{"id":74681,"date":"2025-10-14T15:31:27","date_gmt":"2025-10-14T13:31:27","guid":{"rendered":"https:\/\/www.arcadsoftware.com\/arcad\/?p=74681"},"modified":"2025-10-14T15:31:27","modified_gmt":"2025-10-14T13:31:27","slug":"three-things-for-ibm-i-shops-to-consider-about-devsecops","status":"publish","type":"post","link":"https:\/\/www.arcadsoftware.com\/arcad\/news-events\/arcad-press-articles\/three-things-for-ibm-i-shops-to-consider-about-devsecops\/","title":{"rendered":"Three Things For IBM i Shops To Consider About DevSecOps"},"content":{"rendered":"<div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-1 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-bottom:45px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-justify-content-center fusion-flex-content-wrap\" style=\"max-width:1248px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-0 fusion_builder_column_2_3 2_3 fusion-flex-column\" style=\"--awb-bg-blend:overlay;--awb-bg-size:cover;--awb-width-large:66.666666666667%;--awb-margin-top-large:0px;--awb-spacing-right-large:2.88%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:2.88%;--awb-width-medium:66.666666666667%;--awb-spacing-right-medium:2.88%;--awb-spacing-left-medium:2.88%;--awb-width-small:100%;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-1\"><p>Way back in the Great Recession, when money was getting tight and the technical debt was getting high, the concept of agile infrastructure evolved into DevOps, the synchronization and coordination of application development, which likes to move fast, with IT operations, which likes to have things running in a stable fashion. The idea runs counter to half of the philosophy of Facebook founder Mark Zuckerberg, who has espoused the principle to \u201cmove fast and break things.\u201d<\/p>\n<p>DevOps wants to move fast, but it most assuredly does not want to break things, and many millions of programmers and operations staff at the enterprises of the world have learned to work together in a single continuous integration\/continuous deployment workflow that is more encompassing and a lot more useful than the software change management that large enterprises started deploying to automate some aspects of their software development in the 1970s and with growing momentum in the 1980s and beyond.<\/p>\n<\/div><div style=\"text-align:center;\"><a class=\"fusion-button button-flat fusion-button-default-size button-default fusion-button-default button-1 fusion-button-default-span fusion-button-default-type\" target=\"_blank\" rel=\"noopener noreferrer\" href=\"https:\/\/www.itjungle.com\/2025\/10\/13\/three-things-for-ibm-i-shops-to-consider-about-devsecops\/\"><span class=\"fusion-button-text awb-button__text awb-button__text--default\">Read this Article<\/span><\/a><\/div><\/div><\/div><\/div><\/div>\n","protected":false},"excerpt":{"rendered":"<p>IBM i shops can strengthen DevSecOps with ARCAD\u2014secure code with CodeChecker, validate processes with Verifier, and anonymize data with DOT.<\/p>\n","protected":false},"author":16,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[29],"tags":[],"class_list":["post-74681","post","type-post","status-publish","format-standard","hentry","category-arcad-press-articles"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Three Things For IBM i Shops To Consider About DevSecOps<\/title>\n<meta name=\"description\" content=\"IBM i shops can strengthen DevSecOps with ARCAD\u2014secure code with CodeChecker, validate processes with Verifier, and anonymize data with DOT.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.arcadsoftware.com\/arcad\/news-events\/arcad-press-articles\/three-things-for-ibm-i-shops-to-consider-about-devsecops\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Three Things For IBM i Shops To Consider About DevSecOps\" \/>\n<meta property=\"og:description\" content=\"IBM i shops can strengthen DevSecOps with ARCAD\u2014secure code with CodeChecker, validate processes with Verifier, and anonymize data with DOT.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.arcadsoftware.com\/arcad\/news-events\/arcad-press-articles\/three-things-for-ibm-i-shops-to-consider-about-devsecops\/\" \/>\n<meta property=\"og:site_name\" content=\"ARCAD\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/pages\/Arcad-Software\/116086138469235\" \/>\n<meta property=\"article:published_time\" content=\"2025-10-14T13:31:27+00:00\" \/>\n<meta name=\"author\" content=\"Myriam Goutte\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Myriam Goutte\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.arcadsoftware.com\\\/arcad\\\/news-events\\\/arcad-press-articles\\\/three-things-for-ibm-i-shops-to-consider-about-devsecops\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.arcadsoftware.com\\\/arcad\\\/news-events\\\/arcad-press-articles\\\/three-things-for-ibm-i-shops-to-consider-about-devsecops\\\/\"},\"author\":{\"name\":\"Myriam Goutte\",\"@id\":\"https:\\\/\\\/www.arcadsoftware.com\\\/arcad\\\/#\\\/schema\\\/person\\\/56072f2a9491143460e3cadf23b9d730\"},\"headline\":\"Three Things For IBM i Shops To Consider About DevSecOps\",\"datePublished\":\"2025-10-14T13:31:27+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.arcadsoftware.com\\\/arcad\\\/news-events\\\/arcad-press-articles\\\/three-things-for-ibm-i-shops-to-consider-about-devsecops\\\/\"},\"wordCount\":372,\"publisher\":{\"@id\":\"https:\\\/\\\/www.arcadsoftware.com\\\/arcad\\\/#organization\"},\"articleSection\":[\"Press Articles\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.arcadsoftware.com\\\/arcad\\\/news-events\\\/arcad-press-articles\\\/three-things-for-ibm-i-shops-to-consider-about-devsecops\\\/\",\"url\":\"https:\\\/\\\/www.arcadsoftware.com\\\/arcad\\\/news-events\\\/arcad-press-articles\\\/three-things-for-ibm-i-shops-to-consider-about-devsecops\\\/\",\"name\":\"Three Things For IBM i Shops To Consider About DevSecOps\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.arcadsoftware.com\\\/arcad\\\/#website\"},\"datePublished\":\"2025-10-14T13:31:27+00:00\",\"description\":\"IBM i shops can strengthen DevSecOps with ARCAD\u2014secure code with CodeChecker, validate processes with Verifier, and anonymize data with DOT.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.arcadsoftware.com\\\/arcad\\\/news-events\\\/arcad-press-articles\\\/three-things-for-ibm-i-shops-to-consider-about-devsecops\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.arcadsoftware.com\\\/arcad\\\/news-events\\\/arcad-press-articles\\\/three-things-for-ibm-i-shops-to-consider-about-devsecops\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.arcadsoftware.com\\\/arcad\\\/news-events\\\/arcad-press-articles\\\/three-things-for-ibm-i-shops-to-consider-about-devsecops\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"ARCAD\",\"item\":\"https:\\\/\\\/www.arcadsoftware.com\\\/arcad\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Three Things For IBM i Shops To Consider About DevSecOps\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.arcadsoftware.com\\\/arcad\\\/#website\",\"url\":\"https:\\\/\\\/www.arcadsoftware.com\\\/arcad\\\/\",\"name\":\"ARCAD\",\"description\":\"Experts DevOps &amp; Modernisation sur IBM i (alias AS\\\/400 ou AS400)\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.arcadsoftware.com\\\/arcad\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.arcadsoftware.com\\\/arcad\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.arcadsoftware.com\\\/arcad\\\/#organization\",\"name\":\"ARCAD Software\",\"url\":\"https:\\\/\\\/www.arcadsoftware.com\\\/arcad\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.arcadsoftware.com\\\/arcad\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.arcadsoftware.com\\\/arcad\\\/wp-content\\\/uploads\\\/2017\\\/09\\\/arcad-group-logo-text-144.png\",\"contentUrl\":\"https:\\\/\\\/www.arcadsoftware.com\\\/arcad\\\/wp-content\\\/uploads\\\/2017\\\/09\\\/arcad-group-logo-text-144.png\",\"width\":144,\"height\":200,\"caption\":\"ARCAD Software\"},\"image\":{\"@id\":\"https:\\\/\\\/www.arcadsoftware.com\\\/arcad\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/pages\\\/Arcad-Software\\\/116086138469235\",\"https:\\\/\\\/x.com\\\/arcad_software\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/arcad-software\",\"https:\\\/\\\/www.youtube.com\\\/user\\\/ARCADSoftwareInc\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.arcadsoftware.com\\\/arcad\\\/#\\\/schema\\\/person\\\/56072f2a9491143460e3cadf23b9d730\",\"name\":\"Myriam Goutte\",\"url\":\"https:\\\/\\\/www.arcadsoftware.com\\\/arcad\\\/author\\\/myriam-goutte\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Three Things For IBM i Shops To Consider About DevSecOps","description":"IBM i shops can strengthen DevSecOps with ARCAD\u2014secure code with CodeChecker, validate processes with Verifier, and anonymize data with DOT.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.arcadsoftware.com\/arcad\/news-events\/arcad-press-articles\/three-things-for-ibm-i-shops-to-consider-about-devsecops\/","og_locale":"en_US","og_type":"article","og_title":"Three Things For IBM i Shops To Consider About DevSecOps","og_description":"IBM i shops can strengthen DevSecOps with ARCAD\u2014secure code with CodeChecker, validate processes with Verifier, and anonymize data with DOT.","og_url":"https:\/\/www.arcadsoftware.com\/arcad\/news-events\/arcad-press-articles\/three-things-for-ibm-i-shops-to-consider-about-devsecops\/","og_site_name":"ARCAD","article_publisher":"https:\/\/www.facebook.com\/pages\/Arcad-Software\/116086138469235","article_published_time":"2025-10-14T13:31:27+00:00","author":"Myriam Goutte","twitter_misc":{"Written by":"Myriam Goutte","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.arcadsoftware.com\/arcad\/news-events\/arcad-press-articles\/three-things-for-ibm-i-shops-to-consider-about-devsecops\/#article","isPartOf":{"@id":"https:\/\/www.arcadsoftware.com\/arcad\/news-events\/arcad-press-articles\/three-things-for-ibm-i-shops-to-consider-about-devsecops\/"},"author":{"name":"Myriam Goutte","@id":"https:\/\/www.arcadsoftware.com\/arcad\/#\/schema\/person\/56072f2a9491143460e3cadf23b9d730"},"headline":"Three Things For IBM i Shops To Consider About DevSecOps","datePublished":"2025-10-14T13:31:27+00:00","mainEntityOfPage":{"@id":"https:\/\/www.arcadsoftware.com\/arcad\/news-events\/arcad-press-articles\/three-things-for-ibm-i-shops-to-consider-about-devsecops\/"},"wordCount":372,"publisher":{"@id":"https:\/\/www.arcadsoftware.com\/arcad\/#organization"},"articleSection":["Press Articles"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.arcadsoftware.com\/arcad\/news-events\/arcad-press-articles\/three-things-for-ibm-i-shops-to-consider-about-devsecops\/","url":"https:\/\/www.arcadsoftware.com\/arcad\/news-events\/arcad-press-articles\/three-things-for-ibm-i-shops-to-consider-about-devsecops\/","name":"Three Things For IBM i Shops To Consider About DevSecOps","isPartOf":{"@id":"https:\/\/www.arcadsoftware.com\/arcad\/#website"},"datePublished":"2025-10-14T13:31:27+00:00","description":"IBM i shops can strengthen DevSecOps with ARCAD\u2014secure code with CodeChecker, validate processes with Verifier, and anonymize data with DOT.","breadcrumb":{"@id":"https:\/\/www.arcadsoftware.com\/arcad\/news-events\/arcad-press-articles\/three-things-for-ibm-i-shops-to-consider-about-devsecops\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.arcadsoftware.com\/arcad\/news-events\/arcad-press-articles\/three-things-for-ibm-i-shops-to-consider-about-devsecops\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.arcadsoftware.com\/arcad\/news-events\/arcad-press-articles\/three-things-for-ibm-i-shops-to-consider-about-devsecops\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"ARCAD","item":"https:\/\/www.arcadsoftware.com\/arcad\/"},{"@type":"ListItem","position":2,"name":"Three Things For IBM i Shops To Consider About DevSecOps"}]},{"@type":"WebSite","@id":"https:\/\/www.arcadsoftware.com\/arcad\/#website","url":"https:\/\/www.arcadsoftware.com\/arcad\/","name":"ARCAD","description":"Experts DevOps &amp; Modernisation sur IBM i (alias AS\/400 ou AS400)","publisher":{"@id":"https:\/\/www.arcadsoftware.com\/arcad\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.arcadsoftware.com\/arcad\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.arcadsoftware.com\/arcad\/#organization","name":"ARCAD Software","url":"https:\/\/www.arcadsoftware.com\/arcad\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.arcadsoftware.com\/arcad\/#\/schema\/logo\/image\/","url":"https:\/\/www.arcadsoftware.com\/arcad\/wp-content\/uploads\/2017\/09\/arcad-group-logo-text-144.png","contentUrl":"https:\/\/www.arcadsoftware.com\/arcad\/wp-content\/uploads\/2017\/09\/arcad-group-logo-text-144.png","width":144,"height":200,"caption":"ARCAD Software"},"image":{"@id":"https:\/\/www.arcadsoftware.com\/arcad\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/pages\/Arcad-Software\/116086138469235","https:\/\/x.com\/arcad_software","https:\/\/www.linkedin.com\/company\/arcad-software","https:\/\/www.youtube.com\/user\/ARCADSoftwareInc"]},{"@type":"Person","@id":"https:\/\/www.arcadsoftware.com\/arcad\/#\/schema\/person\/56072f2a9491143460e3cadf23b9d730","name":"Myriam Goutte","url":"https:\/\/www.arcadsoftware.com\/arcad\/author\/myriam-goutte\/"}]}},"_links":{"self":[{"href":"https:\/\/www.arcadsoftware.com\/arcad\/wp-json\/wp\/v2\/posts\/74681","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.arcadsoftware.com\/arcad\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.arcadsoftware.com\/arcad\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.arcadsoftware.com\/arcad\/wp-json\/wp\/v2\/users\/16"}],"replies":[{"embeddable":true,"href":"https:\/\/www.arcadsoftware.com\/arcad\/wp-json\/wp\/v2\/comments?post=74681"}],"version-history":[{"count":3,"href":"https:\/\/www.arcadsoftware.com\/arcad\/wp-json\/wp\/v2\/posts\/74681\/revisions"}],"predecessor-version":[{"id":74684,"href":"https:\/\/www.arcadsoftware.com\/arcad\/wp-json\/wp\/v2\/posts\/74681\/revisions\/74684"}],"wp:attachment":[{"href":"https:\/\/www.arcadsoftware.com\/arcad\/wp-json\/wp\/v2\/media?parent=74681"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.arcadsoftware.com\/arcad\/wp-json\/wp\/v2\/categories?post=74681"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.arcadsoftware.com\/arcad\/wp-json\/wp\/v2\/tags?post=74681"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}