SlideShare a Scribd company logo
1
FUG2016Copyright © Serena Software 2016
WE OWN IT!
Centralized Secure Vault with
Dimensions CM
Rose M Wellman
Sr Mgr, Solutions Architects
2
FUG2016
What do these number represent?
3
FUG2016
That We Know About
4
FUG2016
Security Breaches Change Over Time
Open the safe!
Amateur!
5
FUG2016
Not Just Banks
6
FUG2016
Breaches by 3rd Party Systems
• The attackers backed their way into Target's corporate
network by compromising a third-party vendor. The
number of vendors targeted is unknown. However, it only took
one. That happened to be Fazio Mechanical, a refrigeration
contractor.
• A phishing email duped at least one Fazio employee,
allowing Citadel, a variant of the Zeus banking trojan, to be
installed on Fazio computers. With Citadel in place, the
attackers waited until the malware offered what they were
looking for -- Fazio Mechanical's login credentials.
• At the time of the breach, all major versions of enterprise anti-
malware detected the Citadel malware. Unsubstantiated
sources mentioned Fazio used the free version of
Malwarebytes anti-malware, which offered no real-time
protection being an on-demand scanner. (Note: Malwarebytes
anti-malware is highly regarded by experts when used in the
correct manner.)
7
FUG2016
Everyone is a Target
8
FUG2016
Ensuring Security in Today’s World
9
FUG2016
Secure SDLC
+
Centralized Secure
Vault
Dimensions CM
10
FUG2016
Secured SDLC
11
FUG2016
Secure SDLC
Source: http://www.aspectsecurity.com/secure-development-programs
12
FUG2016
Requirements
• Establish security requirements/stories
• Define security tests
Development
• Peer code reviews
• Static Analysis
Testing
• Vulnerability testing
• Penetration testing
Release
• Software quality review
• Release readiness review
Secure SDLC
13
FUG2016
Serena Dimensions CM - Integrated Peer Code Review
Develop with velocity - collaboratively, securely and efficiently
Key Capabilities
• Collaborative web based architecture
• Integrates with Agile stories and requests
• Linked to Continuous Inspection
• Strengthens audit trail & governance
• Configurable for Projects & Teams
Value Benefits
• Improved code quality
• Find 70-90% of all defects earlier
• Cost reduction
• Save up to 30% of re-work hours
• Developer productivity
• Up to 25% improvement in coding
Peer Reviews in Software - A Practical Guide by Karl E. Wiegers
14
FUG2016
Serena Dimensions CM – Continuous Inspection Toolchain
Develop with velocity - collaboratively, securely and efficiently
Key Capabilities
• Extensible plug-in architecture
• Schedule & inspect code changes
• Report findings & vulnerabilities
• Aggregated KPI Metrics
• Supports DevOps “Shift-Left”
Value Benefits
• Display results in code review
• Real-time developer feedback
• Reduce coding risks & issues
• Monitor code health & quality
• Speed release readiness
"Given enough eyeballs, all bugs are shallow."
The Cathedral and the Bazar —Eric Raymond
15
FUG2016
• Code Hygiene
• Refers to the “cleanliness” of an application – in particular, minimizing vulnerabilities and
code complexity.
• Good code hygiene requires visibility into all the components used to build the
application.
• Several activities in the software development lifecycle support good code hygiene, including threat
modeling and automated testing (i.e., static and dynamic analysis).
• The shortcoming of each of these activities is that they only provide a point-in-time snapshot of
code hygiene, and can’t account for a changing threat space.
• You have to continuously monitor or continuously apply good hygiene.
• More than 4,000 new vulnerabilities were disclosed by the National Vulnerability Database in open-
source components in 2014 alone. The fact that your open-source code bases are free from
vulnerabilities today doesn’t mean you can ignore them for the next year.
• OWASP Dependency-Check
Open Source
16
FUG2016
Centralized Secure Vault
17
FUG2016
Problem – Repository Sprawl
• DevOps driving option of Git
• Repository Sprawl
• Multiple Source Code Repos
• Individually Managed/Maintained
• Security?
• Reliability?
• Cross-team collaboration?
• Audit trail?
18
FUG2016
No Built-in Security and Authorization
• Read/Write security on all objects
• Group role assignments
• Full audit trail of all objects
19
FUG2016
Git/SVN Goes into the Dimensions CM Secure Vault
Release Control
Dev DevOps Ops
Dimensions CM Deployment Automation
CM
Secure
Vault
ChangeMan ZMF
Deployment pipeline
Deployment pipeline
Deployment pipeline
Deployment pipeline
20
FUG2016
Better Solution – Git Connector
Dimensions CM Vault
Dimensions CM
Deployment Pipeline
Serena Deployment
Automation
Dimensions CM = Git Master Repository
Dimensions CM Pulse
DimensionsCM
GitConnector
21
FUG2016
• The Developers don’t have to
change the tools they are using
• The Business gets the control it
needs
– Single source of truth
– Enterprise Security
– Robust and scalable
• With the additional value of
Dimensions CM
– Continuous Inspection
– Enterprise Change Management
– Control over path to production
– Full audit trail across all components
Dimensions CM Git Connector Benefit
22
FUG2016
Customer Quotes
“
We’re a bank not a startup, and we need to be
using appropriate tools to ensure the integrity
and security of change, not tools that add to a
developers resume. We don’t want to be the next
big headline!
”
Richard landoli
SVP QA
Brown Brothers Harriman
“
The visibility and insight that Dimensions CM 14
provides, allows us to see if we are converging
to quality or diverging from quality in real time.
”
Ken Vane
IT Change & Configuration Manager,
Navy Federal Credit Union

More Related Content

PDF
SBM Orchestrations - Beginners Guide (FUG Presentation)
Serena Software
 
PDF
Leveraging DevOps Principles for Release and Deploy
Serena Software
 
PDF
Automation and Release in Federal
Serena Software
 
PDF
Shift Left with Continuous Inspection
Serena Software
 
PDF
Software Defect Prevention via Continuous Inspection
Josh Gough
 
PDF
Serena Business Manager Visualizing 2016
Serena Software
 
PDF
DevOps CD and Multispeed IT in regulated industries (FUG Presentation)
Serena Software
 
PPTX
Serena DevOps Drive-in: Leading the Agile and DevOps transformation with Gary...
Serena Software
 
SBM Orchestrations - Beginners Guide (FUG Presentation)
Serena Software
 
Leveraging DevOps Principles for Release and Deploy
Serena Software
 
Automation and Release in Federal
Serena Software
 
Shift Left with Continuous Inspection
Serena Software
 
Software Defect Prevention via Continuous Inspection
Josh Gough
 
Serena Business Manager Visualizing 2016
Serena Software
 
DevOps CD and Multispeed IT in regulated industries (FUG Presentation)
Serena Software
 
Serena DevOps Drive-in: Leading the Agile and DevOps transformation with Gary...
Serena Software
 

What's hot (20)

PDF
Dimensions RM: Agile Requirements Management
Serena Software
 
PDF
Dimensions CM 14.3 launch webcast (slides)
Serena Software
 
PDF
Creating High Performance teams by using a DevOps culture (FUG presentation)
Serena Software
 
PDF
FUG Agile software engineering practices
Serena Software
 
PPTX
DevOps Monitoring and Alerting
Khairul Zebua
 
PPTX
Building a Software Chain of Custody: A Guide for CTOs, CIOs, and Enterprise ...
XebiaLabs
 
PPTX
From Chaos to Compliance: The New Digital Governance for DevOps
XebiaLabs
 
PPTX
Build a Bridge Between CI/CD and ITSM w/ Quint Technology
XebiaLabs
 
PPTX
Continuous Integration Testing for SAP
Worksoft
 
PDF
Infrastructure as Code in Large Scale Organizations
XebiaLabs
 
PPTX
Make Software Audit Nightmares a Thing of the Past
XebiaLabs
 
PPTX
Insurance for your Assurance Team
Worksoft
 
PDF
Monitoring at the Speed of DevOps
DevOps.com
 
PPTX
XebiaLabs: DevOps 2020 with Gene Kim
XebiaLabs
 
PPTX
Salesforce – Proven Platform Development with DevOps & Agile
Sai Jithesh ☁️
 
PDF
Deliver More Customer Value with Value Stream Management
XebiaLabs
 
PPTX
Automate Salesforce Releases with DevOps: Crawl, Walk, Run!
Susmitha Vakkalanka
 
PDF
Enterprise DevOps in the Age of Docker & Microservices
XebiaLabs
 
PPTX
Agile-plus-DevOps Testing for Packaged Applications
Worksoft
 
PPTX
Supercharge Your Digital Transformation by Establishing a DevOps Platform
XebiaLabs
 
Dimensions RM: Agile Requirements Management
Serena Software
 
Dimensions CM 14.3 launch webcast (slides)
Serena Software
 
Creating High Performance teams by using a DevOps culture (FUG presentation)
Serena Software
 
FUG Agile software engineering practices
Serena Software
 
DevOps Monitoring and Alerting
Khairul Zebua
 
Building a Software Chain of Custody: A Guide for CTOs, CIOs, and Enterprise ...
XebiaLabs
 
From Chaos to Compliance: The New Digital Governance for DevOps
XebiaLabs
 
Build a Bridge Between CI/CD and ITSM w/ Quint Technology
XebiaLabs
 
Continuous Integration Testing for SAP
Worksoft
 
Infrastructure as Code in Large Scale Organizations
XebiaLabs
 
Make Software Audit Nightmares a Thing of the Past
XebiaLabs
 
Insurance for your Assurance Team
Worksoft
 
Monitoring at the Speed of DevOps
DevOps.com
 
XebiaLabs: DevOps 2020 with Gene Kim
XebiaLabs
 
Salesforce – Proven Platform Development with DevOps & Agile
Sai Jithesh ☁️
 
Deliver More Customer Value with Value Stream Management
XebiaLabs
 
Automate Salesforce Releases with DevOps: Crawl, Walk, Run!
Susmitha Vakkalanka
 
Enterprise DevOps in the Age of Docker & Microservices
XebiaLabs
 
Agile-plus-DevOps Testing for Packaged Applications
Worksoft
 
Supercharge Your Digital Transformation by Establishing a DevOps Platform
XebiaLabs
 
Ad

Viewers also liked (15)

PDF
Edit Privacy Settings Analytics FREE Collect Leads Micro Focus DevOps Drive-i...
Serena Software
 
PPTX
Mainframe VUG Presentation April 2016
Serena Software
 
PDF
FUG Keynote presentation: Vision 2020
Serena Software
 
PDF
Overview and Demonstration of Dimensions CM 14.2 (FUG presentation track 2)
Serena Software
 
PPTX
Micro Focus DevOps Drive-in with Gary Gruver - Starting and Scaling DevOps in...
Serena Software
 
PPTX
What's new in SBM 11.1
Serena Software
 
PPTX
Integrated Requirements Management with Serena Dimensions RM 02-2016
Serena Software
 
PPTX
Sneak Peek into the New ChangeMan ZMF Release
Serena Software
 
PPTX
Metrics-Driven DevOps: Delivering Software Like the Unicorn
Beyond20
 
PPT
Cathedral of Bloom 2011
Ludovico Lavini
 
PDF
img004
Kecia Hardin
 
PDF
Makar Sankranti Celebration – Mocomi Kids
Mocomi Kids
 
PDF
Four bulls and_the_lion
Vijayakumar Reddy
 
DOC
1a. Resume_Bharti_Grover
Bharti Grover
 
PPTX
MLA/DLA 16 Non-Library Conferences Panel Presentaiton -Masie Learning Conference
Jennifer Hopwood
 
Edit Privacy Settings Analytics FREE Collect Leads Micro Focus DevOps Drive-i...
Serena Software
 
Mainframe VUG Presentation April 2016
Serena Software
 
FUG Keynote presentation: Vision 2020
Serena Software
 
Overview and Demonstration of Dimensions CM 14.2 (FUG presentation track 2)
Serena Software
 
Micro Focus DevOps Drive-in with Gary Gruver - Starting and Scaling DevOps in...
Serena Software
 
What's new in SBM 11.1
Serena Software
 
Integrated Requirements Management with Serena Dimensions RM 02-2016
Serena Software
 
Sneak Peek into the New ChangeMan ZMF Release
Serena Software
 
Metrics-Driven DevOps: Delivering Software Like the Unicorn
Beyond20
 
Cathedral of Bloom 2011
Ludovico Lavini
 
img004
Kecia Hardin
 
Makar Sankranti Celebration – Mocomi Kids
Mocomi Kids
 
Four bulls and_the_lion
Vijayakumar Reddy
 
1a. Resume_Bharti_Grover
Bharti Grover
 
MLA/DLA 16 Non-Library Conferences Panel Presentaiton -Masie Learning Conference
Jennifer Hopwood
 
Ad

Similar to Centralized Secure Vault with Dimensions CM (20)

PDF
Open source iam value, benefits, and risks
WSO2
 
PPTX
Verification at scale: Fitting static code analysis into continuous integration
Rogue Wave Software
 
PDF
Bridging the Security Testing Gap in Your CI/CD Pipeline
DevOps.com
 
PPTX
Programming languages and techniques for today’s embedded andIoT world
Rogue Wave Software
 
PPTX
Riyadh Meetup4- Sonarqube for Mule 4 Code review
satyasekhar123
 
PDF
Building Blocks of Secure Development: How to Make Open Source Work for You
SBWebinars
 
PPTX
Secure Code review - Veracode SaaS Platform - Saudi Green Method
Salil Kumar Subramony
 
PPTX
BDD Mobile Security Testing (OWASP AppSec Bucharest 2017)
Davide Cioccia
 
PPTX
Code to Release using Artificial Intelligence and Machine Learning
STePINForum
 
PDF
Webinar–AppSec: Hype or Reality
Synopsys Software Integrity Group
 
PPTX
Keys to Continuous Delivery Success - Mark Warren, Product Director, Perforc...
Perforce
 
PPTX
SAST in the SDLC: Building a plan for 'going left'
WHSZachJones
 
PDF
Webinar–Best Practices for DevSecOps at Scale
Synopsys Software Integrity Group
 
PDF
Optimize your CI/CD with GitLab and AWS
DevOps.com
 
PPTX
Cyber security - It starts with the embedded system
Rogue Wave Software
 
PPTX
Rapid software testing and conformance with static code analysis
Rogue Wave Software
 
PDF
Upmc tpdev1
Jean-Yves Rigolet
 
PDF
Soirée du Test Logiciel - Présentation de Kiuwan (Jack ABDO)
TelecomValley
 
PDF
5 Pillars of Building Enterprise0grade APIs
WSO2
 
PDF
Driving Risks Out of Embedded Automotive Software
Parasoft
 
Open source iam value, benefits, and risks
WSO2
 
Verification at scale: Fitting static code analysis into continuous integration
Rogue Wave Software
 
Bridging the Security Testing Gap in Your CI/CD Pipeline
DevOps.com
 
Programming languages and techniques for today’s embedded andIoT world
Rogue Wave Software
 
Riyadh Meetup4- Sonarqube for Mule 4 Code review
satyasekhar123
 
Building Blocks of Secure Development: How to Make Open Source Work for You
SBWebinars
 
Secure Code review - Veracode SaaS Platform - Saudi Green Method
Salil Kumar Subramony
 
BDD Mobile Security Testing (OWASP AppSec Bucharest 2017)
Davide Cioccia
 
Code to Release using Artificial Intelligence and Machine Learning
STePINForum
 
Webinar–AppSec: Hype or Reality
Synopsys Software Integrity Group
 
Keys to Continuous Delivery Success - Mark Warren, Product Director, Perforc...
Perforce
 
SAST in the SDLC: Building a plan for 'going left'
WHSZachJones
 
Webinar–Best Practices for DevSecOps at Scale
Synopsys Software Integrity Group
 
Optimize your CI/CD with GitLab and AWS
DevOps.com
 
Cyber security - It starts with the embedded system
Rogue Wave Software
 
Rapid software testing and conformance with static code analysis
Rogue Wave Software
 
Upmc tpdev1
Jean-Yves Rigolet
 
Soirée du Test Logiciel - Présentation de Kiuwan (Jack ABDO)
TelecomValley
 
5 Pillars of Building Enterprise0grade APIs
WSO2
 
Driving Risks Out of Embedded Automotive Software
Parasoft
 

More from Serena Software (11)

PPTX
The Top 5 Practices of a Highly Successful ChangeMan ZMF Administrator
Serena Software
 
PPTX
DevOps drivein - Mind the Gap
Serena Software
 
PDF
Take your code and quality to the next level by Serena Software
Serena Software
 
PPTX
Dimensions CM Summer VUG Presentation
Serena Software
 
PDF
Mainframe vug july 30 2015
Serena Software
 
PPTX
Dimensions RM 12.3 webcast
Serena Software
 
PPTX
Dimensions CM 14.2 Webcast: Running the Gauntlet
Serena Software
 
PPTX
Continuous Delivery series: How to automate your infrastructure toolchain
Serena Software
 
PPTX
GoToWebinar Vs Webex
Serena Software
 
PPTX
Deploy Fast Without Breaking Things Webinar Presentation June 25
Serena Software
 
PPTX
Spring Mainframe VUG 2015: How to google your way through your mainframe appl...
Serena Software
 
The Top 5 Practices of a Highly Successful ChangeMan ZMF Administrator
Serena Software
 
DevOps drivein - Mind the Gap
Serena Software
 
Take your code and quality to the next level by Serena Software
Serena Software
 
Dimensions CM Summer VUG Presentation
Serena Software
 
Mainframe vug july 30 2015
Serena Software
 
Dimensions RM 12.3 webcast
Serena Software
 
Dimensions CM 14.2 Webcast: Running the Gauntlet
Serena Software
 
Continuous Delivery series: How to automate your infrastructure toolchain
Serena Software
 
GoToWebinar Vs Webex
Serena Software
 
Deploy Fast Without Breaking Things Webinar Presentation June 25
Serena Software
 
Spring Mainframe VUG 2015: How to google your way through your mainframe appl...
Serena Software
 

Recently uploaded (20)

PDF
The Future of Mobile Is Context-Aware—Are You Ready?
iProgrammer Solutions Private Limited
 
PPTX
The Future of AI & Machine Learning.pptx
pritsen4700
 
PDF
Make GenAI investments go further with the Dell AI Factory
Principled Technologies
 
PDF
AI Unleashed - Shaping the Future -Starting Today - AIOUG Yatra 2025 - For Co...
Sandesh Rao
 
PPTX
Applied-Statistics-Mastering-Data-Driven-Decisions.pptx
parmaryashparmaryash
 
PDF
Google I/O Extended 2025 Baku - all ppts
HusseinMalikMammadli
 
PDF
Using Anchore and DefectDojo to Stand Up Your DevSecOps Function
Anchore
 
PPTX
IT Runs Better with ThousandEyes AI-driven Assurance
ThousandEyes
 
PPTX
Agile Chennai 18-19 July 2025 | Emerging patterns in Agentic AI by Bharani Su...
AgileNetwork
 
PDF
Economic Impact of Data Centres to the Malaysian Economy
flintglobalapac
 
PDF
Software Development Methodologies in 2025
KodekX
 
PDF
SparkLabs Primer on Artificial Intelligence 2025
SparkLabs Group
 
PDF
Orbitly Pitch Deck|A Mission-Driven Platform for Side Project Collaboration (...
zz41354899
 
PDF
OFFOFFBOX™ – A New Era for African Film | Startup Presentation
ambaicciwalkerbrian
 
PPTX
OA presentation.pptx OA presentation.pptx
pateldhruv002338
 
PDF
Research-Fundamentals-and-Topic-Development.pdf
ayesha butalia
 
PDF
Presentation about Hardware and Software in Computer
snehamodhawadiya
 
PPTX
New ThousandEyes Product Innovations: Cisco Live June 2025
ThousandEyes
 
PDF
Unlocking the Future- AI Agents Meet Oracle Database 23ai - AIOUG Yatra 2025.pdf
Sandesh Rao
 
PDF
How Open Source Changed My Career by abdelrahman ismail
a0m0rajab1
 
The Future of Mobile Is Context-Aware—Are You Ready?
iProgrammer Solutions Private Limited
 
The Future of AI & Machine Learning.pptx
pritsen4700
 
Make GenAI investments go further with the Dell AI Factory
Principled Technologies
 
AI Unleashed - Shaping the Future -Starting Today - AIOUG Yatra 2025 - For Co...
Sandesh Rao
 
Applied-Statistics-Mastering-Data-Driven-Decisions.pptx
parmaryashparmaryash
 
Google I/O Extended 2025 Baku - all ppts
HusseinMalikMammadli
 
Using Anchore and DefectDojo to Stand Up Your DevSecOps Function
Anchore
 
IT Runs Better with ThousandEyes AI-driven Assurance
ThousandEyes
 
Agile Chennai 18-19 July 2025 | Emerging patterns in Agentic AI by Bharani Su...
AgileNetwork
 
Economic Impact of Data Centres to the Malaysian Economy
flintglobalapac
 
Software Development Methodologies in 2025
KodekX
 
SparkLabs Primer on Artificial Intelligence 2025
SparkLabs Group
 
Orbitly Pitch Deck|A Mission-Driven Platform for Side Project Collaboration (...
zz41354899
 
OFFOFFBOX™ – A New Era for African Film | Startup Presentation
ambaicciwalkerbrian
 
OA presentation.pptx OA presentation.pptx
pateldhruv002338
 
Research-Fundamentals-and-Topic-Development.pdf
ayesha butalia
 
Presentation about Hardware and Software in Computer
snehamodhawadiya
 
New ThousandEyes Product Innovations: Cisco Live June 2025
ThousandEyes
 
Unlocking the Future- AI Agents Meet Oracle Database 23ai - AIOUG Yatra 2025.pdf
Sandesh Rao
 
How Open Source Changed My Career by abdelrahman ismail
a0m0rajab1
 

Centralized Secure Vault with Dimensions CM

  • 1. 1 FUG2016Copyright © Serena Software 2016 WE OWN IT! Centralized Secure Vault with Dimensions CM Rose M Wellman Sr Mgr, Solutions Architects
  • 2. 2 FUG2016 What do these number represent?
  • 4. 4 FUG2016 Security Breaches Change Over Time Open the safe! Amateur!
  • 6. 6 FUG2016 Breaches by 3rd Party Systems • The attackers backed their way into Target's corporate network by compromising a third-party vendor. The number of vendors targeted is unknown. However, it only took one. That happened to be Fazio Mechanical, a refrigeration contractor. • A phishing email duped at least one Fazio employee, allowing Citadel, a variant of the Zeus banking trojan, to be installed on Fazio computers. With Citadel in place, the attackers waited until the malware offered what they were looking for -- Fazio Mechanical's login credentials. • At the time of the breach, all major versions of enterprise anti- malware detected the Citadel malware. Unsubstantiated sources mentioned Fazio used the free version of Malwarebytes anti-malware, which offered no real-time protection being an on-demand scanner. (Note: Malwarebytes anti-malware is highly regarded by experts when used in the correct manner.)
  • 12. 12 FUG2016 Requirements • Establish security requirements/stories • Define security tests Development • Peer code reviews • Static Analysis Testing • Vulnerability testing • Penetration testing Release • Software quality review • Release readiness review Secure SDLC
  • 13. 13 FUG2016 Serena Dimensions CM - Integrated Peer Code Review Develop with velocity - collaboratively, securely and efficiently Key Capabilities • Collaborative web based architecture • Integrates with Agile stories and requests • Linked to Continuous Inspection • Strengthens audit trail & governance • Configurable for Projects & Teams Value Benefits • Improved code quality • Find 70-90% of all defects earlier • Cost reduction • Save up to 30% of re-work hours • Developer productivity • Up to 25% improvement in coding Peer Reviews in Software - A Practical Guide by Karl E. Wiegers
  • 14. 14 FUG2016 Serena Dimensions CM – Continuous Inspection Toolchain Develop with velocity - collaboratively, securely and efficiently Key Capabilities • Extensible plug-in architecture • Schedule & inspect code changes • Report findings & vulnerabilities • Aggregated KPI Metrics • Supports DevOps “Shift-Left” Value Benefits • Display results in code review • Real-time developer feedback • Reduce coding risks & issues • Monitor code health & quality • Speed release readiness "Given enough eyeballs, all bugs are shallow." The Cathedral and the Bazar —Eric Raymond
  • 15. 15 FUG2016 • Code Hygiene • Refers to the “cleanliness” of an application – in particular, minimizing vulnerabilities and code complexity. • Good code hygiene requires visibility into all the components used to build the application. • Several activities in the software development lifecycle support good code hygiene, including threat modeling and automated testing (i.e., static and dynamic analysis). • The shortcoming of each of these activities is that they only provide a point-in-time snapshot of code hygiene, and can’t account for a changing threat space. • You have to continuously monitor or continuously apply good hygiene. • More than 4,000 new vulnerabilities were disclosed by the National Vulnerability Database in open- source components in 2014 alone. The fact that your open-source code bases are free from vulnerabilities today doesn’t mean you can ignore them for the next year. • OWASP Dependency-Check Open Source
  • 17. 17 FUG2016 Problem – Repository Sprawl • DevOps driving option of Git • Repository Sprawl • Multiple Source Code Repos • Individually Managed/Maintained • Security? • Reliability? • Cross-team collaboration? • Audit trail?
  • 18. 18 FUG2016 No Built-in Security and Authorization • Read/Write security on all objects • Group role assignments • Full audit trail of all objects
  • 19. 19 FUG2016 Git/SVN Goes into the Dimensions CM Secure Vault Release Control Dev DevOps Ops Dimensions CM Deployment Automation CM Secure Vault ChangeMan ZMF Deployment pipeline Deployment pipeline Deployment pipeline Deployment pipeline
  • 20. 20 FUG2016 Better Solution – Git Connector Dimensions CM Vault Dimensions CM Deployment Pipeline Serena Deployment Automation Dimensions CM = Git Master Repository Dimensions CM Pulse DimensionsCM GitConnector
  • 21. 21 FUG2016 • The Developers don’t have to change the tools they are using • The Business gets the control it needs – Single source of truth – Enterprise Security – Robust and scalable • With the additional value of Dimensions CM – Continuous Inspection – Enterprise Change Management – Control over path to production – Full audit trail across all components Dimensions CM Git Connector Benefit
  • 22. 22 FUG2016 Customer Quotes “ We’re a bank not a startup, and we need to be using appropriate tools to ensure the integrity and security of change, not tools that add to a developers resume. We don’t want to be the next big headline! ” Richard landoli SVP QA Brown Brothers Harriman “ The visibility and insight that Dimensions CM 14 provides, allows us to see if we are converging to quality or diverging from quality in real time. ” Ken Vane IT Change & Configuration Manager, Navy Federal Credit Union