{"id":7030,"date":"2023-07-27T09:39:17","date_gmt":"2023-07-27T09:39:17","guid":{"rendered":"https:\/\/redingtongroup.com\/mea\/?p=7030"},"modified":"2023-07-27T09:39:17","modified_gmt":"2023-07-27T09:39:17","slug":"managing-software-security-by-migrating-to-micro-focus-fortify-solution","status":"publish","type":"post","link":"https:\/\/redingtongroup.com\/mea\/cases-study\/managing-software-security-by-migrating-to-micro-focus-fortify-solution\/","title":{"rendered":"Managing Software Security by Migrating to Micro Focus Fortify Solution"},"content":{"rendered":"<div class=\"study-short\" style=\"padding-left: 10px\">\n<ul>\n<li><span class=\"sub-title\">Region <\/span> MEA<\/li>\n<li><span class=\"sub-title\">Industry<\/span>Telecom<\/li>\n<li>\n      <span class=\"sub-title\">Overview<\/span><\/p>\n<ul class=\"inner-lists\">\n<li>A leading telecom provider in Kuwait needed to automate application security testing with visibility across the entire AppSec program. The client faces major issues with DevOps and getting inter-departmental approvals for integrations and automation. Redington partner, Paramount Computer Systems (KCS) Kuwait, analyzed the set requirements and offered the Micro Focus fortify solution to solve the client\u2019s challenges. KCS deployed the solution and automated it based on the customer\u2019s expectations. The implementation took two weeks and included multiple workshops for the company. <\/li>\n<li>\n      <span class=\"sub-title\">Objective<\/span> To automate application security testing and secure application development program\n<\/li>\n<li>\n      <span class=\"sub-title\">Challenges <\/span><\/p>\n<ul class=\"inner-lists\">\n<li>Automate application security testing\n<\/li>\n<li>Secure application development program\n<\/li>\n<li>Identify and remedy vulnerabilities in the applications\n<\/li>\n<\/ul>\n<\/li>\n<li>\n      <span class=\"sub-title\">Outcomes<\/span><\/p>\n<ul class=\"inner-lists\">\n<li>Solution covered entire software lifecycle\n<\/li>\n<li>Vulnerabilities eliminated\n<\/li>\n<li>Secure software built\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Region MEA IndustryTelecom Overview A leading telecom provider in Kuwait needed to automate application security testing with visibility across the [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":7096,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"categories":[112,2,116,105],"tags":[],"class_list":["post-7030","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-by-technology","category-cases-study","category-cyber-security","category-solution"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Managing Software Security by Migrating to Micro Focus Fortify Solution - Middle East<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/redingtongroup.com\/mea\/cases-study\/managing-software-security-by-migrating-to-micro-focus-fortify-solution\/\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Ritika\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/redingtongroup.com\/mea\/cases-study\/managing-software-security-by-migrating-to-micro-focus-fortify-solution\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/redingtongroup.com\/mea\/cases-study\/managing-software-security-by-migrating-to-micro-focus-fortify-solution\/\"},\"author\":{\"name\":\"Ritika\",\"@id\":\"https:\/\/redingtongroup.com\/mea\/#\/schema\/person\/60fb2ae4efa2cad954010daf69b819c2\"},\"headline\":\"Managing Software Security by Migrating to Micro Focus Fortify Solution\",\"datePublished\":\"2023-07-27T09:39:17+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/redingtongroup.com\/mea\/cases-study\/managing-software-security-by-migrating-to-micro-focus-fortify-solution\/\"},\"wordCount\":135,\"publisher\":{\"@id\":\"https:\/\/redingtongroup.com\/mea\/#organization\"},\"image\":{\"@id\":\"https:\/\/redingtongroup.com\/mea\/cases-study\/managing-software-security-by-migrating-to-micro-focus-fortify-solution\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/redingtongroup.com\/mea\/wp-content\/uploads\/sites\/2\/2023\/07\/34_shutterstock_2267909171.png\",\"articleSection\":[\"By Technology\",\"Case Study\",\"Cyber Security\",\"Solution\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/redingtongroup.com\/mea\/cases-study\/managing-software-security-by-migrating-to-micro-focus-fortify-solution\/\",\"url\":\"https:\/\/redingtongroup.com\/mea\/cases-study\/managing-software-security-by-migrating-to-micro-focus-fortify-solution\/\",\"name\":\"Managing Software Security by Migrating to Micro Focus Fortify Solution - Middle East\",\"isPartOf\":{\"@id\":\"https:\/\/redingtongroup.com\/mea\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/redingtongroup.com\/mea\/cases-study\/managing-software-security-by-migrating-to-micro-focus-fortify-solution\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/redingtongroup.com\/mea\/cases-study\/managing-software-security-by-migrating-to-micro-focus-fortify-solution\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/redingtongroup.com\/mea\/wp-content\/uploads\/sites\/2\/2023\/07\/34_shutterstock_2267909171.png\",\"datePublished\":\"2023-07-27T09:39:17+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/redingtongroup.com\/mea\/cases-study\/managing-software-security-by-migrating-to-micro-focus-fortify-solution\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/redingtongroup.com\/mea\/cases-study\/managing-software-security-by-migrating-to-micro-focus-fortify-solution\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/redingtongroup.com\/mea\/cases-study\/managing-software-security-by-migrating-to-micro-focus-fortify-solution\/#primaryimage\",\"url\":\"https:\/\/redingtongroup.com\/mea\/wp-content\/uploads\/sites\/2\/2023\/07\/34_shutterstock_2267909171.png\",\"contentUrl\":\"https:\/\/redingtongroup.com\/mea\/wp-content\/uploads\/sites\/2\/2023\/07\/34_shutterstock_2267909171.png\",\"width\":850,\"height\":550},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/redingtongroup.com\/mea\/cases-study\/managing-software-security-by-migrating-to-micro-focus-fortify-solution\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/redingtongroup.com\/mea\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Managing Software Security by Migrating to Micro Focus Fortify Solution\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/redingtongroup.com\/mea\/#website\",\"url\":\"https:\/\/redingtongroup.com\/mea\/\",\"name\":\"Middle East\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/redingtongroup.com\/mea\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/redingtongroup.com\/mea\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/redingtongroup.com\/mea\/#organization\",\"name\":\"Middle East\",\"url\":\"https:\/\/redingtongroup.com\/mea\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/redingtongroup.com\/mea\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/redingtongroup.com\/mea\/wp-content\/uploads\/sites\/2\/2023\/04\/logo-white.svg\",\"contentUrl\":\"https:\/\/redingtongroup.com\/mea\/wp-content\/uploads\/sites\/2\/2023\/04\/logo-white.svg\",\"caption\":\"Middle East\"},\"image\":{\"@id\":\"https:\/\/redingtongroup.com\/mea\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/redingtongroup.com\/mea\/#\/schema\/person\/60fb2ae4efa2cad954010daf69b819c2\",\"name\":\"Ritika\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/721dc7100c5131fa51190f4935252849fbb34078198248d5b364eba10b4f2e14?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/721dc7100c5131fa51190f4935252849fbb34078198248d5b364eba10b4f2e14?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/721dc7100c5131fa51190f4935252849fbb34078198248d5b364eba10b4f2e14?s=96&d=mm&r=g\",\"caption\":\"Ritika\"},\"url\":\"https:\/\/redingtongroup.com\/mea\/author\/ritika\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Managing Software Security by Migrating to Micro Focus Fortify Solution - Middle East","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/redingtongroup.com\/mea\/cases-study\/managing-software-security-by-migrating-to-micro-focus-fortify-solution\/","twitter_misc":{"Written by":"Ritika","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/redingtongroup.com\/mea\/cases-study\/managing-software-security-by-migrating-to-micro-focus-fortify-solution\/#article","isPartOf":{"@id":"https:\/\/redingtongroup.com\/mea\/cases-study\/managing-software-security-by-migrating-to-micro-focus-fortify-solution\/"},"author":{"name":"Ritika","@id":"https:\/\/redingtongroup.com\/mea\/#\/schema\/person\/60fb2ae4efa2cad954010daf69b819c2"},"headline":"Managing Software Security by Migrating to Micro Focus Fortify Solution","datePublished":"2023-07-27T09:39:17+00:00","mainEntityOfPage":{"@id":"https:\/\/redingtongroup.com\/mea\/cases-study\/managing-software-security-by-migrating-to-micro-focus-fortify-solution\/"},"wordCount":135,"publisher":{"@id":"https:\/\/redingtongroup.com\/mea\/#organization"},"image":{"@id":"https:\/\/redingtongroup.com\/mea\/cases-study\/managing-software-security-by-migrating-to-micro-focus-fortify-solution\/#primaryimage"},"thumbnailUrl":"https:\/\/redingtongroup.com\/mea\/wp-content\/uploads\/sites\/2\/2023\/07\/34_shutterstock_2267909171.png","articleSection":["By Technology","Case Study","Cyber Security","Solution"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/redingtongroup.com\/mea\/cases-study\/managing-software-security-by-migrating-to-micro-focus-fortify-solution\/","url":"https:\/\/redingtongroup.com\/mea\/cases-study\/managing-software-security-by-migrating-to-micro-focus-fortify-solution\/","name":"Managing Software Security by Migrating to Micro Focus Fortify Solution - Middle East","isPartOf":{"@id":"https:\/\/redingtongroup.com\/mea\/#website"},"primaryImageOfPage":{"@id":"https:\/\/redingtongroup.com\/mea\/cases-study\/managing-software-security-by-migrating-to-micro-focus-fortify-solution\/#primaryimage"},"image":{"@id":"https:\/\/redingtongroup.com\/mea\/cases-study\/managing-software-security-by-migrating-to-micro-focus-fortify-solution\/#primaryimage"},"thumbnailUrl":"https:\/\/redingtongroup.com\/mea\/wp-content\/uploads\/sites\/2\/2023\/07\/34_shutterstock_2267909171.png","datePublished":"2023-07-27T09:39:17+00:00","breadcrumb":{"@id":"https:\/\/redingtongroup.com\/mea\/cases-study\/managing-software-security-by-migrating-to-micro-focus-fortify-solution\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/redingtongroup.com\/mea\/cases-study\/managing-software-security-by-migrating-to-micro-focus-fortify-solution\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/redingtongroup.com\/mea\/cases-study\/managing-software-security-by-migrating-to-micro-focus-fortify-solution\/#primaryimage","url":"https:\/\/redingtongroup.com\/mea\/wp-content\/uploads\/sites\/2\/2023\/07\/34_shutterstock_2267909171.png","contentUrl":"https:\/\/redingtongroup.com\/mea\/wp-content\/uploads\/sites\/2\/2023\/07\/34_shutterstock_2267909171.png","width":850,"height":550},{"@type":"BreadcrumbList","@id":"https:\/\/redingtongroup.com\/mea\/cases-study\/managing-software-security-by-migrating-to-micro-focus-fortify-solution\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/redingtongroup.com\/mea\/"},{"@type":"ListItem","position":2,"name":"Managing Software Security by Migrating to Micro Focus Fortify Solution"}]},{"@type":"WebSite","@id":"https:\/\/redingtongroup.com\/mea\/#website","url":"https:\/\/redingtongroup.com\/mea\/","name":"Middle East","description":"","publisher":{"@id":"https:\/\/redingtongroup.com\/mea\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/redingtongroup.com\/mea\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/redingtongroup.com\/mea\/#organization","name":"Middle East","url":"https:\/\/redingtongroup.com\/mea\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/redingtongroup.com\/mea\/#\/schema\/logo\/image\/","url":"https:\/\/redingtongroup.com\/mea\/wp-content\/uploads\/sites\/2\/2023\/04\/logo-white.svg","contentUrl":"https:\/\/redingtongroup.com\/mea\/wp-content\/uploads\/sites\/2\/2023\/04\/logo-white.svg","caption":"Middle East"},"image":{"@id":"https:\/\/redingtongroup.com\/mea\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/redingtongroup.com\/mea\/#\/schema\/person\/60fb2ae4efa2cad954010daf69b819c2","name":"Ritika","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/721dc7100c5131fa51190f4935252849fbb34078198248d5b364eba10b4f2e14?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/721dc7100c5131fa51190f4935252849fbb34078198248d5b364eba10b4f2e14?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/721dc7100c5131fa51190f4935252849fbb34078198248d5b364eba10b4f2e14?s=96&d=mm&r=g","caption":"Ritika"},"url":"https:\/\/redingtongroup.com\/mea\/author\/ritika\/"}]}},"_links":{"self":[{"href":"https:\/\/redingtongroup.com\/mea\/wp-json\/wp\/v2\/posts\/7030","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/redingtongroup.com\/mea\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/redingtongroup.com\/mea\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/redingtongroup.com\/mea\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/redingtongroup.com\/mea\/wp-json\/wp\/v2\/comments?post=7030"}],"version-history":[{"count":0,"href":"https:\/\/redingtongroup.com\/mea\/wp-json\/wp\/v2\/posts\/7030\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/redingtongroup.com\/mea\/wp-json\/wp\/v2\/media\/7096"}],"wp:attachment":[{"href":"https:\/\/redingtongroup.com\/mea\/wp-json\/wp\/v2\/media?parent=7030"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/redingtongroup.com\/mea\/wp-json\/wp\/v2\/categories?post=7030"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/redingtongroup.com\/mea\/wp-json\/wp\/v2\/tags?post=7030"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}