{"id":45668,"date":"2021-06-11T10:12:04","date_gmt":"2021-06-11T08:12:04","guid":{"rendered":"https:\/\/www.arcadsoftware.com\/?page_id=45668"},"modified":"2024-06-13T15:46:23","modified_gmt":"2024-06-13T13:46:23","slug":"devsecops-pour-ibm-i","status":"publish","type":"page","link":"https:\/\/www.arcadsoftware.fr\/arcad\/solutions-fr\/devsecops-pour-ibm-i\/","title":{"rendered":"DevSecOps pour IBM i"},"content":{"rendered":"<p><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-1 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling main-product arcad-for-ibm-i-modernization\" style=\"--awb-background-position:center top;--awb-background-blend-mode:overlay;--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-top:75px;--awb-padding-bottom:0px;--awb-padding-top-small:20px;--awb-padding-right-small:20px;--awb-padding-left-small:20px;--awb-background-image:linear-gradient(180deg, #e1edf8 0%,rgba(255,255,255,0.01) 73%);--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-stretch fusion-flex-content-wrap\" style=\"max-width:1248px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-0 fusion_builder_column_4_5 4_5 fusion-flex-column fusion-animated\" style=\"--awb-padding-top:10px;--awb-padding-bottom-small:0px;--awb-bg-size:cover;--awb-width-large:80%;--awb-margin-top-large:0px;--awb-spacing-right-large:2.4%;--awb-margin-bottom-large:30px;--awb-spacing-left-large:2.4%;--awb-width-medium:80%;--awb-order-medium:0;--awb-spacing-right-medium:2.4%;--awb-spacing-left-medium:2.4%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\" data-animationType=\"fadeInUp\" data-animationDuration=\"0.9\" data-animationOffset=\"bottom-in-view\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-image-element \" style=\"--awb-max-width:370px;--awb-caption-title-font-family:var(--h2_typography-font-family);--awb-caption-title-font-weight:var(--h2_typography-font-weight);--awb-caption-title-font-style:var(--h2_typography-font-style);--awb-caption-title-size:var(--h2_typography-font-size);--awb-caption-title-transform:var(--h2_typography-text-transform);--awb-caption-title-line-height:var(--h2_typography-line-height);--awb-caption-title-letter-spacing:var(--h2_typography-letter-spacing);\"><span class=\" fusion-imageframe imageframe-none imageframe-1 hover-type-none\"><img decoding=\"async\" width=\"1186\" height=\"492\" alt=\"DevSecOps for IBM i Solution\" title=\"DevSecOps for IBM i Solution\" src=\"https:\/\/www.arcadsoftware.com\/arcad\/wp-content\/uploads\/2021\/06\/picto-solution-devsecops-1.png\" class=\"img-responsive wp-image-44505\" srcset=\"https:\/\/www.arcadsoftware.fr\/arcad\/wp-content\/uploads\/2021\/06\/picto-solution-devsecops-1-200x83.png 200w, https:\/\/www.arcadsoftware.fr\/arcad\/wp-content\/uploads\/2021\/06\/picto-solution-devsecops-1-400x166.png 400w, https:\/\/www.arcadsoftware.fr\/arcad\/wp-content\/uploads\/2021\/06\/picto-solution-devsecops-1-600x249.png 600w, https:\/\/www.arcadsoftware.fr\/arcad\/wp-content\/uploads\/2021\/06\/picto-solution-devsecops-1-800x332.png 800w, https:\/\/www.arcadsoftware.fr\/arcad\/wp-content\/uploads\/2021\/06\/picto-solution-devsecops-1.png 1186w\" sizes=\"(max-width: 640px) 100vw, 1186px\" \/><\/span><\/div><div class=\"fusion-title title fusion-title-1 fusion-sep-none fusion-title-text fusion-title-size-one\" style=\"--awb-text-color:var(--awb-color5);--awb-margin-bottom:0px;--awb-margin-top-small:10px;--awb-margin-bottom-small:0px;--awb-font-size:45px;\"><h1 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"margin:0;font-size:1em;--fontSize:45;line-height:1.16;\">DevSecOps pour IBM i <span style=\"font-size: 18px; font-weight: 300;\">(AS\/400 &#8211; AS400)<\/span><\/h1><\/div><div class=\"fusion-title title fusion-title-2 fusion-sep-none fusion-title-text fusion-title-size-two\" style=\"--awb-text-color:var(--awb-color5);--awb-margin-top:0px;--awb-margin-bottom:10px;--awb-margin-top-small:0px;--awb-margin-bottom-small:0px;--awb-font-size:28px;\"><h2 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"font-family:&quot;Poppins&quot;;font-style:normal;font-weight:500;margin:0;font-size:1em;--fontSize:28;line-height:1.2;\">D\u00e9ploiement rapide et s\u00e9curis\u00e9 de logiciels de haute qualit\u00e9<\/h2><\/div><div class=\"fusion-title title fusion-title-3 fusion-sep-none fusion-title-text fusion-title-size-three\" style=\"--awb-text-color:var(--awb-color5);--awb-margin-top:0px;--awb-margin-bottom:10px;--awb-margin-top-small:0px;--awb-margin-bottom-small:30px;--awb-font-size:25px;\"><h3 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"font-family:&quot;Poppins&quot;;font-style:normal;font-weight:300;margin:0;font-size:1em;--fontSize:25;line-height:1.3;\">Contr\u00f4les de qualit\u00e9 et de s\u00e9curit\u00e9 dans votre cycle de livraison continue<\/h3><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-2 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling main-product arcad-for-ibm-i-modernization\" style=\"--awb-background-position:center top;--awb-background-blend-mode:overlay;--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-top:0px;--awb-padding-bottom:75px;--awb-padding-top-small:20px;--awb-padding-right-small:20px;--awb-padding-bottom-small:40px;--awb-padding-left-small:20px;--awb-background-color:var(--awb-color1);--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-stretch fusion-flex-content-wrap\" style=\"max-width:1248px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-1 fusion_builder_column_2_3 2_3 fusion-flex-column solution-description\" style=\"--awb-padding-bottom-small:40px;--awb-bg-size:cover;--awb-width-large:66.666666666667%;--awb-margin-top-large:40px;--awb-spacing-right-large:2.88%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:2.88%;--awb-width-medium:66.666666666667%;--awb-order-medium:0;--awb-spacing-right-medium:2.88%;--awb-spacing-left-medium:2.88%;--awb-width-small:100%;--awb-order-small:0;--awb-margin-top-small:0px;--awb-spacing-right-small:1.92%;--awb-margin-bottom-small:0px;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-title title fusion-title-4 fusion-sep-none fusion-title-text fusion-title-size-three\" style=\"--awb-text-color:var(--awb-color5);--awb-margin-bottom:5px;--awb-margin-top-small:10px;--awb-margin-right-small:0px;--awb-margin-bottom-small:10px;--awb-margin-left-small:0px;--awb-font-size:25px;\"><h3 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"font-family:&quot;Poppins&quot;;font-style:normal;font-weight:700;margin:0;font-size:1em;--fontSize:25;line-height:1.3;\">DevSecOps : S\u00e9curit\u00e9 et risques m\u00e9tiers \u00e0 l&#8217;\u00e8re du Cloud<\/h3><\/div><div class=\"fusion-text fusion-text-1\" style=\"--awb-font-size:18px;--awb-text-font-family:&quot;Poppins&quot;;--awb-text-font-style:normal;--awb-text-font-weight:400;\"><p>La transformation num\u00e9rique et l&#8217;adoption du cloud ont vu les logiciels devenir la premi\u00e8re cause de risque pour les entreprises. Les architectures applicatives complexes ont augment\u00e9 les surfaces d&#8217;attaque, et les nouveaux paradigmes informatiques ne font souvent pas de la s\u00e9curit\u00e9 une priorit\u00e9. Alors que DevOps rend la livraison de logiciels plus efficace, les cycles acc\u00e9l\u00e9r\u00e9s peuvent au contraire n\u00e9gliger les failles de s\u00e9curit\u00e9, cr\u00e9ant des vuln\u00e9rabilit\u00e9s cach\u00e9es. DevOps modifie \u00e9galement la gestion de la s\u00e9curit\u00e9, avec des pr\u00e9occupations en continu et la responsabilit\u00e9 se retrouve partag\u00e9e entre les \u00e9quipes. En cons\u00e9quence, la s\u00e9curit\u00e9 se doit d&#8217;\u00eatre un \u00e9l\u00e9ment \u00e0 part enti\u00e8re de la cr\u00e9ation de logiciels et fait d\u00e9sormais partie int\u00e9grante de DevOps sous le nom de DevSecOps.<\/p>\n<\/div><div class=\"fusion-title title fusion-title-5 fusion-sep-none fusion-title-text fusion-title-size-three\" style=\"--awb-text-color:var(--awb-color5);--awb-margin-bottom:5px;--awb-margin-top-small:10px;--awb-margin-right-small:0px;--awb-margin-bottom-small:10px;--awb-margin-left-small:0px;--awb-font-size:25px;\"><h3 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"font-family:&quot;Poppins&quot;;font-style:normal;font-weight:700;margin:0;font-size:1em;--fontSize:25;line-height:1.3;\">DevSecOps and automatisation<\/h3><\/div><div class=\"fusion-text fusion-text-2\" style=\"--awb-font-size:18px;--awb-text-font-family:&quot;Poppins&quot;;--awb-text-font-style:normal;--awb-text-font-weight:400;\"><p>Derri\u00e8re toute mise en \u0153uvre r\u00e9ussie de DevSecOps se cache l\u2019automatisation. Aujourd\u2019hui, la plupart des failles de s\u00e9curit\u00e9 sont dues \u00e0 l\u2019erreur humaine. Les examens manuels risquent de laisser des failles de codage non d\u00e9tect\u00e9es. Les tests manuels cr\u00e9ent des failles qui se propagent dans les environnements de production. Le d\u00e9ploiement et les correctifs ad hoc ne permettent pas de d\u00e9tecter les logiciels non s\u00e9curis\u00e9s au moment le plus critique du cycle.<\/p>\n<p><span style=\"color: var(--awb-text-color); font-family: var(--awb-text-font-family); font-size: var(--awb-font-size); font-style: var(--awb-text-font-style); font-weight: var(--awb-text-font-weight); letter-spacing: var(--awb-letter-spacing); text-align: var(--awb-content-alignment); text-transform: var(--awb-text-transform); background-color: var(--awb-bg-color-hover);\">Pour minimiser les risques, chaque phase successive du cycle DevSecOps doit \u00eatre automatis\u00e9e et continue. En automatisant une s\u00e9rie de points de contr\u00f4le de qualit\u00e9 s\u00e9curis\u00e9s, le \u00ab shift security left \u00bb \u00e9vite les retouches co\u00fbteuses.<\/span><\/p>\n<\/div><div class=\"fusion-image-element \" style=\"--awb-margin-bottom:30px;--awb-caption-title-font-family:var(--h2_typography-font-family);--awb-caption-title-font-weight:var(--h2_typography-font-weight);--awb-caption-title-font-style:var(--h2_typography-font-style);--awb-caption-title-size:var(--h2_typography-font-size);--awb-caption-title-transform:var(--h2_typography-text-transform);--awb-caption-title-line-height:var(--h2_typography-line-height);--awb-caption-title-letter-spacing:var(--h2_typography-letter-spacing);\"><span class=\" fusion-imageframe imageframe-none imageframe-2 hover-type-none\"><img decoding=\"async\" width=\"1200\" height=\"318\" alt=\"ARCAD for DevOps schema\" src=\"https:\/\/www.arcadsoftware.com\/arcad\/wp-content\/uploads\/2023\/03\/schema-vs-Code-ibm-z-.png\" class=\"img-responsive wp-image-61786\" srcset=\"https:\/\/www.arcadsoftware.fr\/arcad\/wp-content\/uploads\/2023\/03\/schema-vs-Code-ibm-z--200x53.png 200w, https:\/\/www.arcadsoftware.fr\/arcad\/wp-content\/uploads\/2023\/03\/schema-vs-Code-ibm-z--400x106.png 400w, https:\/\/www.arcadsoftware.fr\/arcad\/wp-content\/uploads\/2023\/03\/schema-vs-Code-ibm-z--600x159.png 600w, https:\/\/www.arcadsoftware.fr\/arcad\/wp-content\/uploads\/2023\/03\/schema-vs-Code-ibm-z--800x212.png 800w, https:\/\/www.arcadsoftware.fr\/arcad\/wp-content\/uploads\/2023\/03\/schema-vs-Code-ibm-z-.png 1200w\" sizes=\"(max-width: 640px) 100vw, 800px\" \/><\/span><\/div><div class=\"fusion-title title fusion-title-6 fusion-sep-none fusion-title-text fusion-title-size-three\" style=\"--awb-text-color:var(--awb-color5);--awb-margin-bottom:5px;--awb-margin-top-small:10px;--awb-margin-right-small:0px;--awb-margin-bottom-small:10px;--awb-margin-left-small:0px;--awb-font-size:25px;\"><h3 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"font-family:&quot;Poppins&quot;;font-style:normal;font-weight:700;margin:0;font-size:1em;--fontSize:25;line-height:1.3;\">Mais l\u2019IBM i est fiable \u2013 DevOps n\u2019est-il pas suffisant ?<\/h3><\/div><div class=\"fusion-text fusion-text-3\" style=\"--awb-font-size:18px;--awb-text-font-family:&quot;Poppins&quot;;--awb-text-font-style:normal;--awb-text-font-weight:400;\"><p>Alors qu&#8217;IBM i b\u00e9n\u00e9ficie d&#8217;une s\u00e9curit\u00e9 int\u00e9gr\u00e9e robuste, le besoin du DevSecOps se fait sentir \u00e0 mesure que les applications se modernisent et s&#8217;int\u00e8grent \u00e0 des sources externes. Le code existant expos\u00e9 en tant que services Web pr\u00e9sente de nouveaux risques tels que l&#8217;injection SQL et les API non s\u00e9curis\u00e9es. Les \u00e9quipes DevSecOps utilisent l&#8217;analyse statique du code pour att\u00e9nuer ces menaces, en appliquant les r\u00e8gles de contr\u00f4le de qualit\u00e9 de l&#8217;OWASP. En ce qui concerne les menaces internes, qui repr\u00e9sentent une part importante des violations de donn\u00e9es, les techniques automatis\u00e9es d&#8217;anonymisation des donn\u00e9es sont essentielles pour y faire face.<\/p>\n<\/div><div class=\"fusion-title title fusion-title-7 fusion-sep-none fusion-title-text fusion-title-size-three\" style=\"--awb-text-color:var(--awb-color5);--awb-margin-bottom:5px;--awb-margin-top-small:10px;--awb-margin-right-small:0px;--awb-margin-bottom-small:10px;--awb-margin-left-small:0px;--awb-font-size:25px;\"><h3 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"font-family:&quot;Poppins&quot;;font-style:normal;font-weight:700;margin:0;font-size:1em;--fontSize:25;line-height:1.3;\">Conformit\u00e9 \u00e0 la s\u00e9curit\u00e9 : l\u2019importance de l\u2019int\u00e9gration<\/h3><\/div><div class=\"fusion-text fusion-text-4\" style=\"--awb-font-size:18px;--awb-text-font-family:&quot;Poppins&quot;;--awb-text-font-style:normal;--awb-text-font-weight:400;\"><p>De nombreuses mises en \u0153uvre DevOps ont \u00e9t\u00e9 construites en regroupant des outils \u00ab ponctuels \u00bb non int\u00e9gr\u00e9s et faiblement reli\u00e9s. Il est donc beaucoup plus difficile de mesurer les niveaux de qualit\u00e9 et de s\u00e9curit\u00e9 et de g\u00e9rer les risques. Pour assurer la conformit\u00e9 dans les environnements hybrides d\u2019aujourd\u2019hui, les \u00e9quipes DevSecOps ont besoin d\u2019une vision globale de la s\u00e9curit\u00e9, de l\u2019analyse des applications au d\u00e9ploiement, en passant par de multiples technologies et plateformes. Cela n\u2019est possible qu\u2019avec un ensemble d\u2019outils int\u00e9gr\u00e9s, un r\u00e9f\u00e9rentiel partag\u00e9 et un point unique de reporting et de contr\u00f4le.<\/p>\n<\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-3 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-sizes-top:0px;--awb-border-sizes-bottom:0px;--awb-border-sizes-left:0px;--awb-border-sizes-right:0px;--awb-border-color:#d2d3d4;--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-top:50px;--awb-padding-bottom:50px;--awb-background-color:var(--awb-color5);--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:1248px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-2 fusion_builder_column_3_4 3_4 fusion-flex-column\" style=\"--awb-bg-blend:overlay;--awb-bg-size:cover;--awb-width-large:75%;--awb-margin-top-large:0px;--awb-spacing-right-large:2.56%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:2.56%;--awb-width-medium:75%;--awb-spacing-right-medium:2.56%;--awb-spacing-left-medium:2.56%;--awb-width-small:100%;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-title title fusion-title-8 fusion-sep-none fusion-title-text fusion-title-size-two\" style=\"--awb-text-color:var(--awb-color1);--awb-margin-top:0px;--awb-margin-bottom:10px;--awb-margin-top-small:10px;--awb-margin-bottom-small:10px;--awb-font-size:35px;\"><h2 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"font-family:&quot;Poppins&quot;;font-style:normal;font-weight:600;margin:0;font-size:1em;--fontSize:35;line-height:1.2;\">Obtenez ARCAD for DevOps !<\/h2><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-4 hundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-overflow:visible;--awb-padding-right:30px;--awb-padding-left:30px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-3 fusion_builder_column_1_1 1_1 fusion-one-full fusion-column-first fusion-column-last fusion-column-no-min-height\" style=\"--awb-bg-blend:overlay;--awb-bg-size:cover;--awb-margin-bottom:0px;\"><div class=\"fusion-column-wrapper fusion-flex-column-wrapper-legacy\"><div class=\"fusion-section-separator section-separator triangle fusion-section-separator-1\" style=\"--awb-border-bottom:1px solid var(--awb-color5);--awb-spacer-height:1px;--awb-svg-margin-left:0;--awb-svg-margin-right:0;--awb-icon-color:#0e6ace;\"><div class=\"fusion-section-separator-svg\"><div class=\"divider-candy-arrow bottom\" style=\"top:0px;border-top-color: var(--awb-color5);\"><\/div><div class=\"divider-candy bottom\" style=\"bottom:-21px;border-bottom:1px solid var(--awb-color5);border-left:1px solid var(--awb-color5);\"><\/div><\/div><div class=\"fusion-section-separator-spacer\"><div class=\"fusion-section-separator-spacer-height\"><\/div><\/div><\/div><div class=\"fusion-clearfix\"><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-5 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-top:110px;--awb-padding-bottom:60px;--awb-padding-right-small:20px;--awb-padding-left-small:20px;--awb-margin-bottom:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:1248px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-4 fusion_builder_column_1_3 1_3 fusion-flex-column fusion-animated\" style=\"--awb-padding-right:35px;--awb-padding-bottom:55px;--awb-padding-left:35px;--awb-overflow:hidden;--awb-bg-image:linear-gradient(180deg, var(--awb-color1) 15%,#437cb4 15%);--awb-bg-size:cover;--awb-border-radius:5px 5px 5px 5px;--awb-width-large:33.333333333333%;--awb-margin-top-large:0px;--awb-spacing-right-large:5.76%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:5.76%;--awb-width-medium:33.333333333333%;--awb-order-medium:0;--awb-spacing-right-medium:5.76%;--awb-spacing-left-medium:5.76%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\" data-animationType=\"fadeInLeft\" data-animationDuration=\"0.9\" data-animationOffset=\"top-into-view\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-image-element \" style=\"--awb-max-width:90px;--awb-caption-title-font-family:var(--h2_typography-font-family);--awb-caption-title-font-weight:var(--h2_typography-font-weight);--awb-caption-title-font-style:var(--h2_typography-font-style);--awb-caption-title-size:var(--h2_typography-font-size);--awb-caption-title-transform:var(--h2_typography-text-transform);--awb-caption-title-line-height:var(--h2_typography-line-height);--awb-caption-title-letter-spacing:var(--h2_typography-letter-spacing);\"><span class=\" fusion-imageframe imageframe-none imageframe-3 hover-type-none\"><img decoding=\"async\" width=\"167\" height=\"166\" alt=\"ARCAD for DevOps Picto\" title=\"ARCAD for DevOps Picto\" src=\"https:\/\/www.arcadsoftware.com\/arcad\/wp-content\/uploads\/2021\/04\/arcad-for-devops-picto.png\" class=\"img-responsive wp-image-41221\" srcset=\"https:\/\/www.arcadsoftware.fr\/arcad\/wp-content\/uploads\/2021\/04\/arcad-for-devops-picto-66x66.png 66w, https:\/\/www.arcadsoftware.fr\/arcad\/wp-content\/uploads\/2021\/04\/arcad-for-devops-picto-150x150.png 150w, https:\/\/www.arcadsoftware.fr\/arcad\/wp-content\/uploads\/2021\/04\/arcad-for-devops-picto.png 167w\" sizes=\"(max-width: 167px) 100vw, 167px\" \/><\/span><\/div><div class=\"fusion-title title fusion-title-9 fusion-sep-none fusion-title-text fusion-title-size-four\" style=\"--awb-text-color:var(--awb-color1);--awb-margin-bottom:5px;--awb-margin-top-small:10px;--awb-margin-bottom-small:10px;\"><h4 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"font-family:&quot;Poppins&quot;;font-style:normal;font-weight:800;margin:0;--fontSize:24;line-height:1.36;\">ARCAD for DevOps<\/h4><\/div><div class=\"fusion-text fusion-text-5 fusion-text-no-margin\" style=\"--awb-text-color:var(--awb-color1);--awb-margin-bottom:20px;--awb-text-font-family:&quot;Poppins&quot;;--awb-text-font-style:normal;--awb-text-font-weight:400;\"><p>Tous les outils n\u00e9cessaires pour DevOps sur IBM i<\/p>\n<\/div><div ><a class=\"fusion-button button-flat fusion-button-default-size button-custom fusion-button-default button-1 fusion-button-default-span fusion-button-default-type\" style=\"--button_accent_color:var(--awb-color5);--button_accent_hover_color:var(--awb-color1);--button_border_hover_color:var(--awb-color1);--button_gradient_top_color:var(--awb-color1);--button_gradient_bottom_color:var(--awb-color1);--button_gradient_top_color_hover:var(--awb-color5);--button_gradient_bottom_color_hover:var(--awb-color5);\" target=\"_self\" href=\"\/arcad\/produits\/arcad-for-devops\/\"><span class=\"fusion-button-text awb-button__text awb-button__text--default\">D\u00e9couvrez ARCAD for DevOps<\/span><\/a><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-5 fusion_builder_column_2_3 2_3 fusion-flex-column fusion-animated\" style=\"--awb-bg-blend:overlay;--awb-bg-size:cover;--awb-width-large:66.666666666667%;--awb-margin-top-large:30px;--awb-spacing-right-large:2.88%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:2.88%;--awb-width-medium:66.666666666667%;--awb-spacing-right-medium:2.88%;--awb-spacing-left-medium:2.88%;--awb-width-small:100%;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\" data-animationType=\"fadeInUp\" data-animationDuration=\"0.9\" data-animationDelay=\"0.3\" data-animationOffset=\"top-into-view\"><div class=\"fusion-column-wrapper fusion-flex-justify-content-center fusion-content-layout-column\"><div class=\"fusion-title title fusion-title-10 fusion-sep-none fusion-title-text fusion-title-size-four\" style=\"--awb-text-color:var(--awb-color5);--awb-margin-bottom:5px;--awb-margin-top-small:10px;--awb-margin-bottom-small:10px;\"><h4 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"font-family:&quot;Poppins&quot;;font-style:normal;font-weight:800;margin:0;--fontSize:24;line-height:1.36;\">Automatisez DevSecOps sur IBM i<\/h4><\/div><ul style=\"--awb-size:18px;--awb-item-padding-top:3px;--awb-item-padding-bottom:3px;--awb-iconcolor:var(--awb-color5);--awb-line-height:30.6px;--awb-icon-width:30.6px;--awb-icon-height:30.6px;--awb-icon-margin:12.6px;--awb-content-margin:43.2px;--awb-circlecolor:#ffffff;--awb-circle-yes-font-size:15.84px;\" class=\"fusion-checklist fusion-checklist-1 type-icons blue-checklist blue-checklist-right\"><li class=\"fusion-li-item\" style=\"\"><span class=\"icon-wrapper circle-yes\"><i class=\"fusion-li-icon fa-check fas\" aria-hidden=\"true\"><\/i><\/span><div class=\"fusion-li-item-content\"><strong>Tableaux de bord<\/strong><br \/>\nObtenez des informations exploitables sur la s\u00e9curit\u00e9 tout au long du cycle de vie des applications.<\/div><\/li><li class=\"fusion-li-item\" style=\"\"><span class=\"icon-wrapper circle-yes\"><i class=\"fusion-li-icon fa-check fas\" aria-hidden=\"true\"><\/i><\/span><div class=\"fusion-li-item-content\"><strong>Analyse des applications<\/strong><br \/>\nAssurez-vous de l\u2019exhaustivit\u00e9 des changements et r\u00e9duisez la dette technique<\/div><\/li><li class=\"fusion-li-item\" style=\"\"><span class=\"icon-wrapper circle-yes\"><i class=\"fusion-li-icon fa-check fas\" aria-hidden=\"true\"><\/i><\/span><div class=\"fusion-li-item-content\"><strong>V\u00e9rification de la qualit\u00e9 du code<\/strong><br \/>\nD\u00e9tectez les points complexes et les constructions de code qui ne sont pas s\u00fbres.<\/div><\/li><li class=\"fusion-li-item\" style=\"\"><span class=\"icon-wrapper circle-yes\"><i class=\"fusion-li-icon fa-check fas\" aria-hidden=\"true\"><\/i><\/span><div class=\"fusion-li-item-content\"><strong>V\u00e9rification de la s\u00e9curit\u00e9 du code<\/strong><br \/>\nAnalyse du code source pour d\u00e9tecter les failles de s\u00e9curit\u00e9.<\/div><\/li><li class=\"fusion-li-item\" style=\"\"><span class=\"icon-wrapper circle-yes\"><i class=\"fusion-li-icon fa-check fas\" aria-hidden=\"true\"><\/i><\/span><div class=\"fusion-li-item-content\"><strong>Test de r\u00e9gression<\/strong><br \/>\nPr\u00e9servez la fiabilit\u00e9 des applications gr\u00e2ce \u00e0 une \u00ab barri\u00e8re qualit\u00e9 \u00bb s\u00e9curis\u00e9e<\/div><\/li><li class=\"fusion-li-item\" style=\"\"><span class=\"icon-wrapper circle-yes\"><i class=\"fusion-li-icon fa-check fas\" aria-hidden=\"true\"><\/i><\/span><div class=\"fusion-li-item-content\"><strong>Anonymisation des donn\u00e9es de test<\/strong><br \/>\nDissimulez les donn\u00e9es personnelles ou identifiantes.<\/div><\/li><li class=\"fusion-li-item\" style=\"\"><span class=\"icon-wrapper circle-yes\"><i class=\"fusion-li-icon fa-check fas\" aria-hidden=\"true\"><\/i><\/span><div class=\"fusion-li-item-content\"><strong>Automatisation du d\u00e9ploiement<\/strong><br \/>\nAutomatisation d\u2019un processus de d\u00e9ploiement r\u00e9p\u00e9titif et piste d\u2019audit<\/div><\/li><li class=\"fusion-li-item\" style=\"\"><span class=\"icon-wrapper circle-yes\"><i class=\"fusion-li-icon fa-check fas\" aria-hidden=\"true\"><\/i><\/span><div class=\"fusion-li-item-content\"><strong>Retour en arri\u00e8re en cas d\u2019erreur <\/strong><br \/>\nR\u00e9tablissement instantan\u00e9 d\u2019un \u00e9tat stable du syst\u00e8me en cas d\u2019incident<\/div><\/li><\/ul><\/div><\/div><\/div><\/div><div id=\"demo\" class=\"fusion-container-anchor\"><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-6 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling quick-demo-section\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-top:0px;--awb-padding-bottom:25px;--awb-padding-left:0px;--awb-padding-right-small:20px;--awb-padding-left-small:20px;--awb-margin-top:0px;--awb-margin-bottom:0px;--awb-background-image:linear-gradient(180deg, rgba(255,255,255,0) 23%,#437cb4 23%);--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:1248px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-6 fusion_builder_column_3_5 3_5 fusion-flex-column\" style=\"--awb-padding-right-small:0px;--awb-padding-left-small:0px;--awb-bg-size:cover;--awb-width-large:60%;--awb-margin-top-large:0px;--awb-spacing-right-large:3.2%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:3.2%;--awb-width-medium:60%;--awb-order-medium:0;--awb-spacing-right-medium:3.2%;--awb-spacing-left-medium:3.2%;--awb-width-small:100%;--awb-order-small:0;--awb-margin-top-small:48px;--awb-spacing-right-small:0%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-image-element \" style=\"--awb-margin-bottom-small:10px;--awb-max-width:300px;--awb-caption-title-font-family:var(--h2_typography-font-family);--awb-caption-title-font-weight:var(--h2_typography-font-weight);--awb-caption-title-font-style:var(--h2_typography-font-style);--awb-caption-title-size:var(--h2_typography-font-size);--awb-caption-title-transform:var(--h2_typography-text-transform);--awb-caption-title-line-height:var(--h2_typography-line-height);--awb-caption-title-letter-spacing:var(--h2_typography-letter-spacing);\"><span class=\" fusion-imageframe imageframe-none imageframe-4 hover-type-none\"><img decoding=\"async\" width=\"823\" height=\"754\" alt=\"Contact Us\" src=\"https:\/\/www.arcadsoftware.com\/arcad\/wp-content\/uploads\/2021\/03\/contact-us.png\" class=\"img-responsive wp-image-39320\" srcset=\"https:\/\/www.arcadsoftware.fr\/arcad\/wp-content\/uploads\/2021\/03\/contact-us-200x183.png 200w, https:\/\/www.arcadsoftware.fr\/arcad\/wp-content\/uploads\/2021\/03\/contact-us-400x366.png 400w, https:\/\/www.arcadsoftware.fr\/arcad\/wp-content\/uploads\/2021\/03\/contact-us-600x550.png 600w, https:\/\/www.arcadsoftware.fr\/arcad\/wp-content\/uploads\/2021\/03\/contact-us-800x733.png 800w, https:\/\/www.arcadsoftware.fr\/arcad\/wp-content\/uploads\/2021\/03\/contact-us.png 823w\" sizes=\"(max-width: 640px) 100vw, 800px\" \/><\/span><\/div><div class=\"fusion-text fusion-text-6 fusion-text-no-margin title1\" style=\"--awb-font-size:20px;--awb-line-height:1.15;--awb-text-color:#ffffff;--awb-margin-top:30px;--awb-margin-bottom:0px;--awb-text-font-family:&quot;Poppins&quot;;--awb-text-font-style:normal;--awb-text-font-weight:200;\"><p>DEMANDEZ VOTRE D\u00c9MO<\/p>\n<\/div><div class=\"fusion-text fusion-text-7 fusion-text-no-margin title2\" style=\"--awb-font-size:45px;--awb-line-height:1.15;--awb-text-color:#ffffff;--awb-margin-top:0px;--awb-margin-bottom:8px;--awb-text-font-family:&quot;Poppins&quot;;--awb-text-font-style:normal;--awb-text-font-weight:600;\"><p>Parlons de votre projet !<\/p>\n<\/div><div class=\"fusion-text fusion-text-8 fusion-text-no-margin title3\" style=\"--awb-font-size:35px;--awb-line-height:1.15;--awb-text-color:#ffffff;--awb-margin-top:0px;--awb-margin-bottom:0px;--awb-text-font-family:&quot;Poppins&quot;;--awb-text-font-style:normal;--awb-text-font-weight:300;\"><p>Nos experts vous conseillent<\/p>\n<\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-7 fusion_builder_column_2_5 2_5 fusion-flex-column\" style=\"--awb-padding-top:40px;--awb-padding-right:40px;--awb-padding-bottom:40px;--awb-padding-left:40px;--awb-padding-right-small:20px;--awb-padding-left-small:20px;--awb-overflow:hidden;--awb-bg-color:#ffffff;--awb-bg-color-hover:#ffffff;--awb-bg-size:cover;--awb-box-shadow:3px 3px 9px 0px rgba(0,0,0,0.27);;--awb-border-radius:5px 5px 5px 5px;--awb-width-large:40%;--awb-margin-top-large:0px;--awb-spacing-right-large:4.8%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:4.8%;--awb-width-medium:40%;--awb-order-medium:0;--awb-spacing-right-medium:4.8%;--awb-spacing-left-medium:4.8%;--awb-width-small:100%;--awb-order-small:0;--awb-margin-top-small:0px;--awb-spacing-right-small:1.92%;--awb-margin-bottom-small:0px;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-title title fusion-title-11 fusion-sep-none fusion-title-text fusion-title-size-two\" style=\"--awb-text-color:var(--awb-color5);--awb-margin-bottom:0px;--awb-margin-top-small:10px;--awb-margin-bottom-small:10px;--awb-font-size:35px;\"><h2 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"font-family:&quot;Poppins&quot;;font-style:normal;font-weight:700;margin:0;font-size:1em;--fontSize:35;line-height:1.2;\">D\u00e9mo personnalis\u00e9e<\/h2><\/div><div class=\"fusion-text fusion-text-9 fusion-no-small-visibility\" style=\"--awb-font-size:25px;--awb-text-color:var(--awb-color5);--awb-margin-top:0px;--awb-text-font-family:&quot;Poppins&quot;;--awb-text-font-style:normal;--awb-text-font-weight:400;\"><p>Sollicitez nos experts<\/p>\n<\/div><!-- [if lte IE 8]><script charset=\"utf-8\" type=\"text\/javascript\" src=\"\/\/js.hsforms.net\/forms\/v2-legacy.js\"><\/script><![endif]--><script charset=\"utf-8\" type=\"text\/javascript\" src=\"\/\/js.hsforms.net\/forms\/v2.js\"><\/script><script>\n  hbspt.forms.create({\n\tportalId: \"4514828\",\n\tformId: \"d352c58c-07ec-4326-bd67-e84ffe254c14\",\n\tcss: \"\",\n        blockedDomains: [\"freschelegacy.com\",\"freschesolutions.com\",\"rocketsoftware.com\",\"softlanding.com\",\"mkssoftware.com\",\"midrangedynamics.com\",\"remainsoftware.com\",\"taskforce-it.de\",\"origsoft.com\",\"itheis.com\",\"idinfo-conseil.com\",\"broadcom.com\",\"rs.com\",\"idinfo.eu\",\"looksoftware.com\",\"proximity.co.uk\",\"bigblue.it\",\"xhypm.com\",\"seagullsoftware.com\",\"seagullsoftware.com\",\"xcase.com\",\"comsid.de\",\"genebag.com\",\"mailo.com\",\"neuf.fr\",\"pks.de\",\"armonie.group\",\"pascalpolverini.com\",\"polverinipartners.com\",\"systnaps.com\",\"sarus.tech\",\"microfocus.com\",\"opentext.com\",\"md-na.com\",\"redbourn.co.uk\",\"omninet.be\",\"cdinvest.be\",\"cdinvest.eu\",\"ptc.com\",\"alvinecapital.co.uk\",\"katchou.eu\",\"talend.com\",\"bartech.es\"],\n        translations: {\n           fr: {\n             required: \"Ce champs est requis.\",\n             missingSelect: \"Ce champs est requis.\",\n             forbiddenEmailDomain: \"Veuillez saisir une adresse professionnelle\",\n             manuallyBlockedEmailDomain: \"Veuillez saisir une adresse professionnelle\", \n             submitText: \"Demander une D\u00e9mo\"\n           }\n       }\n});\n<\/script><\/div><\/div><\/div><\/div><\/div>\n<\/p>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":16,"featured_media":44505,"parent":22731,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"100-width.php","meta":{"footnotes":""},"class_list":["post-45668","page","type-page","status-publish","has-post-thumbnail","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>DevSecOps pour IBM i (AS\/400 ou AS400)<\/title>\n<meta name=\"description\" content=\"D\u00e9couvrez comment DevSecOps permet de d\u00e9ployer plus rapidement des logiciels de meilleure qualit\u00e9 sur IBM i (alias AS\/400 ou AS400).\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.arcadsoftware.fr\/arcad\/solutions-fr\/devsecops-pour-ibm-i\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"DevSecOps pour IBM i (AS\/400 ou AS400)\" \/>\n<meta property=\"og:description\" content=\"D\u00e9couvrez comment DevSecOps permet de d\u00e9ployer plus rapidement des logiciels de meilleure qualit\u00e9 sur IBM i (alias AS\/400 ou AS400).\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.arcadsoftware.fr\/arcad\/solutions-fr\/devsecops-pour-ibm-i\/\" \/>\n<meta property=\"og:site_name\" content=\"ARCAD\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/pages\/Arcad-Software\/116086138469235\" \/>\n<meta property=\"article:modified_time\" content=\"2024-06-13T13:46:23+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.arcadsoftware.fr\/arcad\/wp-content\/uploads\/2021\/06\/picto-solution-devsecops-1.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1186\" \/>\n\t<meta property=\"og:image:height\" content=\"492\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"12 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.arcadsoftware.fr\\\/arcad\\\/solutions-fr\\\/devsecops-pour-ibm-i\\\/\",\"url\":\"https:\\\/\\\/www.arcadsoftware.fr\\\/arcad\\\/solutions-fr\\\/devsecops-pour-ibm-i\\\/\",\"name\":\"DevSecOps pour IBM i (AS\\\/400 ou AS400)\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.arcadsoftware.com\\\/arcad\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.arcadsoftware.fr\\\/arcad\\\/solutions-fr\\\/devsecops-pour-ibm-i\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.arcadsoftware.fr\\\/arcad\\\/solutions-fr\\\/devsecops-pour-ibm-i\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.arcadsoftware.fr\\\/arcad\\\/wp-content\\\/uploads\\\/2021\\\/06\\\/picto-solution-devsecops-1.png\",\"datePublished\":\"2021-06-11T08:12:04+00:00\",\"dateModified\":\"2024-06-13T13:46:23+00:00\",\"description\":\"D\u00e9couvrez comment DevSecOps permet de d\u00e9ployer plus rapidement des logiciels de meilleure qualit\u00e9 sur IBM i (alias AS\\\/400 ou AS400).\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.arcadsoftware.fr\\\/arcad\\\/solutions-fr\\\/devsecops-pour-ibm-i\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.arcadsoftware.fr\\\/arcad\\\/solutions-fr\\\/devsecops-pour-ibm-i\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.arcadsoftware.fr\\\/arcad\\\/solutions-fr\\\/devsecops-pour-ibm-i\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.arcadsoftware.fr\\\/arcad\\\/wp-content\\\/uploads\\\/2021\\\/06\\\/picto-solution-devsecops-1.png\",\"contentUrl\":\"https:\\\/\\\/www.arcadsoftware.fr\\\/arcad\\\/wp-content\\\/uploads\\\/2021\\\/06\\\/picto-solution-devsecops-1.png\",\"width\":1186,\"height\":492,\"caption\":\"DevSecOps for IBM i Solution\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.arcadsoftware.fr\\\/arcad\\\/solutions-fr\\\/devsecops-pour-ibm-i\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"ARCAD\",\"item\":\"https:\\\/\\\/www.arcadsoftware.com\\\/arcad\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Solutions\",\"item\":\"https:\\\/\\\/www.arcadsoftware.fr\\\/arcad\\\/solutions-fr\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"DevSecOps pour IBM i\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.arcadsoftware.com\\\/arcad\\\/#website\",\"url\":\"https:\\\/\\\/www.arcadsoftware.com\\\/arcad\\\/\",\"name\":\"ARCAD\",\"description\":\"Experts DevOps &amp; Modernisation sur IBM i (alias AS\\\/400 ou AS400)\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.arcadsoftware.com\\\/arcad\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.arcadsoftware.com\\\/arcad\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.arcadsoftware.com\\\/arcad\\\/#organization\",\"name\":\"ARCAD Software\",\"url\":\"https:\\\/\\\/www.arcadsoftware.com\\\/arcad\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.arcadsoftware.com\\\/arcad\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.arcadsoftware.com\\\/arcad\\\/wp-content\\\/uploads\\\/2017\\\/09\\\/arcad-group-logo-text-144.png\",\"contentUrl\":\"https:\\\/\\\/www.arcadsoftware.com\\\/arcad\\\/wp-content\\\/uploads\\\/2017\\\/09\\\/arcad-group-logo-text-144.png\",\"width\":144,\"height\":200,\"caption\":\"ARCAD Software\"},\"image\":{\"@id\":\"https:\\\/\\\/www.arcadsoftware.com\\\/arcad\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/pages\\\/Arcad-Software\\\/116086138469235\",\"https:\\\/\\\/x.com\\\/arcad_software\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/arcad-software\",\"https:\\\/\\\/www.youtube.com\\\/user\\\/ARCADSoftwareInc\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"DevSecOps pour IBM i (AS\/400 ou AS400)","description":"D\u00e9couvrez comment DevSecOps permet de d\u00e9ployer plus rapidement des logiciels de meilleure qualit\u00e9 sur IBM i (alias AS\/400 ou AS400).","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.arcadsoftware.fr\/arcad\/solutions-fr\/devsecops-pour-ibm-i\/","og_locale":"en_US","og_type":"article","og_title":"DevSecOps pour IBM i (AS\/400 ou AS400)","og_description":"D\u00e9couvrez comment DevSecOps permet de d\u00e9ployer plus rapidement des logiciels de meilleure qualit\u00e9 sur IBM i (alias AS\/400 ou AS400).","og_url":"https:\/\/www.arcadsoftware.fr\/arcad\/solutions-fr\/devsecops-pour-ibm-i\/","og_site_name":"ARCAD","article_publisher":"https:\/\/www.facebook.com\/pages\/Arcad-Software\/116086138469235","article_modified_time":"2024-06-13T13:46:23+00:00","og_image":[{"width":1186,"height":492,"url":"https:\/\/www.arcadsoftware.fr\/arcad\/wp-content\/uploads\/2021\/06\/picto-solution-devsecops-1.png","type":"image\/png"}],"twitter_misc":{"Est. reading time":"12 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.arcadsoftware.fr\/arcad\/solutions-fr\/devsecops-pour-ibm-i\/","url":"https:\/\/www.arcadsoftware.fr\/arcad\/solutions-fr\/devsecops-pour-ibm-i\/","name":"DevSecOps pour IBM i (AS\/400 ou AS400)","isPartOf":{"@id":"https:\/\/www.arcadsoftware.com\/arcad\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.arcadsoftware.fr\/arcad\/solutions-fr\/devsecops-pour-ibm-i\/#primaryimage"},"image":{"@id":"https:\/\/www.arcadsoftware.fr\/arcad\/solutions-fr\/devsecops-pour-ibm-i\/#primaryimage"},"thumbnailUrl":"https:\/\/www.arcadsoftware.fr\/arcad\/wp-content\/uploads\/2021\/06\/picto-solution-devsecops-1.png","datePublished":"2021-06-11T08:12:04+00:00","dateModified":"2024-06-13T13:46:23+00:00","description":"D\u00e9couvrez comment DevSecOps permet de d\u00e9ployer plus rapidement des logiciels de meilleure qualit\u00e9 sur IBM i (alias AS\/400 ou AS400).","breadcrumb":{"@id":"https:\/\/www.arcadsoftware.fr\/arcad\/solutions-fr\/devsecops-pour-ibm-i\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.arcadsoftware.fr\/arcad\/solutions-fr\/devsecops-pour-ibm-i\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.arcadsoftware.fr\/arcad\/solutions-fr\/devsecops-pour-ibm-i\/#primaryimage","url":"https:\/\/www.arcadsoftware.fr\/arcad\/wp-content\/uploads\/2021\/06\/picto-solution-devsecops-1.png","contentUrl":"https:\/\/www.arcadsoftware.fr\/arcad\/wp-content\/uploads\/2021\/06\/picto-solution-devsecops-1.png","width":1186,"height":492,"caption":"DevSecOps for IBM i Solution"},{"@type":"BreadcrumbList","@id":"https:\/\/www.arcadsoftware.fr\/arcad\/solutions-fr\/devsecops-pour-ibm-i\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"ARCAD","item":"https:\/\/www.arcadsoftware.com\/arcad\/"},{"@type":"ListItem","position":2,"name":"Solutions","item":"https:\/\/www.arcadsoftware.fr\/arcad\/solutions-fr\/"},{"@type":"ListItem","position":3,"name":"DevSecOps pour IBM i"}]},{"@type":"WebSite","@id":"https:\/\/www.arcadsoftware.com\/arcad\/#website","url":"https:\/\/www.arcadsoftware.com\/arcad\/","name":"ARCAD","description":"Experts DevOps &amp; Modernisation sur IBM i (alias AS\/400 ou AS400)","publisher":{"@id":"https:\/\/www.arcadsoftware.com\/arcad\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.arcadsoftware.com\/arcad\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.arcadsoftware.com\/arcad\/#organization","name":"ARCAD Software","url":"https:\/\/www.arcadsoftware.com\/arcad\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.arcadsoftware.com\/arcad\/#\/schema\/logo\/image\/","url":"https:\/\/www.arcadsoftware.com\/arcad\/wp-content\/uploads\/2017\/09\/arcad-group-logo-text-144.png","contentUrl":"https:\/\/www.arcadsoftware.com\/arcad\/wp-content\/uploads\/2017\/09\/arcad-group-logo-text-144.png","width":144,"height":200,"caption":"ARCAD Software"},"image":{"@id":"https:\/\/www.arcadsoftware.com\/arcad\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/pages\/Arcad-Software\/116086138469235","https:\/\/x.com\/arcad_software","https:\/\/www.linkedin.com\/company\/arcad-software","https:\/\/www.youtube.com\/user\/ARCADSoftwareInc"]}]}},"_links":{"self":[{"href":"https:\/\/www.arcadsoftware.fr\/arcad\/wp-json\/wp\/v2\/pages\/45668","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.arcadsoftware.fr\/arcad\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.arcadsoftware.fr\/arcad\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.arcadsoftware.fr\/arcad\/wp-json\/wp\/v2\/users\/16"}],"replies":[{"embeddable":true,"href":"https:\/\/www.arcadsoftware.fr\/arcad\/wp-json\/wp\/v2\/comments?post=45668"}],"version-history":[{"count":4,"href":"https:\/\/www.arcadsoftware.fr\/arcad\/wp-json\/wp\/v2\/pages\/45668\/revisions"}],"predecessor-version":[{"id":68674,"href":"https:\/\/www.arcadsoftware.fr\/arcad\/wp-json\/wp\/v2\/pages\/45668\/revisions\/68674"}],"up":[{"embeddable":true,"href":"https:\/\/www.arcadsoftware.fr\/arcad\/wp-json\/wp\/v2\/pages\/22731"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.arcadsoftware.fr\/arcad\/wp-json\/wp\/v2\/media\/44505"}],"wp:attachment":[{"href":"https:\/\/www.arcadsoftware.fr\/arcad\/wp-json\/wp\/v2\/media?parent=45668"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}