13T14:13:12+00:00","description":"The Secure Software assessment gives you direct insight in the current state of your Security and provides you with suggestions to improve.","breadcrumb":{"@id":"https:\/\/old.devon.nl\/en\/secure-software-assessment\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/old.devon.nl\/en\/secure-software-assessment\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/old.devon.nl\/en\/secure-software-assessment\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/old.devon.nl\/en\/"},{"@type":"ListItem","position":2,"name":"Secure Software Assessment"}]},{"@type":"WebSite","@id":"https:\/\/old.devon.nl\/#website","url":"https:\/\/old.devon.nl\/","name":"DevOn","description":"Transforming organizations to disruptive digital enterprises.","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/old.devon.nl\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/old.devon.nl\/en\/wp-json\/wp\/v2\/pages\/1505","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/old.devon.nl\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/old.devon.nl\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/old.devon.nl\/en\/wp-json\/wp\/v2\/users\/9"}],"replies":[{"embeddable":true,"href":"https:\/\/old.devon.nl\/en\/wp-json\/wp\/v2\/comments?post=1505"}],"version-history":[{"count":5,"href":"https:\/\/old.devon.nl\/en\/wp-json\/wp\/v2\/pages\/1505\/revisions"}],"predecessor-version":[{"id":23217,"href":"https:\/\/old.devon.nl\/en\/wp-json\/wp\/v2\/pages\/1505\/revisions\/23217"}],"wp:attachment":[{"href":"https:\/\/old.devon.nl\/en\/wp-json\/wp\/v2\/media?parent=1505"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}