Creating Competitive Advantage: The role for ALM in the PLM world
|
|
|
- Melvyn Harrell
- 10 years ago
- Views:
Transcription
1 Creating Competitive Advantage: The role for ALM in the PLM world Michael Azoff Principal Analyst, Ovum Version 9 Oct, Copyright Ovum. All rights reserved. Ovum is a subsidiary of Informa plc.
2 Agenda This presentation in one slide: 1. Engineered product complexity is increasing. 2. ALM experience and tools exist. 3. The trend is for ALM and PLM systems to combine. 4. Engineered products with huge software content are shipping now. 5. The safety-critical standards are catching up. 6. Industry is beginning to exploit 2) and 3) and there is a lag between 4) and 5). 7. Internet of Things security issues want to spoil the party. 8. It is time to re-think how we approach the challenges to reap benefits. 2
3 Embedded software in engineered products Engineers now have choice to design same functionality mechanically, electronically or in software. Today software is the value add in engineered products. 3
4 Complexity growth of embedded systems Source: Christof Ebert & Capers Jones, IEEE Computer 4
5 Size of codebases are increasing Source: informationisbeautiful.net 5
6 Systems of systems Source: Inchron 6
7 ALM and PLM 7
8 Product Lifecycle Management 8
9 Product change requests across the lifecycle Product lifecycle 9
10 Embedded software risk 10
11 ALM maturity in a PLM world 11
12 Software lifecycle management A mature practice in enterprise IT, relatively new concept in PLM world. 12
13 Engineered product verification testing Product Lifecycle management / QA Interface Finished product interface testing: Is it safe? Is it secure? Does what its meant to? Tester Model in the loop Software in the loop Hardware in the loop Testing in design development: Take testing upstream Improve quality Improve testing and QA process 13
14 Agile testing and QA: automation: continuous testing 2. Triggers continuous integration and testing server Source codebase server Build server 1. Commit code changes 3. Testing feedback report Software engineering team 14
15 Business benefits of ALM-PLM integration Visibility across all assets: Improve search and locate information. Accurately link firmware with hardware: Avoid errors, avoid damage costs, avoid reputation risk. Traceability of assets for engineers in all lifecycle phases: Reduce time wasted. Enable effective collaboration across globally distributed units. Support maintenance, repair, & operations (MRO): Quickly locate parts and manage defect fixes. Reduce inoperative time of broken products. 15
16 Future for ALM and PLM ALM name will appear differently across vendor solutions will add to confusion for users. We see ALM as an essential toolset to adopt in increasingly embedded software led PLM world: Industry has no choice! Manage the complexity or be drowned by it. Software development complexity is a new experience for many in engineered product world. ALM system adoption is a decision for management. PLM vendors are moving towards ALM in different ways, this is one of the most active areas in the PLM solution space right now. ALM-PLM integration is necessary integration standards can reduce costs for end users. 16
17 Different stakeholders in ALM adoption Executive management Product management Software and systems engineers IT department It matters who has the budget and final say on ALM product choice 17
18 Safety, standards, and security 18
19 Many standards for safety-critical compliance: Avionics Aircraft certification Standard Release date Aircraft Systems SAE ARP4754A 01 Dec 2010 Airborne Software RTCA DO-178C 13 Dec 2011 Airborne Electronic Hardware RTCA DO Apr 2000 CNS/ATM Software RTCA DO-278A 13 Dec 2011 Software Tool Qualification RTCA DO Dec 2011 Model-Based Development and Verification Supplement RTCA DO Dec 2011 Object-Oriented Technology Supplement RTCA DO Dec 2011 Formal Methods Supplement RTCA DO Dec 2011 Guidelines for Development of Civil Aircraft and Systems SAE ARP4754A 21 Dec
20 Many standards for safety-critical compliance: medical Medical devices certification Standard Release date FDA: Quality system regulation 21CFR April 2008 FDA: Guidance for the Content of Premarket Submissions for Software Contained in Medical Devices FDA: General Principles of Software Validation, Final Guidance for Industry and FDA Staff Quality management systems Requirements for regulatory purposes Medical device software life cycle processes Application of Risk Management to Medical Devices May Jan 2002 ISO EN ISO Council Directive MDD 93/42/EEC 5 Sep
21 Safety-critical standards, continued Automotive ISO Motor Industry Software Reliability Association (MISRA) Industrial control IEC Railways EN Nuclear power IEC
22 ALM plays crucial role to enable traceability For example, Airborne Software DO-178C on software development traceability: Trace Data, showing the bi-directional association between system requirements allocated to software and high-level requirements is developed. Trace Data, showing the bi-directional association between the highlevel requirements and low-level requirements is developed. Trace Data, showing the bi-directional association between the lowlevel requirements and the source code is developed. 22
23 Software in standards Each industry is addressing same issues of lifecycle management and governing software quality. The relevant standards are distributed across many documents and difficult to get a single view. There is a lag between what the standards bodies are issuing and the practice in the field: Compliance standards are not forward looking they are backward looking. 23
24 Assessing risks by looking backwards 24
25 25
26 What can be done about software security in products Code in machine language. Move security into hardware: Move algorithms onto chips. Intel is building hooks at chip level for security purposes (acquired McAfee) Create separation layer and one way traffic between safety critical and rest of system, eg infotainment system. Security thinking: A lot of knowledge exists but is implemented because of cost. 26
27 Software Security Development Lifecycle (SSDL) Training Design Implement Test Release Response Comprehensive security development initiative A strategic approach to improve quality and security understanding from the beginning to the end of a project. Goal is to keep improving security through applying a security process (not by chance), the SSDL. Focus on building-in security functions, as well as security hygiene: Functions: authentication, authorization, encryption, input validation. Hygiene: prevent top 10 OWASP defects. 27
28 Secure connected products Build software using SSDL. Secure by default. Input validation. Multi-factor authentication. Reduced attack surface. Prevent known exploits. 28
29 Software safety standards Creating high quality software is difficult. Ensuring safety-critical standards are met will get more and more difficult as codebases keep increasing. Internet of Things will create opportunities but also security risks: Connecting products that can cause harm makes malware life threatening. 29
30 Industry safety-critical standards are siloed DO 178C ISO IEC
31 But software is software Propose for industries to adopt joint common software standard and guidelines... DO 178C ISO IEC
32 Benefits of a unified approach to embedded software safety-critical standards Tackle the most serious issue: No existing embedded software security standards. Shared experiences and rapid distribution of good practices. Unified practices can promote better tool support the ALM vendors will move faster to support the standards. Promote software and hardware re-use as standards in ECUs are also promoted. Can benefit from software security activity in enterprise IT: E.g. ISO/IEC 15408: Common Criteria for Information Technology Security Evaluation (Common Criteria or CC) international standard for computer security certification. 32
33 Inhibitors Core competencies are commercial confidential. Tool vendors give way to open standards slowly. Engineering companies are protective of their markets. 33
34 Software standards exist that can form a starting point for embedded software Aspects of software lifecycle management such as ALM tool traceability are being required for safety-critical certifications. There is more that can be adopted, e.g. automation of traceability and visibility across all aspects of development, and across ALM and PLM. Ensuring high quality software, guidelines and rules for common software defects exist: Open Web Application Security Project (OWASP) is an online community dedicated to web application security. Mitre Corporation (US federal not-for-profit) maintains Common Weakness Enumeration (CWE, lists of most dangerous software errors. Object Management Group (OMG) has issued first version of Consortium for IT Software Quality (CISQ) standards: There exists an ISO standard aimed at software industry: ISO/IEC 12207:2008 (reviewed and confirmed in 2013): systems and software engineering, software life cycle processes. 34
35 What can we do next Industries will gain the benefits of software in engineered products if they co-operate in building safe and secure software. Software security is the biggest threat to the software innovation we seek and the Internet of Things we want to build therefore addressing this issue must be the driver. The large engineering companies (from manufacturing to tools vendors) have leadership role opportunities to make a common cause possible. 35
36 36
37 Disclaimer All Rights Reserved. No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form by any means, electronic, mechanical, photocopying, recording or otherwise, without the prior permission of the publisher, Ovum (an Informa business). The facts of this report are believed to be correct at the time of publication but cannot be guaranteed. Please note that the findings, conclusions and recommendations that Ovum delivers will be based on information gathered in good faith from both primary and secondary sources, whose accuracy we are not always in a position to guarantee. As such Ovum can accept no liability whatever for actions taken based on any information that may subsequently prove to be incorrect. 37
PLM and ALM Getting Together
PLM and ALM Getting Together Pascal Vera Siemens PLM Stefano Rizzo Polarion Software 1 Presenter Background Pascal Vera Siemens PLM Teamcenter Product Management Leading Systems Engineering and Mechatronics
SWOT Assessment: FireMon Security Manager Suite v7.0
SWOT Assessment: FireMon Security Manager Suite v7.0 Analyzing the strengths, weaknesses, opportunities, and threats Reference Code: IT017-004174 Publication Date: 12 Aug 2013 Author: Andrew Kellett SUMMARY
SAFE SOFTWARE FOR SPACE APPLICATIONS: BUILDING ON THE DO-178 EXPERIENCE. Cheryl A. Dorsey Digital Flight / Solutions cadorsey@df-solutions.
SAFE SOFTWARE FOR SPACE APPLICATIONS: BUILDING ON THE DO-178 EXPERIENCE Cheryl A. Dorsey Digital Flight / Solutions [email protected] DIGITAL FLIGHT / SOLUTIONS Presentation Outline DO-178 Overview
WHITE PAPER. Written by: Michael Azoff. Published Mar, 2015, Ovum
Unlocking systems of record with Web and mobile front-ends CA App Services Orchestrator for creating contemporary APIs Written by: Michael Azoff Published Mar, 2015, Ovum CA App Services Orchestrator WWW.OVUM.COM
The Impact of RTCA DO-178C on Software Development
Cognizant 20-20 Insights The Impact of RTCA DO-178C on Software Development By following DO-178C, organizations can implement aeronautical software with clear and consistent ties to existing systems and
F-22 Raptor. Agenda. 1. Motivation
Model-Based Software Development and Automated Code Generation for Safety-Critical Systems F-22 Raptor for the Seminar Advanced Topics in Software Engineering for Safety-Critical Systems Cause: Bug in
CYBERSECURITY TESTING & CERTIFICATION SERVICE TERMS
CYBERSECURITY TESTING & CERTIFICATION SERVICE TERMS These Cybersecurity Testing and Certification Service Terms ( Service Terms ) shall govern the provision of cybersecurity testing and certification services
Reduce Medical Device Compliance Costs with Best Practices. [email protected]
Reduce Medical Device Compliance Costs with Best Practices [email protected] 1 Agenda Medical Software Certification How new is Critical Software Certification? What do we need to do? What Best Practises
Secunia Vulnerability Intelligence Manager
TECHNOLOGY AUDIT Secunia Vulnerability Intelligence Manager Secunia Reference Code: OI00070-076 Publication Date: July 2011 Author: Andy Kellett SUMMARY Catalyst Secunia Vulnerability Intelligence Manager
Key Benefits of Microsoft Visual Studio Team System
of Microsoft Visual Studio Team System White Paper November 2007 For the latest information, please see www.microsoft.com/vstudio The information contained in this document represents the current view
Software Development for Medical Devices
Software Development for Medical Devices Overcoming the Challenges of Compliance, Quality and Cost Software is fast becoming the differentiator for manufacturers of medical devices. The rewards of software
Software Development for Medical Devices
Overcoming the Challenges of Compliance, Quality and Cost An MKS White Paper Introduction Software is fast becoming the differentiator for manufacturers of medical devices. The rewards available from software
Why enterprise data archiving is critical in a changing landscape
Why enterprise data archiving is critical in a changing landscape Ovum white paper for Informatica SUMMARY Catalyst Ovum view The most successful enterprises manage data as strategic asset. They have complete
On the Radar: NextPlane
On the Radar: NextPlane Unified communications federation delivered via the cloud Reference Code: IT016-001534 Publication Date: 24 Sep 2013 Author: Saurabh Sharma SUMMARY Catalyst NextPlane UC Exchange
SD Elements: A Tool for Secure Application Development Management
SD Elements: A Tool for Secure Application Development Management Golnaz Elahi 1, Tom Aratyn 2, Ramanan Sivaranjan 2, Rohit Sethi 2, and Eric Yu 3 1 Department of Computer Science, University of Toronto,
Ovum Decision Matrix: Selecting an Enterprise Content Management Solution, 2013 14
Ovum Decision Matrix: Selecting an Enterprise Content Management Solution, 2013 14 Publication Date: August 2013 Author: Sue Clarke SUMMARY Catalyst Selecting an enterprise content management (ECM) platform
Systems Engineering: Development of Mechatronics and Software Need to be Integrated Closely
White Paper Systems Engineering: Development of Mechatronics and Software Need to be Integrated Closely Introduction Products from automobiles to mobile phones contain an increasing amount of software
Effective Software Verification for Medical Devices
STERLINGTECH AND KLOCWORK WHITE PAPER NOVEMBER 2009 Effective Software Verification for Medical Devices Achieving compliance and meeting productivity goals with static analysis In addition to producing
FDA Releases Final Cybersecurity Guidance for Medical Devices
FDA Releases Final Cybersecurity Guidance for Medical Devices By Jean Marie R. Pechette and Ken Briggs Overview and General Principles On October 2, 2014, the Food and Drug Administration ( FDA ) finalized
MANAGEMENT SUMMARY INTRODUCTION KEY MESSAGES. Written by: Michael Azoff. Published June 2015, Ovum
App user analytics and performance monitoring for the business, development, and operations teams CA Mobile App Analytics for endto-end visibility CA Mobile App Analytics WWW.OVUM.COM Written by: Michael
Software: Driving Innovation for Engineered Products
Software: Driving Innovation for Engineered Products Software in products holds the key to innovations that improve quality, safety, and ease-of-use, as well as add new functions. Software simply makes
IBM Rational systems and software solutions for the medical device industry
IBM Software August 2011 IBM Rational systems and software solutions for the medical device industry Improve processes, manage IEC 61508 and IEC 62304 standards, develop quality products Highlights Manage
SWOT Assessment: dotcms dotcms v2.5
SWOT Assessment: dotcms dotcms v2.5 Analyzing the strengths, weaknesses, opportunities, and threats Reference Code: IT014-002855 Publication Date: 13 Dec 2013 Author: Sue Clarke SUMMARY Catalyst Traditional
Closed Loop Quality Management: Integrating PLM and Quality Management
Integrating PLM and Quality Management In recent Aberdeen research of over 500 manufacturers it was shown that 100% of Best-in-Class manufacturers having both a Quality Management solution and Product
Enabling Continuous Delivery by Leveraging the Deployment Pipeline
Enabling Continuous Delivery by Leveraging the Deployment Pipeline Jason Carter Principal (972) 689-6402 [email protected] Pariveda Solutions, Inc. Dallas,TX Table of Contents Matching
Demand & Requirements Management Software Development QA & Test Management IT Operations & DevOps Change Management Agile, SAFe, Waterfall Support
Demand & Requirements Management Software Development QA & Test Management IT Operations & DevOps Change Management Agile, SAFe, Waterfall Support Workflows with Business Process Management capabilities
Application Security in the Software Development Lifecycle
Application Security in the Software Development Lifecycle Issues, Challenges and Solutions www.quotium.com 1/15 Table of Contents EXECUTIVE SUMMARY... 3 INTRODUCTION... 4 IMPACT OF SECURITY BREACHES TO
When COTS is not SOUP Commercial Off-the-Shelf Software in Medical Systems. Chris Hobbs, Senior Developer, Safe Systems
When COTS is not SOUP Commercial Off-the-Shelf Software in Medical Systems Chris Hobbs, Senior Developer, Safe Systems 2 Audience and Assumptions Who will benefit from this presentation? Software designers
Software: Driving Innovation for Engineered Products. Page
Software: Driving Innovation for Engineered Products Software in products holds the key to innovations that improve quality, safety, and ease-of-use, as well as add new functions. Software simply makes
Reducing Application Vulnerabilities by Security Engineering
Reducing Application Vulnerabilities by Security Engineering - Subash Newton Manager Projects (Non Functional Testing, PT CoE Group) 2008, Cognizant Technology Solutions. All Rights Reserved. The information
Secunia Corporate Software Inspector (Secunia CSI) ver.5.0
TECHNOLOGY AUDIT Secunia Corporate Software Inspector (Secunia CSI) ver.5.0 Secunia Reference Code: OI00070-107 Publication Date: December 2011 Author: Andy Kellett SUMMARY Catalyst Organizations need
PASTA Abstract. Process for Attack S imulation & Threat Assessment Abstract. VerSprite, LLC Copyright 2013
2013 PASTA Abstract Process for Attack S imulation & Threat Assessment Abstract VerSprite, LLC Copyright 2013 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
ImageWare Systems, Inc.
ImageWare Systems, Inc. Delivering next-generation biometrics as an interactive and scalable cloud-based service SUMMARY Catalyst ImageWare Systems, Inc. (IWS) is a developer of leading-edge, identity-based,
ISO 27001: Information Security and the Road to Certification
ISO 27001: Information Security and the Road to Certification White paper Abstract An information security management system (ISMS) is an essential part of an organization s defense against cyberattacks
Secure Content Automation Protocol (SCAP): How it is increasingly used to automate enterprise security management activities
Secure Content Automation Protocol (SCAP): How it is increasingly used to automate enterprise security management activities Sean Barnum [email protected] September 2011 Overview What is SCAP? Why SCAP?
Introduction into IEC 62304 Software life cycle for medical devices
Introduction into IEC 62304 Software life cycle for medical devices Christoph Gerber 4. September 2008 SPIQ 9/5/2008 1 Agenda Current Picture Regulatory requirements for medical device software IEC 62304
SWOT Assessment: Eccentex AppBase v5.0
SWOT Assessment: Eccentex AppBase v5.0 Analyzing the strengths, weaknesses, opportunities, and threats Reference Code: IT014-002764 Publication Date: 29 Jul 2013 Author: Sue Clarke SUMMARY Catalyst Eccentex
Life Sciences Product Development Artifacts Survey Results
Life Sciences Product Development Artifacts Survey Results White Paper About the Survey Seapine Software conducted this survey over a six-week period during the first quarter of 2011. A total of 150 respondents
Agile and Secure: Can We Be Both?
Agile and Secure: Can We Be Both? OWASP AppSec Seattle Oct 2006 Keith Landrus Director of Technology Denim Group Ltd. [email protected] (210) 572-4400 Copyright 2006 - The OWASP Foundation Permission
Five steps to improving the customer service experience
Five steps to improving the customer service experience Metrics, tips, and tools for utilizing customer feedback An Ovum White Paper Sponsored by Publication Date: January 2012 INTRODUCTION As the use
Case Study: Unifying ITSM Practices and Technology
Case Study: Unifying ITSM Practices and Technology SBM Offshore Reference Code: EI025-000007 Publication Date: 17 Jun 2014 Author: Adam Holtby SUMMARY Catalyst As a result of corporate expansions, mergers,
On the Radar: Be Informed
ON THE RADAR On the Radar: Be Informed Business Process Platform Reference Code: OI00190-018 Publication Date: April 2012 Author: Joe Dignan SUMMARY Catalyst The Holy Grail for public sector IT is a single
Rally Integration with BMC Remedy through Kovair Omnibus Kovair Software, Inc.
Rally Integration with BMC Remedy through Kovair Omnibus Kovair Software, Inc. 2410 Camino Ramon, STE 230, San Ramon, CA 94583 www.kovair.com [email protected] Document Version History Release Date Reason
DO-178B compliance: turn an overhead expense into a competitive advantage
IBM Software Rational Aerospace and Defense DO-178B compliance: turn an overhead expense into a competitive advantage 2 DO-178B compliance: turn an overhead expense into a competitive advantage Contents
Medical Device Software Standards for Safety and Regulatory Compliance
Medical Device Software Standards for Safety and Regulatory Compliance Sherman Eagles +1 612-865-0107 [email protected] www.softwarecpr.com Assuring safe software SAFE All hazards have been addressed
Orchestrated. Release Management. Gain insight and control, eliminate ineffective handoffs, and automate application deployments
Orchestrated Release Management Gain insight and control, eliminate ineffective handoffs, and automate application deployments Solution Brief Challenges Release management processes have been characterized
Improving Web Application Security by Eliminating CWEs Weijie Chen, China INFSY 6891 Software Assurance Professor Dr. Maurice Dawson 15 December 2015
Improving Web Application Security by Eliminating CWEs Weijie Chen, China INFSY 6891 Software Assurance Professor Dr. Maurice Dawson 15 December 2015 1 P a g e ABSTRACT This study examined improving web
Demand & Requirements Management Software Development QA & Test Management IT Operations & DevOps Change Management Agile, SAFe, Waterfall Support
Demand & Requirements Management Software Development QA & Test Management IT Operations & DevOps Change Management Agile, SAFe, Waterfall Support Overview codebeamer is a single-repository Application
Development of AUTOSAR Software Components within Model-Based Design
2008-01-0383 Development of AUTOSAR Software Components within Model-Based Design Copyright 2008 The MathWorks, Inc. Guido Sandmann Automotive Marketing Manager, EMEA The MathWorks Richard Thompson Senior
Building Resilient Systems: The Secure Software Development Lifecycle
Building Resilient Systems: The Secure Software Development Lifecycle Software Engineering Institute Carnegie Mellon University Pittsburgh, PA 15213, PhD Technical Director, CERT [email protected]
Parameters for Efficient Software Certification
Parameters for Efficient Software Certification Roland Wolfig, [email protected] Vienna University of Technology, Real-Time Systems Group 1 Abstract Software certification is a common approach
CDRH Regulated Software
CDRH Regulated Software An Introduction John F. Murray Jr. CDRH Software Compliance Expert CDRH Regulates Software in the following areas Medical Devices Automation of Production Systems Automation of
Agile and Secure: OWASP AppSec Seattle Oct 2006. The OWASP Foundation http://www.owasp.org/
Agile and Secure: Can We Be Both? OWASP AppSec Seattle Oct 2006 Dan Cornell, OWASP San Antonio Leader Principal, Denim Group Ltd. [email protected] (210) 572-4400 Copyright 2006 - The OWASP Foundation
SWOT Assessment: CoreMedia, CoreMedia 7
SWOT Assessment: CoreMedia, CoreMedia 7 Analyzing the strengths, weaknesses, opportunities, and threats Reference Code: IT014-002848 Publication Date: 09 Dec 2013 Author: Sue Clarke SUMMARY Catalyst Web
Technical Data Sheet SCADE R17 Solutions for ARINC 661 Compliant Systems Design Environment for Aircraft Manufacturers, CDS and UA Suppliers
661 Solutions for ARINC 661 Compliant Systems SCADE R17 Solutions for ARINC 661 Compliant Systems Design Environment for Aircraft Manufacturers, CDS and UA Suppliers SCADE Solutions for ARINC 661 Compliant
Driving Your Business Forward with Application Life-cycle Management (ALM)
Driving Your Business Forward with Application Life-cycle Management (ALM) Published: August 2007 Executive Summary Business and technology executives, including CTOs, CIOs, and IT managers, are being
Differentiate your business with a cloud contact center
Differentiate your business with a cloud contact center A guide to selecting a partner that will enhance the customer experience An Ovum White Paper Sponsored by Cisco Systems, Inc. Publication Date: September
Role of the systems engineer in safety critical systems. Dr. Cecilia Haskins, CSEP Keynote address WOCS 27. September 2012
Role of the systems engineer in safety critical systems Dr. Cecilia Haskins, CSEP Keynote address WOCS 27. September 2012 Roadmap About safety critical systems Relevant standards, including ISO/IEC 15288:
Using CMM with DO-178B/ED-12B for Airborne System Development
Using CMM with DO-178B/ED-12B for Airborne System Development WHITE PAPER Author : Narasimha Swamy (Project Manager, Avionics Practice) Most aircraft companies develop onboard systems software for civilian
Pentests more than just using the proper tools
Pentests more than just using the proper tools Agenda 1. Information Security @ TÜV Rheinland 2. Security testing 3. Penetration testing Introduction Evaluation scheme Security Analyses of web applications
Testing of safety-critical software some principles
1(60) Testing of safety-critical software some principles Emerging Trends in Software Testing: autumn 2012 Matti Vuori, Tampere University of Technology 27.11.2012 Contents 1/4 Topics of this lecture 6
Seven Practical Steps to Delivering More Secure Software. January 2011
Seven Practical Steps to Delivering More Secure Software January 2011 Table of Contents Actions You Can Take Today 3 Delivering More Secure Code: The Seven Steps 4 Step 1: Quick Evaluation and Plan 5 Step
Anatomy of an Enterprise Software Delivery Project
Chapter 2 Anatomy of an Enterprise Software Delivery Project Chapter Summary I present an example of a typical enterprise software delivery project. I examine its key characteristics and analyze specific
Redhawk Network Security, LLC 62958 Layton Ave., Suite One, Bend, OR 97701 [email protected] 866-605- 6328 www.redhawksecurity.
Planning Guide for Penetration Testing John Pelley, CISSP, ISSAP, MBCI Long seen as a Payment Card Industry (PCI) best practice, penetration testing has become a requirement for PCI 3.1 effective July
ORACLE AGILE PLM FOR THE MEDICAL DEVICE INDUSTRY
ORACLE AGILE PLM FOR THE MEDICAL DEVICE INDUSTRY Enterprise PLM is a strategic approach to managing the lifecycle of a product throughout its full value chain: from initial requirements gathering through
How To Improve Your Software
Driving Quality, Security and Compliance in Third- Party Code Dave Gruber Director of Product Marketing, Black Duck Keri Sprinkle Sr Product Marketing Manager, Coverity Jon Jarboe Sr Technical Marketing
Testing the Internet of Things
Presentation to TMF Testing the Internet of Things Test and Verification Solutions Delivering Tailored Solutions for Hardware Verification and Software Testing What is the IoT? Wikipedia The Internet of
Improving Embedded Software Test Effectiveness in Automotive Applications
Improving Embedded Software Test Effectiveness in Automotive Applications Author, D Brook Document Number: CODETESTTECHWP Rev. 0 11/2005 As the automotive industry introduces more and more safety-critical,
Revision History Revision Date 3.0 14.02.10. Changes Initial version published to http://www.isasecure.org
SDLA-312 ISA Security Compliance Institute Security Development Lifecycle Assurance - Security Development Lifecycle Assessment v3.0 Lifecycle Phases Number Phase Name Description PH1 Security Management
Information Security Managing The Risk
Information Technology Capability Maturity Model Information Security Managing The Risk Introduction Information Security continues to be business critical and is increasingly complex to manage for the
Best practices for developing DO-178 compliant software using Model-Based Design
Best practices for developing DO-178 compliant software using Model-Based Design Raymond G. Estrada, Jr. 1 The MathWorks, Torrance, CA Eric Dillaber. 2 The MathWorks, Natick, MA Gen Sasaki 3 The MathWorks,
Development of a Process Assessment Model for Medical Device Software Development
Development of a Process Assessment Model for Medical Device Software Development Marion Lepmets, Paul Clarke, Fergal McCaffery, Anita Finnegan, Alec Dorling Regulated Software Research Centre, Dundalk
RTP s NUCLEAR QUALITY ASSURANCE PROGRAM
RTP s NUCLEAR QUALITY ASSURANCE PROGRAM RTP operates under one quality program, whether you purchase products that are commercial grade, nuclear safety-related or industrial safety compliant (IEC 61508).
The Tester's Role in Continuous Integration
W8 Track 10/3/2012 The Tester's Role in Continuous Integration Presented by: Roi Carmel HP Brought to you by: 340 Corporate Way, Suite 300, Orange Park, FL 32073 888-268-8770 904-278-0524 [email protected]
IBM Rational Rhapsody
IBM Rational Rhapsody IBM Rational Rhapsody Kit for DO-178B/C Overview Version 1.8 License Agreement No part of this publication may be reproduced, transmitted, stored in a retrieval system, nor translated
Securing Remote Vendor Access with Privileged Account Security
Securing Remote Vendor Access with Privileged Account Security Table of Contents Introduction to privileged remote third-party access 3 Do you know who your remote vendors are? 3 The risk: unmanaged credentials
Meeting DO-178B Software Verification Guidelines with Coverity Integrity Center
Meeting DO-178B Software Verification Guidelines with Coverity Integrity Center May, 2009 Thomas Schultz Director of Product Strategy, Coverity, Inc. Executive Summary Development organizations that create
unless the manufacturer upgrades the firmware, whereas the effort is repeated.
Software Validation in Accredited Laboratories A Practical Guide Gregory D. Gogates Fasor Inc., 3101 Skippack Pike, Lansdale, Pennsylvania 19446-5864 USA [email protected] www.fasor.com Abstract Software
KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES. www.kaspersky.com
KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES www.kaspersky.com EXPERT SERVICES Expert Services from Kaspersky Lab are exactly that the services of our in-house experts, many of them global
FINRA Publishes its 2015 Report on Cybersecurity Practices
Securities Litigation & Enforcement Client Service Group and Data Privacy & Security Team To: Our Clients and Friends February 12, 2015 FINRA Publishes its 2015 Report on Cybersecurity Practices On February
G- Cloud Specialist Cloud Services. Security and Penetration Testing. Overview
Description C Service Overview G- Cloud Specialist Cloud Services Security and Penetration Testing This document provides a description of TVS s Security and Penetration Testing Service offered under the
Compliance Guide ISO 27002. Compliance Guide. September 2015. Contents. Introduction 1. Detailed Controls Mapping 2.
ISO 27002 Compliance Guide September 2015 Contents Compliance Guide 01 02 03 Introduction 1 Detailed Controls Mapping 2 About Rapid7 7 01 INTRODUCTION If you re looking for a comprehensive, global framework
How To Protect Your Employees From Being Hacked By A Corporate Firewall
The case for supporting mobile users with secure remote access Your employees are mobile and your remote support strategy needs to be too - but manage the security risks of remote access tools. A study
Understanding Enterprise Cloud Governance
Understanding Enterprise Cloud Governance Maintaining control while delivering the agility of cloud computing Most large enterprises have a hybrid or multi-cloud environment comprised of a combination
Pentests more than just using the proper tools
Pentests more than just using the proper tools Agenda 1. Information Security @ TÜV Rheinland 2. Penetration testing Introduction Evaluation scheme Security Analyses of web applications Internal Security
