{"id":56660,"date":"2022-05-03T16:45:10","date_gmt":"2022-05-03T14:45:10","guid":{"rendered":"https:\/\/www.arcadsoftware.com\/?page_id=56660"},"modified":"2024-06-13T15:40:24","modified_gmt":"2024-06-13T13:40:24","slug":"code-security-on-ibm-i","status":"publish","type":"page","link":"https:\/\/www.arcadsoftware.com\/arcad\/solutions\/code-security-on-ibm-i\/","title":{"rendered":"Code Security on IBM i"},"content":{"rendered":"<p><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-1 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling main-product arcad-for-ibm-i-modernization\" style=\"--awb-background-position:center top;--awb-background-blend-mode:overlay;--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-top:75px;--awb-padding-bottom:0px;--awb-padding-top-small:20px;--awb-padding-right-small:20px;--awb-padding-left-small:20px;--awb-background-image:linear-gradient(180deg, #e1edf8 0%,rgba(255,255,255,0.01) 73%);--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-stretch fusion-flex-content-wrap\" style=\"max-width:1248px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-0 fusion_builder_column_3_4 3_4 fusion-flex-column fusion-animated\" style=\"--awb-padding-top:10px;--awb-padding-bottom-small:0px;--awb-bg-size:cover;--awb-width-large:75%;--awb-margin-top-large:0px;--awb-spacing-right-large:2.56%;--awb-margin-bottom-large:30px;--awb-spacing-left-large:2.56%;--awb-width-medium:75%;--awb-order-medium:0;--awb-spacing-right-medium:2.56%;--awb-spacing-left-medium:2.56%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\" data-animationType=\"fadeInUp\" data-animationDuration=\"0.9\" data-animationOffset=\"bottom-in-view\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-image-element \" style=\"--awb-max-width:370px;--awb-caption-title-font-family:var(--h2_typography-font-family);--awb-caption-title-font-weight:var(--h2_typography-font-weight);--awb-caption-title-font-style:var(--h2_typography-font-style);--awb-caption-title-size:var(--h2_typography-font-size);--awb-caption-title-transform:var(--h2_typography-text-transform);--awb-caption-title-line-height:var(--h2_typography-line-height);--awb-caption-title-letter-spacing:var(--h2_typography-letter-spacing);\"><span class=\" fusion-imageframe imageframe-none imageframe-1 hover-type-none\"><img decoding=\"async\" width=\"400\" height=\"220\" alt=\"Code Security on IBM i\" title=\"Code Security on IBM i\" src=\"https:\/\/www.arcadsoftware.com\/arcad\/wp-content\/uploads\/2022\/05\/code-security-on-ibm-i.png\" class=\"img-responsive wp-image-56664\" srcset=\"https:\/\/www.arcadsoftware.com\/arcad\/wp-content\/uploads\/2022\/05\/code-security-on-ibm-i-200x110.png 200w, https:\/\/www.arcadsoftware.com\/arcad\/wp-content\/uploads\/2022\/05\/code-security-on-ibm-i.png 400w\" sizes=\"(max-width: 640px) 100vw, 400px\" \/><\/span><\/div><div class=\"fusion-title title fusion-title-1 fusion-sep-none fusion-title-text fusion-title-size-one\" style=\"--awb-text-color:var(--awb-color5);--awb-margin-bottom:0px;--awb-margin-top-small:10px;--awb-margin-bottom-small:0px;--awb-font-size:45px;\"><h1 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"margin:0;font-size:1em;--fontSize:45;line-height:1.16;\">Code Security on IBM i <span style=\"font-size: 18px; font-weight: 300;\">(aka AS\/400 or AS400)<\/span><\/h1><\/div><div class=\"fusion-title title fusion-title-2 fusion-sep-none fusion-title-text fusion-title-size-two\" style=\"--awb-text-color:var(--awb-color5);--awb-margin-top:0px;--awb-margin-bottom:10px;--awb-margin-top-small:0px;--awb-margin-bottom-small:0px;--awb-font-size:30px;\"><h2 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"font-family:&quot;Poppins&quot;;font-style:normal;font-weight:500;margin:0;font-size:1em;--fontSize:30;line-height:1.2;\">How to use CVEs to secure your IBM i application?<\/h2><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-2 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling main-product arcad-for-ibm-i-modernization\" style=\"--awb-background-position:center top;--awb-background-blend-mode:overlay;--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-top:0px;--awb-padding-bottom:75px;--awb-padding-top-small:20px;--awb-padding-right-small:20px;--awb-padding-bottom-small:40px;--awb-padding-left-small:20px;--awb-background-color:var(--awb-color1);--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-stretch fusion-flex-content-wrap\" style=\"max-width:1248px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-1 fusion_builder_column_2_3 2_3 fusion-flex-column solution-description\" style=\"--awb-padding-bottom-small:40px;--awb-bg-size:cover;--awb-width-large:66.666666666667%;--awb-margin-top-large:40px;--awb-spacing-right-large:2.88%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:2.88%;--awb-width-medium:66.666666666667%;--awb-order-medium:0;--awb-spacing-right-medium:2.88%;--awb-spacing-left-medium:2.88%;--awb-width-small:100%;--awb-order-small:0;--awb-margin-top-small:0px;--awb-spacing-right-small:1.92%;--awb-margin-bottom-small:0px;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-1\" style=\"--awb-font-size:18px;--awb-text-font-family:&quot;Poppins&quot;;--awb-text-font-style:normal;--awb-text-font-weight:400;\"><p>For six years, security has been the top concern for IBM i shops. Despite IBM i being one of the most secure platforms, modernization and integration with external apps and devices expose new risks like SQL injection and unsafe APIs. As IBM i applications evolve into web or microservices, a new level of security rigor is essential to protect these valuable assets.<\/p>\n<\/div><div class=\"fusion-title title fusion-title-3 fusion-sep-none fusion-title-text fusion-title-size-three\" style=\"--awb-text-color:var(--awb-color5);--awb-margin-bottom:5px;--awb-margin-top-small:10px;--awb-margin-right-small:0px;--awb-margin-bottom-small:10px;--awb-margin-left-small:0px;--awb-font-size:25px;\"><h3 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"font-family:&quot;Poppins&quot;;font-style:normal;font-weight:700;margin:0;font-size:1em;--fontSize:25;line-height:1.3;\">What are CVEs and how do they apply to IBM i applications?<\/h3><\/div><div class=\"fusion-text fusion-text-2\" style=\"--awb-font-size:18px;--awb-text-font-family:&quot;Poppins&quot;;--awb-text-font-style:normal;--awb-text-font-weight:400;\"><p>To help organizations face growing security risks, the Common Vulnerabilities and Exposures (CVE) nonprofit program was launched to catalog software vulnerabilities into a public and freely available \u201cdictionary\u201d. Each CVE lists a specific vulnerability or exposure and uses a Common Vulnerability Scoring System (CVSS) is used to evaluate the \u2018threat level\u2019.<\/p>\n<p>Each vulnerability is assigned a CVSS base score between 0.0 and 10.0 \u2014 a score of 0.0 represents no risk and 9.0 \u2013 10.0 is a\u202fcritical risk score..<\/p>\n<\/div><div class=\"fusion-title title fusion-title-4 fusion-sep-none fusion-title-text fusion-title-size-three\" style=\"--awb-text-color:var(--awb-color5);--awb-margin-bottom:5px;--awb-margin-top-small:10px;--awb-margin-right-small:0px;--awb-margin-bottom-small:10px;--awb-margin-left-small:0px;--awb-font-size:25px;\"><h3 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"font-family:&quot;Poppins&quot;;font-style:normal;font-weight:700;margin:0;font-size:1em;--fontSize:25;line-height:1.3;\">How to identify these security risks?<\/h3><\/div><div class=\"fusion-text fusion-text-3\" style=\"--awb-font-size:18px;--awb-text-font-family:&quot;Poppins&quot;;--awb-text-font-style:normal;--awb-text-font-weight:400;\"><p>DevSecOps has made security a shared responsibility throughout the entire IT lifecycle. Continuous security checks are now built-in to the application development process.<\/p>\n<p>Designed specifically for IBM i, <a href=\"\/arcad\/products\/arcad-code-checker-source-quality\/\">ARCAD CodeChecker<\/a> is a key element of any DevSecOps implementation. The tool automates the detection of security vulnerabilities in RPG and CL code. It acts as a standalone \u2018quality gate\u2019 that can plug into any DevOps cycle.<\/p>\n<p><a href=\"\/arcad\/products\/arcad-code-checker-source-quality\/\">ARCAD CodeChecker<\/a> integrates with RDi making it easy for developers to check for security flaws as they code. You can also use it with Jenkins to automate standard IBM i security checks withing a standard CI\/CD pipeline.<\/p>\n<\/div><div class=\"fusion-title title fusion-title-5 fusion-sep-none fusion-title-text fusion-title-size-three\" style=\"--awb-text-color:var(--awb-color5);--awb-margin-bottom:5px;--awb-margin-top-small:10px;--awb-margin-right-small:0px;--awb-margin-bottom-small:10px;--awb-margin-left-small:0px;--awb-font-size:25px;\"><h3 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"font-family:&quot;Poppins&quot;;font-style:normal;font-weight:700;margin:0;font-size:1em;--fontSize:25;line-height:1.3;\">How does ARCAD CodeChecker work?<\/h3><\/div><div class=\"fusion-text fusion-text-4 fusion-text-no-margin\" style=\"--awb-font-size:18px;--awb-margin-bottom:0px;--awb-text-font-family:&quot;Poppins&quot;;--awb-text-font-style:normal;--awb-text-font-weight:400;\"><p><a href=\"\/arcad\/products\/arcad-code-checker-source-quality\/\">ARCAD CodeChecker works<\/a> by analyzing source code against a set of rules, metrics, and metric models. Industry standard rules are provided out of the box which can be customized or enhanced for local requirements. Each security rule in <a href=\"\/arcad\/products\/arcad-code-checker-source-quality\/\">ARCAD CodeChecker<\/a> maps through to a single or multiple CVEs, or in some cases be independent of any CVE.<\/p>\n<p><a href=\"\/arcad\/products\/arcad-code-checker-source-quality\/\">ARCAD CodeChecker<\/a> reports on how your source code complies with, or violates, the rules defined. To help you assess your level of vulnerability or exposure and learn the appropriate corrective measures to apply, <a href=\"\/arcad\/products\/arcad-code-checker-source-quality\/\">ARCAD CodeChecker<\/a> also documents each rule violation, including:<\/p>\n<\/div><ul style=\"--awb-size:18px;--awb-margin-bottom:20px;--awb-item-padding-top:3px;--awb-item-padding-bottom:3px;--awb-iconcolor:var(--awb-color5);--awb-line-height:30.6px;--awb-icon-width:30.6px;--awb-icon-height:30.6px;--awb-icon-margin:12.6px;--awb-content-margin:43.2px;--awb-circlecolor:#ffffff;--awb-circle-yes-font-size:15.84px;\" class=\"fusion-checklist fusion-checklist-1 type-icons blue-checklist blue-checklist-right\"><li class=\"fusion-li-item\" style=\"\"><span class=\"icon-wrapper circle-yes\"><i class=\"fusion-li-icon fa-check fas\" aria-hidden=\"true\"><\/i><\/span><div class=\"fusion-li-item-content\">\n<p>description of the risk<\/p>\n<\/div><\/li><li class=\"fusion-li-item\" style=\"\"><span class=\"icon-wrapper circle-yes\"><i class=\"fusion-li-icon fa-check fas\" aria-hidden=\"true\"><\/i><\/span><div class=\"fusion-li-item-content\">\n<p>examples of compliant and non-compliant code<\/p>\n<\/div><\/li><li class=\"fusion-li-item\" style=\"\"><span class=\"icon-wrapper circle-yes\"><i class=\"fusion-li-icon fa-check fas\" aria-hidden=\"true\"><\/i><\/span><div class=\"fusion-li-item-content\">\n<p>an assessment of whether you are \u201cexposed to risk\u201d<\/p>\n<\/div><\/li><li class=\"fusion-li-item\" style=\"\"><span class=\"icon-wrapper circle-yes\"><i class=\"fusion-li-icon fa-check fas\" aria-hidden=\"true\"><\/i><\/span><div class=\"fusion-li-item-content\">\n<p>direct links through to the related CVE descriptions on the CVE\u00ae\u202fProgram\u202fwebsite<\/p>\n<\/div><\/li><\/ul><div class=\"fusion-image-element \" style=\"--awb-margin-bottom:20px;--awb-max-width:700px;--awb-caption-title-font-family:var(--h2_typography-font-family);--awb-caption-title-font-weight:var(--h2_typography-font-weight);--awb-caption-title-font-style:var(--h2_typography-font-style);--awb-caption-title-size:var(--h2_typography-font-size);--awb-caption-title-transform:var(--h2_typography-text-transform);--awb-caption-title-line-height:var(--h2_typography-line-height);--awb-caption-title-letter-spacing:var(--h2_typography-letter-spacing);\"><span class=\" fusion-imageframe imageframe-none imageframe-2 hover-type-none\"><img decoding=\"async\" width=\"1006\" height=\"598\" alt=\"ARCAD CodeChecker Compliant &amp; Non compliant code\" title=\"ARCAD CodeChecker Compliant &#038; Non compliant code\" src=\"https:\/\/www.arcadsoftware.com\/arcad\/wp-content\/uploads\/2022\/05\/arcad-codechecker-compliant-non-compliant-code.png\" class=\"img-responsive wp-image-56617\" srcset=\"https:\/\/www.arcadsoftware.com\/arcad\/wp-content\/uploads\/2022\/05\/arcad-codechecker-compliant-non-compliant-code-200x119.png 200w, https:\/\/www.arcadsoftware.com\/arcad\/wp-content\/uploads\/2022\/05\/arcad-codechecker-compliant-non-compliant-code-400x238.png 400w, https:\/\/www.arcadsoftware.com\/arcad\/wp-content\/uploads\/2022\/05\/arcad-codechecker-compliant-non-compliant-code-600x357.png 600w, https:\/\/www.arcadsoftware.com\/arcad\/wp-content\/uploads\/2022\/05\/arcad-codechecker-compliant-non-compliant-code-800x476.png 800w, https:\/\/www.arcadsoftware.com\/arcad\/wp-content\/uploads\/2022\/05\/arcad-codechecker-compliant-non-compliant-code.png 1006w\" sizes=\"(max-width: 640px) 100vw, 800px\" \/><\/span><\/div><div class=\"fusion-title title fusion-title-6 fusion-sep-none fusion-title-text fusion-title-size-three\" style=\"--awb-text-color:var(--awb-color5);--awb-margin-bottom:5px;--awb-margin-top-small:10px;--awb-margin-right-small:0px;--awb-margin-bottom-small:10px;--awb-margin-left-small:0px;--awb-font-size:25px;\"><h3 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"font-family:&quot;Poppins&quot;;font-style:normal;font-weight:700;margin:0;font-size:1em;--fontSize:25;line-height:1.3;\">How to report on security risks in your IBM i application?<\/h3><\/div><div class=\"fusion-text fusion-text-5\" style=\"--awb-font-size:18px;--awb-text-font-family:&quot;Poppins&quot;;--awb-text-font-style:normal;--awb-text-font-weight:400;\"><p><a href=\"\/arcad\/products\/arcad-code-checker-source-quality\/\">ARCAD CodeChecker<\/a> generates a campaign results report, organized by severity. According to the rulesets you have chosen for your campaign, the results report will deliver a high-level, summary view of the quality violations and security vulnerabilities identified.<\/p>\n<\/div><div class=\"fusion-image-element \" style=\"--awb-margin-bottom:20px;--awb-max-width:700px;--awb-caption-title-font-family:var(--h2_typography-font-family);--awb-caption-title-font-weight:var(--h2_typography-font-weight);--awb-caption-title-font-style:var(--h2_typography-font-style);--awb-caption-title-size:var(--h2_typography-font-size);--awb-caption-title-transform:var(--h2_typography-text-transform);--awb-caption-title-line-height:var(--h2_typography-line-height);--awb-caption-title-letter-spacing:var(--h2_typography-letter-spacing);\"><span class=\" fusion-imageframe imageframe-none imageframe-3 hover-type-none\"><img decoding=\"async\" width=\"1224\" height=\"512\" alt=\"ARCAD CodeChecker Campaign Results\" title=\"ARCAD CodeChecker Campaign Results\" src=\"https:\/\/www.arcadsoftware.com\/arcad\/wp-content\/uploads\/2022\/05\/arcad-codechecker-compaign-result-report.png\" class=\"img-responsive wp-image-56645\" srcset=\"https:\/\/www.arcadsoftware.com\/arcad\/wp-content\/uploads\/2022\/05\/arcad-codechecker-compaign-result-report-200x84.png 200w, https:\/\/www.arcadsoftware.com\/arcad\/wp-content\/uploads\/2022\/05\/arcad-codechecker-compaign-result-report-400x167.png 400w, https:\/\/www.arcadsoftware.com\/arcad\/wp-content\/uploads\/2022\/05\/arcad-codechecker-compaign-result-report-600x251.png 600w, https:\/\/www.arcadsoftware.com\/arcad\/wp-content\/uploads\/2022\/05\/arcad-codechecker-compaign-result-report-800x335.png 800w, https:\/\/www.arcadsoftware.com\/arcad\/wp-content\/uploads\/2022\/05\/arcad-codechecker-compaign-result-report-1200x502.png 1200w, https:\/\/www.arcadsoftware.com\/arcad\/wp-content\/uploads\/2022\/05\/arcad-codechecker-compaign-result-report.png 1224w\" sizes=\"(max-width: 640px) 100vw, 800px\" \/><\/span><\/div><div class=\"fusion-text fusion-text-6\" style=\"--awb-font-size:18px;--awb-text-font-family:&quot;Poppins&quot;;--awb-text-font-style:normal;--awb-text-font-weight:400;\"><p>Click from the report to specific rule documentation to understand the cause of the violation and the recommended course of action, including external CVE links.<\/p>\n<p>The security results report gives an easy and rapid way to determine \u201cam I at risk?\u201d and prove your compliance to both industry-wide and local coding standards on IBM i.<\/p>\n<\/div><div class=\"fusion-title title fusion-title-7 fusion-sep-none fusion-title-text fusion-title-size-three\" style=\"--awb-text-color:var(--awb-color5);--awb-margin-bottom:5px;--awb-margin-top-small:10px;--awb-margin-right-small:0px;--awb-margin-bottom-small:10px;--awb-margin-left-small:0px;--awb-font-size:25px;\"><h3 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"font-family:&quot;Poppins&quot;;font-style:normal;font-weight:700;margin:0;font-size:1em;--fontSize:25;line-height:1.3;\">How can I anticipate the security risks I face?<\/h3><\/div><div class=\"fusion-text fusion-text-7\" style=\"--awb-font-size:18px;--awb-text-font-family:&quot;Poppins&quot;;--awb-text-font-style:normal;--awb-text-font-weight:400;\"><p>To help you learn more about new security risks \u2013 <a href=\"\/arcad\/products\/arcad-code-checker-source-quality\/\">ARCAD CodeChecker<\/a> allows easy browsing of rule documentation, categorized by rule set.<\/p>\n<\/div><div class=\"fusion-image-element \" style=\"--awb-margin-bottom:20px;--awb-max-width:700px;--awb-caption-title-font-family:var(--h2_typography-font-family);--awb-caption-title-font-weight:var(--h2_typography-font-weight);--awb-caption-title-font-style:var(--h2_typography-font-style);--awb-caption-title-size:var(--h2_typography-font-size);--awb-caption-title-transform:var(--h2_typography-text-transform);--awb-caption-title-line-height:var(--h2_typography-line-height);--awb-caption-title-letter-spacing:var(--h2_typography-letter-spacing);\"><span class=\" fusion-imageframe imageframe-none imageframe-4 hover-type-none\"><img decoding=\"async\" width=\"1305\" height=\"787\" alt=\"ARCAD CodeChecker Rule Set\" title=\"ARCAD CodeChecker Rule Set\" src=\"https:\/\/www.arcadsoftware.com\/arcad\/wp-content\/uploads\/2022\/05\/arcad-codechecker-rule-set.png\" class=\"img-responsive wp-image-56646\" srcset=\"https:\/\/www.arcadsoftware.com\/arcad\/wp-content\/uploads\/2022\/05\/arcad-codechecker-rule-set-200x121.png 200w, https:\/\/www.arcadsoftware.com\/arcad\/wp-content\/uploads\/2022\/05\/arcad-codechecker-rule-set-400x241.png 400w, https:\/\/www.arcadsoftware.com\/arcad\/wp-content\/uploads\/2022\/05\/arcad-codechecker-rule-set-600x362.png 600w, https:\/\/www.arcadsoftware.com\/arcad\/wp-content\/uploads\/2022\/05\/arcad-codechecker-rule-set-800x482.png 800w, https:\/\/www.arcadsoftware.com\/arcad\/wp-content\/uploads\/2022\/05\/arcad-codechecker-rule-set-1200x724.png 1200w, https:\/\/www.arcadsoftware.com\/arcad\/wp-content\/uploads\/2022\/05\/arcad-codechecker-rule-set.png 1305w\" sizes=\"(max-width: 640px) 100vw, 800px\" \/><\/span><\/div><div class=\"fusion-text fusion-text-8\" style=\"--awb-font-size:18px;--awb-text-font-family:&quot;Poppins&quot;;--awb-text-font-style:normal;--awb-text-font-weight:400;\"><p>Using <a href=\"\/arcad\/products\/arcad-code-checker-source-quality\/\">ARCAD CodeChecker<\/a> rule documentation, developers can rapidly inform themselves of coding best practices on IBM i and the constructs to avoid.<\/p>\n<p>Thanks to the specific IBM i knowledge contained within <a href=\"\/arcad\/products\/arcad-code-checker-source-quality\/\">ARCAD CodeChecker<\/a> and the quick links to external CVEs, organizations can rapidly take preventive action to safeguard the security of their business-critical IBM i source code and data.<\/p>\n<\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-3 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-sizes-top:0px;--awb-border-sizes-bottom:0px;--awb-border-sizes-left:0px;--awb-border-sizes-right:0px;--awb-border-color:#d2d3d4;--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-top:50px;--awb-padding-bottom:50px;--awb-background-color:var(--awb-color5);--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:1248px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-2 fusion_builder_column_3_4 3_4 fusion-flex-column\" style=\"--awb-bg-blend:overlay;--awb-bg-size:cover;--awb-width-large:75%;--awb-margin-top-large:0px;--awb-spacing-right-large:2.56%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:2.56%;--awb-width-medium:75%;--awb-spacing-right-medium:2.56%;--awb-spacing-left-medium:2.56%;--awb-width-small:100%;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-title title fusion-title-8 fusion-sep-none fusion-title-text fusion-title-size-two\" style=\"--awb-text-color:var(--awb-color1);--awb-margin-top:0px;--awb-margin-bottom:10px;--awb-margin-top-small:10px;--awb-margin-bottom-small:10px;--awb-font-size:35px;\"><h2 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"font-family:&quot;Poppins&quot;;font-style:normal;font-weight:600;margin:0;font-size:1em;--fontSize:35;line-height:1.2;\">Get ARCAD CodeChecker!<\/h2><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-4 hundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-overflow:visible;--awb-padding-right:30px;--awb-padding-left:30px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-3 fusion_builder_column_1_1 1_1 fusion-one-full fusion-column-first fusion-column-last fusion-column-no-min-height\" style=\"--awb-bg-blend:overlay;--awb-bg-size:cover;--awb-margin-bottom:0px;\"><div class=\"fusion-column-wrapper fusion-flex-column-wrapper-legacy\"><div class=\"fusion-section-separator section-separator triangle fusion-section-separator-1\" style=\"--awb-border-bottom:1px solid var(--awb-color5);--awb-spacer-height:1px;--awb-svg-margin-left:0;--awb-svg-margin-right:0;--awb-icon-color:#0e6ace;\"><div class=\"fusion-section-separator-svg\"><div class=\"divider-candy-arrow bottom\" style=\"top:0px;border-top-color: var(--awb-color5);\"><\/div><div class=\"divider-candy bottom\" style=\"bottom:-21px;border-bottom:1px solid var(--awb-color5);border-left:1px solid var(--awb-color5);\"><\/div><\/div><div class=\"fusion-section-separator-spacer\"><div class=\"fusion-section-separator-spacer-height\"><\/div><\/div><\/div><div class=\"fusion-clearfix\"><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-5 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-top:110px;--awb-padding-bottom:60px;--awb-padding-right-small:20px;--awb-padding-left-small:20px;--awb-margin-bottom:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:1248px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-4 fusion_builder_column_1_3 1_3 fusion-flex-column fusion-animated\" style=\"--awb-padding-right:35px;--awb-padding-bottom:55px;--awb-padding-left:35px;--awb-overflow:hidden;--awb-bg-image:linear-gradient(180deg, var(--awb-color1) 15%,#437cb4 15%);--awb-bg-size:cover;--awb-border-radius:5px 5px 5px 5px;--awb-width-large:33.333333333333%;--awb-margin-top-large:0px;--awb-spacing-right-large:5.76%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:5.76%;--awb-width-medium:33.333333333333%;--awb-order-medium:0;--awb-spacing-right-medium:5.76%;--awb-spacing-left-medium:5.76%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\" data-animationType=\"fadeInLeft\" data-animationDuration=\"0.9\" data-animationOffset=\"top-into-view\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-image-element \" style=\"--awb-max-width:90px;--awb-caption-title-font-family:var(--h2_typography-font-family);--awb-caption-title-font-weight:var(--h2_typography-font-weight);--awb-caption-title-font-style:var(--h2_typography-font-style);--awb-caption-title-size:var(--h2_typography-font-size);--awb-caption-title-transform:var(--h2_typography-text-transform);--awb-caption-title-line-height:var(--h2_typography-line-height);--awb-caption-title-letter-spacing:var(--h2_typography-letter-spacing);\"><span class=\" fusion-imageframe imageframe-none imageframe-5 hover-type-none\"><img decoding=\"async\" width=\"167\" height=\"166\" alt=\"Picto ARCAD CodeChecker\" title=\"Picto ARCAD CodeChecker\" src=\"https:\/\/www.arcadsoftware.com\/arcad\/wp-content\/uploads\/2021\/05\/pictos-modules-code-checker.png\" class=\"img-responsive wp-image-43763\" srcset=\"https:\/\/www.arcadsoftware.com\/arcad\/wp-content\/uploads\/2021\/05\/pictos-modules-code-checker-66x66.png 66w, https:\/\/www.arcadsoftware.com\/arcad\/wp-content\/uploads\/2021\/05\/pictos-modules-code-checker-150x150.png 150w, https:\/\/www.arcadsoftware.com\/arcad\/wp-content\/uploads\/2021\/05\/pictos-modules-code-checker.png 167w\" sizes=\"(max-width: 167px) 100vw, 167px\" \/><\/span><\/div><div class=\"fusion-title title fusion-title-9 fusion-sep-none fusion-title-text fusion-title-size-four\" style=\"--awb-text-color:var(--awb-color1);--awb-margin-bottom:5px;--awb-margin-top-small:10px;--awb-margin-bottom-small:10px;\"><h4 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"font-family:&quot;Poppins&quot;;font-style:normal;font-weight:800;margin:0;--fontSize:24;line-height:1.36;\">ARCAD CodeChecker<\/h4><\/div><div class=\"fusion-text fusion-text-9 fusion-text-no-margin\" style=\"--awb-text-color:var(--awb-color1);--awb-margin-bottom:20px;--awb-text-font-family:&quot;Poppins&quot;;--awb-text-font-style:normal;--awb-text-font-weight:400;\"><p>Identify quality defects and security risks in your IBM i code<\/p>\n<\/div><div ><a class=\"fusion-button button-flat fusion-button-default-size button-custom fusion-button-default button-1 fusion-button-default-span fusion-button-default-type\" style=\"--button_accent_color:var(--awb-color5);--button_accent_hover_color:var(--awb-color1);--button_border_hover_color:var(--awb-color1);--button_gradient_top_color:var(--awb-color1);--button_gradient_bottom_color:var(--awb-color1);--button_gradient_top_color_hover:var(--awb-color5);--button_gradient_bottom_color_hover:var(--awb-color5);\" target=\"_self\" href=\"\/arcad\/products\/arcad-code-checker-source-quality\/\"><span class=\"fusion-button-text awb-button__text awb-button__text--default\">Discover ARCAD CodeChecker<\/span><\/a><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-5 fusion_builder_column_2_3 2_3 fusion-flex-column fusion-animated\" style=\"--awb-bg-blend:overlay;--awb-bg-size:cover;--awb-width-large:66.666666666667%;--awb-margin-top-large:30px;--awb-spacing-right-large:2.88%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:2.88%;--awb-width-medium:66.666666666667%;--awb-spacing-right-medium:2.88%;--awb-spacing-left-medium:2.88%;--awb-width-small:100%;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\" data-animationType=\"fadeInUp\" data-animationDuration=\"0.9\" data-animationDelay=\"0.3\" data-animationOffset=\"top-into-view\"><div class=\"fusion-column-wrapper fusion-flex-justify-content-center fusion-content-layout-column\"><div class=\"fusion-title title fusion-title-10 fusion-sep-none fusion-title-text fusion-title-size-four\" style=\"--awb-text-color:var(--awb-color5);--awb-margin-bottom:5px;--awb-margin-top-small:10px;--awb-margin-bottom-small:10px;\"><h4 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"font-family:&quot;Poppins&quot;;font-style:normal;font-weight:800;margin:0;--fontSize:24;line-height:1.36;\">Safeguard application security on IBM i<\/h4><\/div><ul style=\"--awb-size:18px;--awb-item-padding-top:3px;--awb-item-padding-bottom:3px;--awb-iconcolor:var(--awb-color5);--awb-line-height:30.6px;--awb-icon-width:30.6px;--awb-icon-height:30.6px;--awb-icon-margin:12.6px;--awb-content-margin:43.2px;--awb-circlecolor:#ffffff;--awb-circle-yes-font-size:15.84px;\" class=\"fusion-checklist fusion-checklist-2 type-icons blue-checklist blue-checklist-right\"><li class=\"fusion-li-item\" style=\"\"><span class=\"icon-wrapper circle-yes\"><i class=\"fusion-li-icon fa-check fas\" aria-hidden=\"true\"><\/i><\/span><div class=\"fusion-li-item-content\">\n<p>DevSecOps: detects SQL injections, vulnerable APIs, and dynamic SQL<\/p>\n<\/div><\/li><li class=\"fusion-li-item\" style=\"\"><span class=\"icon-wrapper circle-yes\"><i class=\"fusion-li-icon fa-check fas\" aria-hidden=\"true\"><\/i><\/span><div class=\"fusion-li-item-content\">\n<p>Over 100 customizable rules for code quality checking on IBM i<\/p>\n<\/div><\/li><li class=\"fusion-li-item\" style=\"\"><span class=\"icon-wrapper circle-yes\"><i class=\"fusion-li-icon fa-check fas\" aria-hidden=\"true\"><\/i><\/span><div class=\"fusion-li-item-content\">\n<p>Reduce code complexity and the risk of downtime<\/p>\n<\/div><\/li><li class=\"fusion-li-item\" style=\"\"><span class=\"icon-wrapper circle-yes\"><i class=\"fusion-li-icon fa-check fas\" aria-hidden=\"true\"><\/i><\/span><div class=\"fusion-li-item-content\">\n<p>Keep maintenance cost and timescales under control<\/p>\n<\/div><\/li><li class=\"fusion-li-item\" style=\"\"><span class=\"icon-wrapper circle-yes\"><i class=\"fusion-li-icon fa-check fas\" aria-hidden=\"true\"><\/i><\/span><div class=\"fusion-li-item-content\">\n<p>Ease the onboarding of new developers<\/p>\n<\/div><\/li><li class=\"fusion-li-item\" style=\"\"><span class=\"icon-wrapper circle-yes\"><i class=\"fusion-li-icon fa-check fas\" aria-hidden=\"true\"><\/i><\/span><div class=\"fusion-li-item-content\">\n<p>Supports code audit and continuous quality monitoring<\/p>\n<\/div><\/li><li class=\"fusion-li-item\" style=\"\"><span class=\"icon-wrapper circle-yes\"><i class=\"fusion-li-icon fa-check fas\" aria-hidden=\"true\"><\/i><\/span><div class=\"fusion-li-item-content\">\n<p>Standalone solution that can be used with any DevOps tools on IBM i<\/p>\n<\/div><\/li><li class=\"fusion-li-item\" style=\"\"><span class=\"icon-wrapper circle-yes\"><i class=\"fusion-li-icon fa-check fas\" aria-hidden=\"true\"><\/i><\/span><div class=\"fusion-li-item-content\">\n<p>Integrates with RDi, Jenkins, and SonarQube for dashboarding<\/p>\n<\/div><\/li><\/ul><\/div><\/div><\/div><\/div><div id=\"demo\" class=\"fusion-container-anchor\"><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-6 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling quick-demo-section\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-top:0px;--awb-padding-bottom:25px;--awb-padding-left:0px;--awb-padding-right-small:20px;--awb-padding-left-small:20px;--awb-margin-top:0px;--awb-margin-bottom:0px;--awb-background-image:linear-gradient(180deg, rgba(255,255,255,0) 28%,#437cb4 28%);--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:1248px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-6 fusion_builder_column_3_5 3_5 fusion-flex-column\" style=\"--awb-padding-right-small:0px;--awb-padding-left-small:0px;--awb-bg-size:cover;--awb-width-large:60%;--awb-margin-top-large:0px;--awb-spacing-right-large:3.2%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:3.2%;--awb-width-medium:60%;--awb-order-medium:0;--awb-spacing-right-medium:3.2%;--awb-spacing-left-medium:3.2%;--awb-width-small:100%;--awb-order-small:0;--awb-margin-top-small:48px;--awb-spacing-right-small:0%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-image-element \" style=\"--awb-margin-bottom-small:10px;--awb-max-width:300px;--awb-caption-title-font-family:var(--h2_typography-font-family);--awb-caption-title-font-weight:var(--h2_typography-font-weight);--awb-caption-title-font-style:var(--h2_typography-font-style);--awb-caption-title-size:var(--h2_typography-font-size);--awb-caption-title-transform:var(--h2_typography-text-transform);--awb-caption-title-line-height:var(--h2_typography-line-height);--awb-caption-title-letter-spacing:var(--h2_typography-letter-spacing);\"><span class=\" fusion-imageframe imageframe-none imageframe-6 hover-type-none\"><img decoding=\"async\" width=\"823\" height=\"754\" alt=\"Contact Us\" src=\"https:\/\/www.arcadsoftware.com\/arcad\/wp-content\/uploads\/2021\/03\/contact-us.png\" class=\"img-responsive wp-image-39320\" srcset=\"https:\/\/www.arcadsoftware.com\/arcad\/wp-content\/uploads\/2021\/03\/contact-us-200x183.png 200w, https:\/\/www.arcadsoftware.com\/arcad\/wp-content\/uploads\/2021\/03\/contact-us-400x366.png 400w, https:\/\/www.arcadsoftware.com\/arcad\/wp-content\/uploads\/2021\/03\/contact-us-600x550.png 600w, https:\/\/www.arcadsoftware.com\/arcad\/wp-content\/uploads\/2021\/03\/contact-us-800x733.png 800w, https:\/\/www.arcadsoftware.com\/arcad\/wp-content\/uploads\/2021\/03\/contact-us.png 823w\" sizes=\"(max-width: 640px) 100vw, 800px\" \/><\/span><\/div><div class=\"fusion-text fusion-text-10 fusion-text-no-margin title1\" style=\"--awb-font-size:20px;--awb-line-height:1.15;--awb-text-color:#ffffff;--awb-margin-top:30px;--awb-margin-bottom:0px;--awb-text-font-family:&quot;Poppins&quot;;--awb-text-font-style:normal;--awb-text-font-weight:200;\"><p>REQUEST A DEMO<\/p>\n<\/div><div class=\"fusion-text fusion-text-11 fusion-text-no-margin title2\" style=\"--awb-font-size:45px;--awb-line-height:1.15;--awb-text-color:#ffffff;--awb-margin-top:0px;--awb-margin-bottom:8px;--awb-text-font-family:&quot;Poppins&quot;;--awb-text-font-style:normal;--awb-text-font-weight:600;\"><p>Let\u2019s talk about your project!<\/p>\n<\/div><div class=\"fusion-text fusion-text-12 fusion-text-no-margin title3\" style=\"--awb-font-size:35px;--awb-line-height:1.15;--awb-text-color:#ffffff;--awb-margin-top:0px;--awb-margin-bottom:0px;--awb-text-font-family:&quot;Poppins&quot;;--awb-text-font-style:normal;--awb-text-font-weight:300;\"><p>Speak with an expert<\/p>\n<\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-7 fusion_builder_column_2_5 2_5 fusion-flex-column\" style=\"--awb-padding-top:40px;--awb-padding-right:40px;--awb-padding-bottom:40px;--awb-padding-left:40px;--awb-padding-right-small:20px;--awb-padding-left-small:20px;--awb-overflow:hidden;--awb-bg-color:#ffffff;--awb-bg-color-hover:#ffffff;--awb-bg-size:cover;--awb-box-shadow:3px 3px 9px 0px rgba(0,0,0,0.27);;--awb-border-radius:5px 5px 5px 5px;--awb-width-large:40%;--awb-margin-top-large:0px;--awb-spacing-right-large:4.8%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:4.8%;--awb-width-medium:40%;--awb-order-medium:0;--awb-spacing-right-medium:4.8%;--awb-spacing-left-medium:4.8%;--awb-width-small:100%;--awb-order-small:0;--awb-margin-top-small:0px;--awb-spacing-right-small:1.92%;--awb-margin-bottom-small:0px;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-title title fusion-title-11 fusion-sep-none fusion-title-text fusion-title-size-two\" style=\"--awb-text-color:var(--awb-color5);--awb-margin-bottom:0px;--awb-margin-top-small:10px;--awb-margin-bottom-small:10px;--awb-font-size:35px;\"><h2 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"font-family:&quot;Poppins&quot;;font-style:normal;font-weight:700;margin:0;font-size:1em;--fontSize:35;line-height:1.2;\">Customized Demo<\/h2><\/div><div class=\"fusion-text fusion-text-13 fusion-no-small-visibility\" style=\"--awb-font-size:25px;--awb-text-color:var(--awb-color5);--awb-margin-top:0px;--awb-text-font-family:&quot;Poppins&quot;;--awb-text-font-style:normal;--awb-text-font-weight:400;\"><p>Contact our experts<\/p>\n<\/div><!-- [if lte IE 8]><script charset=\"utf-8\" type=\"text\/javascript\" src=\"\/\/js.hsforms.net\/forms\/v2-legacy.js\"><\/script><![endif]--><script charset=\"utf-8\" type=\"text\/javascript\" src=\"\/\/js.hsforms.net\/forms\/v2.js\"><\/script><script>\n  hbspt.forms.create({\n\tportalId: \"4514828\",\n\tformId: \"6fa06969-4cac-4596-a59b-03ec1c319533\",\n      css: \"\",\n        blockedDomains: [\"freschelegacy.com\",\"freschesolutions.com\",\"rocketsoftware.com\",\"softlanding.com\",\"mkssoftware.com\",\"midrangedynamics.com\",\"remainsoftware.com\",\"taskforce-it.de\",\"origsoft.com\",\"itheis.com\",\"idinfo-conseil.com\",\"broadcom.com\",\"rs.com\",\"idinfo.eu\",\"looksoftware.com\",\"proximity.co.uk\",\"bigblue.it\",\"xhypm.com\",\"seagullsoftware.com\",\"seagullsoftware.com\",\"xcase.com\",\"comsid.de\",\"genebag.com\",\"mailo.com\",\"neuf.fr\",\"pks.de\",\"armonie.group\",\"pascalpolverini.com\",\"polverinipartners.com\",\"systnaps.com\",\"sarus.tech\",\"microfocus.com\",\"opentext.com\",\"md-na.com\",\"redbourn.co.uk\",\"omninet.be\",\"cdinvest.be\",\"cdinvest.eu\",\"ptc.com\",\"alvinecapital.co.uk\",\"katchou.eu\",\"talend.com\",\"bartech.es\"],\n      translations: {\n           en: {\n             required: \"Please fill the required field.\",\n             missingSelect: \"Please select an option.\",\n             forbiddenEmailDomain: \"Business address required\",\n             manuallyBlockedEmailDomain: \"Business address required\", \n             submitText: \"Request a demo\"\n           }\n       }\n});\n<\/script><\/div><\/div><\/div><\/div><\/div>\n<\/p>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":3,"featured_media":56664,"parent":4530,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"100-width.php","meta":{"footnotes":""},"class_list":["post-56660","page","type-page","status-publish","has-post-thumbnail","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Use CVEs to protect the security of your IBM i (aka AS400) application<\/title>\n<meta name=\"description\" content=\"Discover how to use CVEs to secure your IBM i application, what they are, and how they apply to IBM i (aka AS\/400 or AS400) applications.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.arcadsoftware.com\/arcad\/solutions\/code-security-on-ibm-i\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Use CVEs to protect the security of your IBM i (aka AS400) application\" \/>\n<meta property=\"og:description\" content=\"Discover how to use CVEs to secure your IBM i application, what they are, and how they apply to IBM i (aka AS\/400 or AS400) applications.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.arcadsoftware.com\/arcad\/solutions\/code-security-on-ibm-i\/\" \/>\n<meta property=\"og:site_name\" content=\"ARCAD\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/pages\/Arcad-Software\/116086138469235\" \/>\n<meta property=\"article:modified_time\" content=\"2024-06-13T13:40:24+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.arcadsoftware.com\/arcad\/wp-content\/uploads\/2022\/05\/code-security-on-ibm-i.png\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"220\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"13 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.arcadsoftware.com\\\/arcad\\\/solutions\\\/code-security-on-ibm-i\\\/\",\"url\":\"https:\\\/\\\/www.arcadsoftware.com\\\/arcad\\\/solutions\\\/code-security-on-ibm-i\\\/\",\"name\":\"Use CVEs to protect the security of your IBM i (aka AS400) application\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.arcadsoftware.com\\\/arcad\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.arcadsoftware.com\\\/arcad\\\/solutions\\\/code-security-on-ibm-i\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.arcadsoftware.com\\\/arcad\\\/solutions\\\/code-security-on-ibm-i\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.arcadsoftware.com\\\/arcad\\\/wp-content\\\/uploads\\\/2022\\\/05\\\/code-security-on-ibm-i.png\",\"datePublished\":\"2022-05-03T14:45:10+00:00\",\"dateModified\":\"2024-06-13T13:40:24+00:00\",\"description\":\"Discover how to use CVEs to secure your IBM i application, what they are, and how they apply to IBM i (aka AS\\\/400 or AS400) applications.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.arcadsoftware.com\\\/arcad\\\/solutions\\\/code-security-on-ibm-i\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.arcadsoftware.com\\\/arcad\\\/solutions\\\/code-security-on-ibm-i\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.arcadsoftware.com\\\/arcad\\\/solutions\\\/code-security-on-ibm-i\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.arcadsoftware.com\\\/arcad\\\/wp-content\\\/uploads\\\/2022\\\/05\\\/code-security-on-ibm-i.png\",\"contentUrl\":\"https:\\\/\\\/www.arcadsoftware.com\\\/arcad\\\/wp-content\\\/uploads\\\/2022\\\/05\\\/code-security-on-ibm-i.png\",\"width\":400,\"height\":220,\"caption\":\"Code Security on IBM i\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.arcadsoftware.com\\\/arcad\\\/solutions\\\/code-security-on-ibm-i\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"ARCAD\",\"item\":\"https:\\\/\\\/www.arcadsoftware.com\\\/arcad\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Solutions\",\"item\":\"https:\\\/\\\/www.arcadsoftware.com\\\/arcad\\\/solutions\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Code Security on IBM i\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.arcadsoftware.com\\\/arcad\\\/#website\",\"url\":\"https:\\\/\\\/www.arcadsoftware.com\\\/arcad\\\/\",\"name\":\"ARCAD\",\"description\":\"Experts DevOps &amp; Modernisation sur IBM i (alias AS\\\/400 ou AS400)\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.arcadsoftware.com\\\/arcad\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.arcadsoftware.com\\\/arcad\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.arcadsoftware.com\\\/arcad\\\/#organization\",\"name\":\"ARCAD Software\",\"url\":\"https:\\\/\\\/www.arcadsoftware.com\\\/arcad\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.arcadsoftware.com\\\/arcad\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.arcadsoftware.com\\\/arcad\\\/wp-content\\\/uploads\\\/2017\\\/09\\\/arcad-group-logo-text-144.png\",\"contentUrl\":\"https:\\\/\\\/www.arcadsoftware.com\\\/arcad\\\/wp-content\\\/uploads\\\/2017\\\/09\\\/arcad-group-logo-text-144.png\",\"width\":144,\"height\":200,\"caption\":\"ARCAD Software\"},\"image\":{\"@id\":\"https:\\\/\\\/www.arcadsoftware.com\\\/arcad\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/pages\\\/Arcad-Software\\\/116086138469235\",\"https:\\\/\\\/x.com\\\/arcad_software\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/arcad-software\",\"https:\\\/\\\/www.youtube.com\\\/user\\\/ARCADSoftwareInc\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Use CVEs to protect the security of your IBM i (aka AS400) application","description":"Discover how to use CVEs to secure your IBM i application, what they are, and how they apply to IBM i (aka AS\/400 or AS400) applications.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.arcadsoftware.com\/arcad\/solutions\/code-security-on-ibm-i\/","og_locale":"en_US","og_type":"article","og_title":"Use CVEs to protect the security of your IBM i (aka AS400) application","og_description":"Discover how to use CVEs to secure your IBM i application, what they are, and how they apply to IBM i (aka AS\/400 or AS400) applications.","og_url":"https:\/\/www.arcadsoftware.com\/arcad\/solutions\/code-security-on-ibm-i\/","og_site_name":"ARCAD","article_publisher":"https:\/\/www.facebook.com\/pages\/Arcad-Software\/116086138469235","article_modified_time":"2024-06-13T13:40:24+00:00","og_image":[{"width":400,"height":220,"url":"https:\/\/www.arcadsoftware.com\/arcad\/wp-content\/uploads\/2022\/05\/code-security-on-ibm-i.png","type":"image\/png"}],"twitter_misc":{"Est. reading time":"13 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.arcadsoftware.com\/arcad\/solutions\/code-security-on-ibm-i\/","url":"https:\/\/www.arcadsoftware.com\/arcad\/solutions\/code-security-on-ibm-i\/","name":"Use CVEs to protect the security of your IBM i (aka AS400) application","isPartOf":{"@id":"https:\/\/www.arcadsoftware.com\/arcad\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.arcadsoftware.com\/arcad\/solutions\/code-security-on-ibm-i\/#primaryimage"},"image":{"@id":"https:\/\/www.arcadsoftware.com\/arcad\/solutions\/code-security-on-ibm-i\/#primaryimage"},"thumbnailUrl":"https:\/\/www.arcadsoftware.com\/arcad\/wp-content\/uploads\/2022\/05\/code-security-on-ibm-i.png","datePublished":"2022-05-03T14:45:10+00:00","dateModified":"2024-06-13T13:40:24+00:00","description":"Discover how to use CVEs to secure your IBM i application, what they are, and how they apply to IBM i (aka AS\/400 or AS400) applications.","breadcrumb":{"@id":"https:\/\/www.arcadsoftware.com\/arcad\/solutions\/code-security-on-ibm-i\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.arcadsoftware.com\/arcad\/solutions\/code-security-on-ibm-i\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.arcadsoftware.com\/arcad\/solutions\/code-security-on-ibm-i\/#primaryimage","url":"https:\/\/www.arcadsoftware.com\/arcad\/wp-content\/uploads\/2022\/05\/code-security-on-ibm-i.png","contentUrl":"https:\/\/www.arcadsoftware.com\/arcad\/wp-content\/uploads\/2022\/05\/code-security-on-ibm-i.png","width":400,"height":220,"caption":"Code Security on IBM i"},{"@type":"BreadcrumbList","@id":"https:\/\/www.arcadsoftware.com\/arcad\/solutions\/code-security-on-ibm-i\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"ARCAD","item":"https:\/\/www.arcadsoftware.com\/arcad\/"},{"@type":"ListItem","position":2,"name":"Solutions","item":"https:\/\/www.arcadsoftware.com\/arcad\/solutions\/"},{"@type":"ListItem","position":3,"name":"Code Security on IBM i"}]},{"@type":"WebSite","@id":"https:\/\/www.arcadsoftware.com\/arcad\/#website","url":"https:\/\/www.arcadsoftware.com\/arcad\/","name":"ARCAD","description":"Experts DevOps &amp; Modernisation sur IBM i (alias AS\/400 ou AS400)","publisher":{"@id":"https:\/\/www.arcadsoftware.com\/arcad\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.arcadsoftware.com\/arcad\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.arcadsoftware.com\/arcad\/#organization","name":"ARCAD Software","url":"https:\/\/www.arcadsoftware.com\/arcad\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.arcadsoftware.com\/arcad\/#\/schema\/logo\/image\/","url":"https:\/\/www.arcadsoftware.com\/arcad\/wp-content\/uploads\/2017\/09\/arcad-group-logo-text-144.png","contentUrl":"https:\/\/www.arcadsoftware.com\/arcad\/wp-content\/uploads\/2017\/09\/arcad-group-logo-text-144.png","width":144,"height":200,"caption":"ARCAD Software"},"image":{"@id":"https:\/\/www.arcadsoftware.com\/arcad\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/pages\/Arcad-Software\/116086138469235","https:\/\/x.com\/arcad_software","https:\/\/www.linkedin.com\/company\/arcad-software","https:\/\/www.youtube.com\/user\/ARCADSoftwareInc"]}]}},"_links":{"self":[{"href":"https:\/\/www.arcadsoftware.com\/arcad\/wp-json\/wp\/v2\/pages\/56660","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.arcadsoftware.com\/arcad\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.arcadsoftware.com\/arcad\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.arcadsoftware.com\/arcad\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.arcadsoftware.com\/arcad\/wp-json\/wp\/v2\/comments?post=56660"}],"version-history":[{"count":5,"href":"https:\/\/www.arcadsoftware.com\/arcad\/wp-json\/wp\/v2\/pages\/56660\/revisions"}],"predecessor-version":[{"id":68659,"href":"https:\/\/www.arcadsoftware.com\/arcad\/wp-json\/wp\/v2\/pages\/56660\/revisions\/68659"}],"up":[{"embeddable":true,"href":"https:\/\/www.arcadsoftware.com\/arcad\/wp-json\/wp\/v2\/pages\/4530"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.arcadsoftware.com\/arcad\/wp-json\/wp\/v2\/media\/56664"}],"wp:attachment":[{"href":"https:\/\/www.arcadsoftware.com\/arcad\/wp-json\/wp\/v2\/media?parent=56660"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}