{"id":74768,"date":"2025-10-27T17:17:21","date_gmt":"2025-10-27T15:17:21","guid":{"rendered":"https:\/\/www.arcadsoftware.com\/arcad\/?p=74768"},"modified":"2026-03-18T12:10:42","modified_gmt":"2026-03-18T10:10:42","slug":"cybersecurity-a-strategic-imperative-on-ibm-i","status":"publish","type":"post","link":"https:\/\/www.arcadsoftware.com\/arcad\/news-events\/blog\/cybersecurity-a-strategic-imperative-on-ibm-i\/","title":{"rendered":"Cybersecurity: A Strategic Imperative on IBM i"},"content":{"rendered":"<p><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-1 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-right:15px;--awb-padding-left:15px;--awb-padding-right-small:20px;--awb-padding-left-small:20px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-justify-content-center fusion-flex-content-wrap\" style=\"max-width:1248px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-0 fusion_builder_column_2_3 2_3 fusion-flex-column\" style=\"--awb-bg-blend:overlay;--awb-bg-size:cover;--awb-width-large:66.666666666667%;--awb-margin-top-large:0px;--awb-spacing-right-large:2.88%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:2.88%;--awb-width-medium:66.666666666667%;--awb-spacing-right-medium:2.88%;--awb-spacing-left-medium:2.88%;--awb-width-small:100%;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-1\" style=\"--awb-content-alignment:center;--awb-font-size:14px;--awb-text-color:var(--awb-color5);--awb-text-font-family:&quot;Poppins&quot;;--awb-text-font-style:normal;--awb-text-font-weight:600;\"><p>Article written by Philippe Magne, October 23, 2025<\/p>\n<\/div><script type=\"text\/javascript\">\n(function ($) {\n  function setInnerLinks(containerID, elementClass) {\n    var $container = $('#' + containerID);\n    if (!$container.length) return;\n\n    \/\/ Emplacement du sommaire (Avada) avec repli sur le container\n    var $host = $(\"#blog-content>.fusion-builder-row>.fusion-layout-column:first-child .fusion-column-wrapper\");\n    if (!$host.length) $host = $container;\n\n    \/\/ Cr\u00e9e le bloc sommaire une seule fois\n    var $summary = $host.find('.summary');\n    if (!$summary.length) {\n      $summary = $(\"<div class='summary'><\/div>\");\n      var host = window.location.hostname.toLowerCase();\nvar tocTitle =\n  host.endsWith('.fr') ? 'Sommaire' :\n  host.endsWith('.com') ? 'Summary' :\n  ((document.documentElement.lang || '').toLowerCase().startsWith('fr') ? 'Sommaire' : 'Summary');\n\n\/\/ Insertion du titre (en texte, pas en HTML)\n$summary.append($('<h2\/>', { text: tocTitle, class: 'exclude-summary', style: 'padding-left: 25px;' }));\n      $summary.append(\"<ol id='\" + containerID + \"_links'><\/ol>\");\n      $host.prepend($summary);\n    }\n    var $list = $('#' + containerID + '_links').empty();\n\n    \/\/ Helpers: enlever la num\u00e9rotation, slug, unicit\u00e9\n    function stripLeadingEnumeration(str) {\n      var s = (str || '').trim();\n\n      \/\/ Cas 1 : \"1) Titre\", \"1. Titre\", \"1 - Titre\", \"1 \u2014 Titre\", \"1: Titre\"\n      s = s.replace(\/^\\d+\\s*[).:\\-\u2013\u2014]\\s+\/, '');\n\n      \/\/ Cas 2 : \"1.2 Titre\", \"2.3.4 Titre\" (au moins un point dans le groupe)\n      s = s.replace(\/^\\d+(?:\\.\\d+)+\\s+\/, '');\n\n      \/\/ NB : on ne retire PAS un simple nombre suivi d\u2019un espace (ex: \"2025 Roadmap\")\n      return s.trim();\n    }\n    var slugCounts = {};\n    function toSlug(str) {\n      return (str || '')\n        .toLowerCase()\n        .normalize('NFD').replace(\/[\\u0300-\\u036f]\/g, '')\n        .replace(\/[^\\w\\s-]\/g, '')\n        .trim()\n        .replace(\/\\s+\/g, '-')\n        .replace(\/-+\/g, '-');\n    }\n    function uniqueId(base) {\n      var n = (slugCounts[base] || 0) + 1;\n      slugCounts[base] = n;\n      return n === 1 ? base : base + '-' + n;\n    }\n\n    \/\/ S\u00e9lectionne les titres\n    var selector = elementClass || 'h2:not(.exclude-summary)';\n    var $headings = $container.find(selector);\n\n    $headings.each(function () {\n      var $h = $(this);\n      if ($h.hasClass('exclude-summary')) return;\n\n      \/\/ Texte pour l'affichage dans l'OL : sans la num\u00e9rotation initiale\n      var rawText = $.trim($h.text());\n      var displayText = stripLeadingEnumeration(rawText);\n\n      \/\/ ID bas\u00e9 sur le texte nettoy\u00e9 pour un slug plus propre\n      if (!$h.attr('id')) {\n        var base = toSlug(displayText || 'section');\n        var id = uniqueId(base);\n        while (document.getElementById(id)) { id = uniqueId(base); }\n        $h.attr('id', id);\n      }\n      var id = $h.attr('id');\n\n      \/\/ Focusable quand on suit l\u2019ancre\n      if (!$h.attr('tabindex')) $h.attr('tabindex', '-1');\n\n      \/\/ Ajoute l\u2019item de la liste ordonn\u00e9e (le num\u00e9ro est fourni par <ol>)\n      $list.append(\"<li><a href='#\" + id + \"'>\" + displayText + \"<\/a><\/li>\");\n    });\n\n    \/\/ Scroll fluide avec offset si header fixe\n    var $header = $('.fusion-header, .fusion-header-wrapper, header, .site-header').first();\n    var isFixed = \/fixed|sticky\/.test(($header.css('position') || ''));\n    var offset = isFixed ? ($header.outerHeight() || 0) : 0;\n\n    \/\/ D\u00e9l\u00e9gation: un seul handler pour tous les liens\n    $list.off('click.toc').on('click.toc', 'a', function (e) {\n      e.preventDefault();\n      var targetId = $(this).attr('href'); \/\/ ex: #vs-code-settings-sync\n      var $t = $(targetId);\n      if (!$t.length) return;\n\n      var y = Math.max($t.offset().top - offset, 0);\n      $('html, body').animate({ scrollTop: y }, 400);\n\n      \/\/ Met \u00e0 jour l\u2019URL sans jump\n      if (history.replaceState) history.replaceState(null, '', targetId);\n    });\n  }\n\n  \/\/ Document ready\n  $(function () {\n    setInnerLinks('blog-content', 'h2:not(.exclude-summary)');\n  });\n\n  \/\/ Optionnel: exporter la fonction\n  window.setInnerLinks = setInnerLinks;\n})(jQuery);\n<\/script>\n\n<\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-2 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-right:15px;--awb-padding-left:15px;--awb-padding-right-small:20px;--awb-padding-left-small:20px;--awb-flex-wrap:wrap;\" id=\"blog-content\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-justify-content-center fusion-flex-content-wrap\" style=\"max-width:1248px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-1 fusion_builder_column_2_3 2_3 fusion-flex-column\" style=\"--awb-bg-blend:overlay;--awb-bg-size:cover;--awb-width-large:66.666666666667%;--awb-margin-top-large:0px;--awb-spacing-right-large:2.88%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:2.88%;--awb-width-medium:100%;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-2\"><h2 class=\"\" style=\"--fontsize: 30; line-height: 1.2;\" data-fontsize=\"30\" data-lineheight=\"36px\">1. When Software Quality Becomes a Pillar of Cybersecurity<\/h2>\n<p>Cybersecurity has become a top concern for organizations of all sizes \u2014 small, medium, and large. Threats are constantly evolving, and attacks increasingly target business applications themselves.<\/p>\n<p>In this context, the <b>source code<\/b> \u2014 the heart of every information system \u2014 is both an asset and a major cybersecurity risk. A single development error can create a vulnerability that malicious actors can exploit.<\/p>\n<p>To address this reality, companies are now adopting tools capable of <b>detecting vulnerabilities as early as the development phase<\/b>, even before the code is deployed to production. This is the purpose of <b>SAST (Static Application Security Testing)<\/b> solutions, such as <a href=\"\/arcad\/products\/arcad-code-checker-source-quality\/\">CodeChecker<\/a>, ARCAD Software\u2019s static security analysis tool designed specifically for the IBM i platform.<\/p>\n<\/div><div class=\"fusion-text fusion-text-3\"><h2 class=\"fusion-responsive-typography-calculated\" style=\"--fontsize: 30; line-height: 1.2;\" data-fontsize=\"30\" data-lineheight=\"36px\">2. Software Vulnerabilities: An Often Underestimated Risk<\/h2>\n<p>Security flaws originating in source code are not necessarily due to negligence; they often result from increasing application complexity, time constraints, or a lack of security best practices.<\/p>\n<p>On IBM i environments, the issue is even more specific. Many critical applications \u2014 in banking, insurance, logistics, or manufacturing \u2014 are built on legacy programs written in <b>RPG, CLP, or DDS,<\/b> maintained for decades. These strategic applications must be <b>modernized and secured without disruption<\/b>, as part of a broader cybersecurity strategy for the organization\u2019s application assets.<\/p>\n<p>That\u2019s precisely where SAST tools come into play.<\/p>\n<\/div><div class=\"fusion-text fusion-text-4\"><h2 class=\"fusion-responsive-typography-calculated\" style=\"--fontsize: 30; line-height: 1.2;\" data-fontsize=\"30\" data-lineheight=\"36px\">3. SAST Tools: The Developer\u2019s First Line of Defense<\/h2>\n<p><b>Static Application Security Testing (SAST) <\/b>tools analyze source code to detect errors, inconsistencies, or vulnerabilities. Unlike dynamic testing (DAST), they act upstream in the <b>development lifecycle<\/b>, directly within coding environments.<\/p>\n<p>Their goal: <b>detect weaknesses as soon as they appear,<\/b> before they propagate to deployed versions. This approach aligns with the <b>DevSecOps<\/b> philosophy, which integrates security at the heart of development rather than treating it as a final step.<\/p>\n<p>Thanks to this \u201c<b>Shift Left Security<\/b>\u201d mindset, companies gain <b>reliability, responsiveness, and compliance<\/b> \u2014 all at once.<\/p>\n<\/div><div class=\"fusion-text fusion-text-5\"><h2 class=\"\" style=\"--fontsize: 30; line-height: 1.2;\" data-fontsize=\"30\" data-lineheight=\"36px\">4. CodeChecker: A SAST Built for IBM i<\/h2>\n<p>One of <a href=\"\/arcad\/products\/arcad-code-checker-source-quality\/\">CodeChecker<\/a>\u2019s greatest strengths lies in its native design for the <b>IBM i<\/b> platform. While most general-purpose security tools struggle to interpret legacy syntax, CodeChecker was <b>built to cover the full range of IBM i languages: RPG II, III, IV, ILE, Free, CLP, and DDS.<\/b><\/p>\n<p>This exhaustive coverage ensures <b>precise and relevant analysis<\/b> without false positives caused by syntax misinterpretation. CodeChecker doesn\u2019t just focus on security \u2014 it also enhances <b>code quality<\/b>, <b>compliance<\/b>, and <b>overall reliability.<\/b><\/p>\n<p>In short, it\u2019s a dual-purpose tool: <a href=\"\/arcad\/solutions\/code-security-on-ibm-i\/\">securing the code<\/a> while promoting better development practices.<\/p>\n<\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-2 fusion_builder_column_2_3 2_3 fusion-flex-column\" style=\"--awb-padding-top:25px;--awb-padding-right:40px;--awb-padding-bottom:30px;--awb-padding-left:40px;--awb-bg-image:radial-gradient(circle at center center, #daeaf65e 0%,#daeaf61a 100%);--awb-bg-size:cover;--awb-box-shadow:3px 3px 4px 0px #daeaf65e;;--awb-border-color:var(--awb-color5);--awb-border-style:solid;--awb-width-large:66.666666666667%;--awb-margin-top-large:25px;--awb-spacing-right-large:2.88%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:2.88%;--awb-width-medium:66.666666666667%;--awb-order-medium:0;--awb-spacing-right-medium:2.88%;--awb-spacing-left-medium:2.88%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-6 fusion-text-no-margin\" style=\"--awb-content-alignment:center;--awb-font-size:25px;--awb-text-color:var(--awb-color5);--awb-margin-bottom:15px;--awb-text-font-family:&quot;Poppins&quot;;--awb-text-font-style:normal;--awb-text-font-weight:800;\"><p>Identify quality defects and security risks in your IBM i code<\/p>\n<\/div><div style=\"text-align:center;\"><a class=\"fusion-button button-flat fusion-button-default-size button-custom fusion-button-default button-1 fusion-button-default-span fusion-button-default-type\" style=\"--button_accent_color:#ffffff;--button_accent_hover_color:var(--awb-color5);--button_border_hover_color:var(--awb-color5);--button_gradient_top_color:var(--awb-color5);--button_gradient_bottom_color:var(--awb-color5);--button_gradient_top_color_hover:#ffffff;--button_gradient_bottom_color_hover:#ffffff;\" target=\"_blank\" rel=\"noopener noreferrer\" data-hover=\"text_slide_up\" href=\"\/arcad\/products\/arcad-code-checker-source-quality\/\"><div class=\"awb-button-text-transition  awb-button__hover-content--centered\"><span class=\"fusion-button-text awb-button__text awb-button__text--default\">Discover CodeChecker<\/span><span class=\"fusion-button-text awb-button__text awb-button__text--default\">Discover CodeChecker<\/span><\/div><\/a><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-3 fusion_builder_column_2_3 2_3 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:66.666666666667%;--awb-margin-top-large:0px;--awb-spacing-right-large:2.88%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:2.88%;--awb-width-medium:66.666666666667%;--awb-order-medium:0;--awb-spacing-right-medium:2.88%;--awb-spacing-left-medium:2.88%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-7\"><h2 class=\"fusion-responsive-typography-calculated\" style=\"--fontsize: 30; line-height: 1.2;\" data-fontsize=\"30\" data-lineheight=\"36px\">5. Continuous Monitoring and Expert Support<\/h2>\n<p>Even the best tool isn\u2019t enough on its own. In cybersecurity, <a href=\"\/arcad\/news-events\/blog\/top-5-common-security-vulnerabilities-on-ibm-i-and-how-to-avoid-them\/\">threats evolve constantly<\/a>, and new vulnerabilities emerge every week. To remain effective, a SAST must be supported <b>by ongoing threat intelligence and updates.<\/b><\/p>\n<p>That\u2019s where <b>ARCAD Software\u2019s added value<\/b> truly shines.<\/p>\n<p>The company provides<b> a comprehensive support and monitoring service<\/b>: new threats are identified, detection rules are updated, and delivered quickly to <a href=\"\/arcad\/products\/arcad-code-checker-source-quality\/\">CodeChecker<\/a> users. This \u201c<b>tool + service<\/b>\u201d model ensures continuous protection \u2014 effortlessly.<\/p>\n<p>The value of the solution lies not only in its technology but also in the <b>human expertise and responsiveness<\/b> behind it.<\/p>\n<\/div><div class=\"fusion-text fusion-text-8\"><h2 class=\"fusion-responsive-typography-calculated\" style=\"--fontsize: 30; line-height: 1.2;\" data-fontsize=\"30\" data-lineheight=\"36px\">6. \u201cCoach, Not Cop\u201d: A Pedagogical Approach to Security<\/h2>\n<p>Controlling the code is good \u2014<b> coaching developers<\/b> is better. This is the essence of CodeChecker\u2019s \u201c<b>Coach, not Cop<\/b>\u201d philosophy. The goal isn\u2019t to penalize mistakes but to <b>train and raise awareness<\/b> among development teams continuously.<\/p>\n<p>The earlier an issue is detected, the cheaper it is to fix. That\u2019s why <a href=\"\/arcad\/products\/arcad-code-checker-source-quality\/\">CodeChecker<\/a> <b>integrates directly into IBM i developers\u2019 environments<\/b>:<\/p>\n<ul>\n<li>Native tools (<b>SEU\/PDM<\/b>),<\/li>\n<li><a href=\"\/arcad\/products\/rdi-rational-developer-for-i\/\">RDi (Rational Developer for i)<\/a>,<\/li>\n<li><a href=\"\/arcad\/vs-code-on-ibm-i-aka-as400-with-arcad-for-devops\/\">Visual Studio Code<\/a>.<\/li>\n<\/ul>\n<p>Analysis results appear in <b>context, right within the source code<\/b>, enabling quick and intuitive fixes.<\/p>\n<p>This seamless integration encourages natural adoption and strengthens the security culture within teams.<\/p>\n<\/div><div class=\"fusion-text fusion-text-9\"><h2 class=\"fusion-responsive-typography-calculated\" style=\"--fontsize: 30; line-height: 1.2;\" data-fontsize=\"30\" data-lineheight=\"36px\">7. Fast Deployment, Measurable Benefits<\/h2>\n<p>Unlike many complex security solutions, <a href=\"\/arcad\/products\/arcad-code-checker-source-quality\/\">CodeChecker<\/a> <b>is simple to deploy and use<\/b>. It comes <b>with a full set of ready-to-use security rules<\/b>, plus hundreds of <b>quality and compliance<\/b> checks.<\/p>\n<p>Organizations quickly see tangible results:<\/p>\n<ul>\n<li><b>Reduced code review time<\/b>,<\/li>\n<li><b>Fewer security incidents<\/b>,<\/li>\n<li><b>Stronger compliance<\/b> with internal or regulatory standards.<\/li>\n<\/ul>\n<p>In highly regulated sectors such as <b>banking and insurance<\/b>, where code reviews are mandatory, CodeChecker delivers <b>major time savings<\/b> and <b>stronger protection<\/b> \u2014 without slowing development.<\/p>\n<\/div><div class=\"fusion-text fusion-text-10\"><h2 class=\"fusion-responsive-typography-calculated\" style=\"--fontsize: 30; line-height: 1.2;\" data-fontsize=\"30\" data-lineheight=\"36px\">8. Conclusion: Security and Quality, Two Sides of the Same Commitment<\/h2>\n<p>In today\u2019s digital world, code reliability determines enterprise security \u2014 <b>making static analysis an essential reflex.<\/b><\/p>\n<p>For organizations running on IBM i, <b>CodeChecker<\/b> is far more than a control tool: it\u2019s a <b>trusted partner<\/b>, combining technical expertise, continuous monitoring, and human support.<\/p>\n<p>By embedding cybersecurity directly into the developer\u2019s workflow \u2014 following the \u201cCoach, not Cop\u201d approach \u2014 companies adopt a<b> preventive, efficient, and sustainable<\/b> security strategy.<\/p>\n<p>Because security isn\u2019t declared \u2014 it\u2019s built, line by line.<\/p>\n<\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-3 fusion-flex-container has-pattern-background has-mask-background nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-top:45px;--awb-padding-right-small:20px;--awb-padding-left-small:20px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-justify-content-center fusion-flex-content-wrap\" style=\"max-width:1248px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-4 fusion_builder_column_2_3 2_3 fusion-flex-column\" style=\"--awb-padding-top:25px;--awb-padding-right:25px;--awb-padding-bottom:25px;--awb-padding-left:25px;--awb-bg-color:var(--awb-color1);--awb-bg-color-hover:var(--awb-color1);--awb-bg-size:cover;--awb-box-shadow:2px 1px 4px 0px rgba(33,41,52,0.41);;--awb-width-large:66.666666666667%;--awb-margin-top-large:0px;--awb-spacing-right-large:2.88%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:2.88%;--awb-width-medium:66.666666666667%;--awb-order-medium:0;--awb-spacing-right-medium:2.88%;--awb-spacing-left-medium:2.88%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-builder-row fusion-builder-row-inner fusion-row fusion-flex-align-items-flex-start fusion-flex-justify-content-center fusion-flex-content-wrap\" style=\"--awb-flex-grow:0;--awb-flex-grow-medium:0;--awb-flex-grow-small:0;--awb-flex-shrink:0;--awb-flex-shrink-medium:0;--awb-flex-shrink-small:0;width:104% !important;max-width:104% !important;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column_inner fusion-builder-nested-column-0 fusion_builder_column_inner_1_5 1_5 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:20%;--awb-margin-top-large:0px;--awb-spacing-right-large:0%;--awb-margin-bottom-large:5px;--awb-spacing-left-large:9.6%;--awb-width-medium:20%;--awb-order-medium:0;--awb-spacing-right-medium:0%;--awb-spacing-left-medium:9.6%;--awb-width-small:20%;--awb-order-small:0;--awb-spacing-right-small:0%;--awb-margin-bottom-small:0px;--awb-spacing-left-small:9.6%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-image-element \" style=\"--awb-max-width:130px;--awb-caption-title-font-family:var(--h2_typography-font-family);--awb-caption-title-font-weight:var(--h2_typography-font-weight);--awb-caption-title-font-style:var(--h2_typography-font-style);--awb-caption-title-size:var(--h2_typography-font-size);--awb-caption-title-transform:var(--h2_typography-text-transform);--awb-caption-title-line-height:var(--h2_typography-line-height);--awb-caption-title-letter-spacing:var(--h2_typography-letter-spacing);\"><span class=\" fusion-imageframe imageframe-none imageframe-1 hover-type-none\" style=\"border-radius:50px;\"><img decoding=\"async\" width=\"500\" height=\"500\" title=\"Photo Arcad &#8211; Philippe Magne\" src=\"https:\/\/www.arcadsoftware.fr\/arcad\/wp-content\/uploads\/2025\/06\/Photo-Arcad-Philippe-Magne.png\" alt class=\"img-responsive wp-image-74137\" srcset=\"https:\/\/www.arcadsoftware.com\/arcad\/wp-content\/uploads\/2025\/06\/Photo-Arcad-Philippe-Magne-200x200.png 200w, https:\/\/www.arcadsoftware.com\/arcad\/wp-content\/uploads\/2025\/06\/Photo-Arcad-Philippe-Magne-400x400.png 400w, https:\/\/www.arcadsoftware.com\/arcad\/wp-content\/uploads\/2025\/06\/Photo-Arcad-Philippe-Magne.png 500w\" sizes=\"(max-width: 640px) 100vw, 400px\" \/><\/span><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column_inner fusion-builder-nested-column-1 fusion_builder_column_inner_4_5 4_5 fusion-flex-column fusion-flex-align-self-flex-start\" style=\"--awb-padding-left:5px;--awb-bg-size:cover;--awb-width-large:80%;--awb-margin-top-large:0px;--awb-spacing-right-large:2.4%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:2.4%;--awb-width-medium:80%;--awb-order-medium:0;--awb-spacing-right-medium:2.4%;--awb-spacing-left-medium:2.4%;--awb-width-small:80%;--awb-order-small:0;--awb-margin-top-small:0px;--awb-spacing-right-small:2.4%;--awb-spacing-left-small:2.4%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-title title fusion-title-1 fusion-sep-none fusion-title-text fusion-title-size-two\" style=\"--awb-text-color:rgba(48,135,120,0.59);--awb-margin-top:0px;--awb-margin-bottom:7px;--awb-margin-top-small:0px;--awb-margin-bottom-small:0px;--awb-font-size:13px;\"><h2 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"font-family:&quot;Poppins&quot;;font-style:normal;font-weight:500;margin:0;font-size:1em;--fontSize:13;--minFontSize:13;line-height:1.2;\">About the Author<\/h2><\/div><div class=\"fusion-title title fusion-title-2 fusion-sep-none fusion-title-text fusion-title-size-three\" style=\"--awb-text-color:var(--awb-color5);--awb-margin-top:0px;--awb-margin-bottom:0px;--awb-margin-top-small:0px;--awb-margin-bottom-small:0px;--awb-font-size:22px;\"><h3 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"font-family:&quot;Poppins&quot;;font-style:normal;font-weight:600;margin:0;font-size:1em;--fontSize:22;--minFontSize:22;line-height:1.3;\">Philippe Magne<\/h3><\/div><div class=\"fusion-title title fusion-title-3 fusion-sep-none fusion-title-text fusion-title-size-four\" style=\"--awb-text-color:var(--awb-color5);--awb-margin-top:0px;--awb-margin-bottom:5px;--awb-margin-top-small:0px;--awb-margin-bottom-small:10px;--awb-font-size:16px;\"><h4 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"font-family:&quot;Poppins&quot;;font-style:normal;font-weight:400;margin:0;font-size:1em;--fontSize:16;--minFontSize:16;line-height:1.36;\">CEO, ARCAD Software<\/h4><\/div><div class=\"fusion-text fusion-text-11 fusion-text-no-margin\" style=\"--awb-font-size:14px;--awb-line-height:1.4;--awb-margin-bottom:0px;--awb-text-font-family:&quot;Poppins&quot;;--awb-text-font-style:normal;--awb-text-font-weight:400;\"><p>Philippe Magne is CEO and Founder of ARCAD Software Group, an international software company specializing in multi-platform solutions for DevOps, application modernization, test automation and data masking. He leads the company to produce a range of comprehensive, integrated solutions, distributed by IBM worldwide. Philippe is an expert in modernization and a recognized speaker at IBM events.<\/p>\n<\/div><\/div><\/div><\/div><\/div><\/div>\n<\/div><\/div><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Strengthen the cybersecurity of your IBM i applications with CodeChecker, the SAST tool that detects vulnerabilities right from the development stage.<\/p>\n","protected":false},"author":16,"featured_media":74758,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[219],"tags":[616,369],"class_list":["post-74768","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog","tag-blog-en","tag-ibm-i-modernization"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Cybersecurity: A Strategic Imperative on IBM i<\/title>\n<meta name=\"description\" content=\"Strengthen the cybersecurity of your IBM i applications with CodeChecker, the SAST tool that detects vulnerabilities right from the development stage.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.arcadsoftware.com\/arcad\/news-events\/blog\/cybersecurity-a-strategic-imperative-on-ibm-i\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cybersecurity: A Strategic Imperative on IBM i\" \/>\n<meta property=\"og:description\" content=\"Strengthen the cybersecurity of your IBM i applications with CodeChecker, the SAST tool that detects vulnerabilities right from the development stage.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.arcadsoftware.com\/arcad\/news-events\/blog\/cybersecurity-a-strategic-imperative-on-ibm-i\/\" \/>\n<meta property=\"og:site_name\" content=\"ARCAD\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/pages\/Arcad-Software\/116086138469235\" \/>\n<meta property=\"article:published_time\" content=\"2025-10-27T15:17:21+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-18T10:10:42+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.arcadsoftware.com\/arcad\/wp-content\/uploads\/2025\/10\/cybersecurity-ibm-i.webp\" \/>\n\t<meta property=\"og:image:width\" content=\"784\" \/>\n\t<meta property=\"og:image:height\" content=\"293\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/webp\" \/>\n<meta name=\"author\" content=\"Myriam Goutte\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Myriam Goutte\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"9 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.arcadsoftware.com\\\/arcad\\\/news-events\\\/blog\\\/cybersecurity-a-strategic-imperative-on-ibm-i\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.arcadsoftware.com\\\/arcad\\\/news-events\\\/blog\\\/cybersecurity-a-strategic-imperative-on-ibm-i\\\/\"},\"author\":{\"name\":\"Myriam Goutte\",\"@id\":\"https:\\\/\\\/www.arcadsoftware.com\\\/arcad\\\/#\\\/schema\\\/person\\\/56072f2a9491143460e3cadf23b9d730\"},\"headline\":\"Cybersecurity: A Strategic Imperative on IBM i\",\"datePublished\":\"2025-10-27T15:17:21+00:00\",\"dateModified\":\"2026-03-18T10:10:42+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.arcadsoftware.com\\\/arcad\\\/news-events\\\/blog\\\/cybersecurity-a-strategic-imperative-on-ibm-i\\\/\"},\"wordCount\":2000,\"publisher\":{\"@id\":\"https:\\\/\\\/www.arcadsoftware.com\\\/arcad\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.arcadsoftware.com\\\/arcad\\\/news-events\\\/blog\\\/cybersecurity-a-strategic-imperative-on-ibm-i\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.arcadsoftware.com\\\/arcad\\\/wp-content\\\/uploads\\\/2025\\\/10\\\/cybersecurity-ibm-i.webp\",\"keywords\":[\"blog\",\"IBM i Modernization\"],\"articleSection\":[\"Blog\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.arcadsoftware.com\\\/arcad\\\/news-events\\\/blog\\\/cybersecurity-a-strategic-imperative-on-ibm-i\\\/\",\"url\":\"https:\\\/\\\/www.arcadsoftware.com\\\/arcad\\\/news-events\\\/blog\\\/cybersecurity-a-strategic-imperative-on-ibm-i\\\/\",\"name\":\"Cybersecurity: A Strategic Imperative on IBM i\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.arcadsoftware.com\\\/arcad\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.arcadsoftware.com\\\/arcad\\\/news-events\\\/blog\\\/cybersecurity-a-strategic-imperative-on-ibm-i\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.arcadsoftware.com\\\/arcad\\\/news-events\\\/blog\\\/cybersecurity-a-strategic-imperative-on-ibm-i\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.arcadsoftware.com\\\/arcad\\\/wp-content\\\/uploads\\\/2025\\\/10\\\/cybersecurity-ibm-i.webp\",\"datePublished\":\"2025-10-27T15:17:21+00:00\",\"dateModified\":\"2026-03-18T10:10:42+00:00\",\"description\":\"Strengthen the cybersecurity of your IBM i applications with CodeChecker, the SAST tool that detects vulnerabilities right from the development stage.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.arcadsoftware.com\\\/arcad\\\/news-events\\\/blog\\\/cybersecurity-a-strategic-imperative-on-ibm-i\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.arcadsoftware.com\\\/arcad\\\/news-events\\\/blog\\\/cybersecurity-a-strategic-imperative-on-ibm-i\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.arcadsoftware.com\\\/arcad\\\/news-events\\\/blog\\\/cybersecurity-a-strategic-imperative-on-ibm-i\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.arcadsoftware.com\\\/arcad\\\/wp-content\\\/uploads\\\/2025\\\/10\\\/cybersecurity-ibm-i.webp\",\"contentUrl\":\"https:\\\/\\\/www.arcadsoftware.com\\\/arcad\\\/wp-content\\\/uploads\\\/2025\\\/10\\\/cybersecurity-ibm-i.webp\",\"width\":784,\"height\":293,\"caption\":\"Cybersecurity IBM i\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.arcadsoftware.com\\\/arcad\\\/news-events\\\/blog\\\/cybersecurity-a-strategic-imperative-on-ibm-i\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"ARCAD\",\"item\":\"https:\\\/\\\/www.arcadsoftware.com\\\/arcad\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity: A Strategic Imperative on IBM i\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.arcadsoftware.com\\\/arcad\\\/#website\",\"url\":\"https:\\\/\\\/www.arcadsoftware.com\\\/arcad\\\/\",\"name\":\"ARCAD\",\"description\":\"Experts DevOps &amp; Modernisation sur IBM i (alias AS\\\/400 ou AS400)\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.arcadsoftware.com\\\/arcad\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.arcadsoftware.com\\\/arcad\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.arcadsoftware.com\\\/arcad\\\/#organization\",\"name\":\"ARCAD Software\",\"url\":\"https:\\\/\\\/www.arcadsoftware.com\\\/arcad\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.arcadsoftware.com\\\/arcad\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.arcadsoftware.com\\\/arcad\\\/wp-content\\\/uploads\\\/2017\\\/09\\\/arcad-group-logo-text-144.png\",\"contentUrl\":\"https:\\\/\\\/www.arcadsoftware.com\\\/arcad\\\/wp-content\\\/uploads\\\/2017\\\/09\\\/arcad-group-logo-text-144.png\",\"width\":144,\"height\":200,\"caption\":\"ARCAD Software\"},\"image\":{\"@id\":\"https:\\\/\\\/www.arcadsoftware.com\\\/arcad\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/pages\\\/Arcad-Software\\\/116086138469235\",\"https:\\\/\\\/x.com\\\/arcad_software\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/arcad-software\",\"https:\\\/\\\/www.youtube.com\\\/user\\\/ARCADSoftwareInc\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.arcadsoftware.com\\\/arcad\\\/#\\\/schema\\\/person\\\/56072f2a9491143460e3cadf23b9d730\",\"name\":\"Myriam Goutte\",\"url\":\"https:\\\/\\\/www.arcadsoftware.com\\\/arcad\\\/author\\\/myriam-goutte\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cybersecurity: A Strategic Imperative on IBM i","description":"Strengthen the cybersecurity of your IBM i applications with CodeChecker, the SAST tool that detects vulnerabilities right from the development stage.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.arcadsoftware.com\/arcad\/news-events\/blog\/cybersecurity-a-strategic-imperative-on-ibm-i\/","og_locale":"en_US","og_type":"article","og_title":"Cybersecurity: A Strategic Imperative on IBM i","og_description":"Strengthen the cybersecurity of your IBM i applications with CodeChecker, the SAST tool that detects vulnerabilities right from the development stage.","og_url":"https:\/\/www.arcadsoftware.com\/arcad\/news-events\/blog\/cybersecurity-a-strategic-imperative-on-ibm-i\/","og_site_name":"ARCAD","article_publisher":"https:\/\/www.facebook.com\/pages\/Arcad-Software\/116086138469235","article_published_time":"2025-10-27T15:17:21+00:00","article_modified_time":"2026-03-18T10:10:42+00:00","og_image":[{"width":784,"height":293,"url":"https:\/\/www.arcadsoftware.com\/arcad\/wp-content\/uploads\/2025\/10\/cybersecurity-ibm-i.webp","type":"image\/webp"}],"author":"Myriam Goutte","twitter_misc":{"Written by":"Myriam Goutte","Est. reading time":"9 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.arcadsoftware.com\/arcad\/news-events\/blog\/cybersecurity-a-strategic-imperative-on-ibm-i\/#article","isPartOf":{"@id":"https:\/\/www.arcadsoftware.com\/arcad\/news-events\/blog\/cybersecurity-a-strategic-imperative-on-ibm-i\/"},"author":{"name":"Myriam Goutte","@id":"https:\/\/www.arcadsoftware.com\/arcad\/#\/schema\/person\/56072f2a9491143460e3cadf23b9d730"},"headline":"Cybersecurity: A Strategic Imperative on IBM i","datePublished":"2025-10-27T15:17:21+00:00","dateModified":"2026-03-18T10:10:42+00:00","mainEntityOfPage":{"@id":"https:\/\/www.arcadsoftware.com\/arcad\/news-events\/blog\/cybersecurity-a-strategic-imperative-on-ibm-i\/"},"wordCount":2000,"publisher":{"@id":"https:\/\/www.arcadsoftware.com\/arcad\/#organization"},"image":{"@id":"https:\/\/www.arcadsoftware.com\/arcad\/news-events\/blog\/cybersecurity-a-strategic-imperative-on-ibm-i\/#primaryimage"},"thumbnailUrl":"https:\/\/www.arcadsoftware.com\/arcad\/wp-content\/uploads\/2025\/10\/cybersecurity-ibm-i.webp","keywords":["blog","IBM i Modernization"],"articleSection":["Blog"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.arcadsoftware.com\/arcad\/news-events\/blog\/cybersecurity-a-strategic-imperative-on-ibm-i\/","url":"https:\/\/www.arcadsoftware.com\/arcad\/news-events\/blog\/cybersecurity-a-strategic-imperative-on-ibm-i\/","name":"Cybersecurity: A Strategic Imperative on IBM i","isPartOf":{"@id":"https:\/\/www.arcadsoftware.com\/arcad\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.arcadsoftware.com\/arcad\/news-events\/blog\/cybersecurity-a-strategic-imperative-on-ibm-i\/#primaryimage"},"image":{"@id":"https:\/\/www.arcadsoftware.com\/arcad\/news-events\/blog\/cybersecurity-a-strategic-imperative-on-ibm-i\/#primaryimage"},"thumbnailUrl":"https:\/\/www.arcadsoftware.com\/arcad\/wp-content\/uploads\/2025\/10\/cybersecurity-ibm-i.webp","datePublished":"2025-10-27T15:17:21+00:00","dateModified":"2026-03-18T10:10:42+00:00","description":"Strengthen the cybersecurity of your IBM i applications with CodeChecker, the SAST tool that detects vulnerabilities right from the development stage.","breadcrumb":{"@id":"https:\/\/www.arcadsoftware.com\/arcad\/news-events\/blog\/cybersecurity-a-strategic-imperative-on-ibm-i\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.arcadsoftware.com\/arcad\/news-events\/blog\/cybersecurity-a-strategic-imperative-on-ibm-i\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.arcadsoftware.com\/arcad\/news-events\/blog\/cybersecurity-a-strategic-imperative-on-ibm-i\/#primaryimage","url":"https:\/\/www.arcadsoftware.com\/arcad\/wp-content\/uploads\/2025\/10\/cybersecurity-ibm-i.webp","contentUrl":"https:\/\/www.arcadsoftware.com\/arcad\/wp-content\/uploads\/2025\/10\/cybersecurity-ibm-i.webp","width":784,"height":293,"caption":"Cybersecurity IBM i"},{"@type":"BreadcrumbList","@id":"https:\/\/www.arcadsoftware.com\/arcad\/news-events\/blog\/cybersecurity-a-strategic-imperative-on-ibm-i\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"ARCAD","item":"https:\/\/www.arcadsoftware.com\/arcad\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity: A Strategic Imperative on IBM i"}]},{"@type":"WebSite","@id":"https:\/\/www.arcadsoftware.com\/arcad\/#website","url":"https:\/\/www.arcadsoftware.com\/arcad\/","name":"ARCAD","description":"Experts DevOps &amp; Modernisation sur IBM i (alias AS\/400 ou AS400)","publisher":{"@id":"https:\/\/www.arcadsoftware.com\/arcad\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.arcadsoftware.com\/arcad\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.arcadsoftware.com\/arcad\/#organization","name":"ARCAD Software","url":"https:\/\/www.arcadsoftware.com\/arcad\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.arcadsoftware.com\/arcad\/#\/schema\/logo\/image\/","url":"https:\/\/www.arcadsoftware.com\/arcad\/wp-content\/uploads\/2017\/09\/arcad-group-logo-text-144.png","contentUrl":"https:\/\/www.arcadsoftware.com\/arcad\/wp-content\/uploads\/2017\/09\/arcad-group-logo-text-144.png","width":144,"height":200,"caption":"ARCAD Software"},"image":{"@id":"https:\/\/www.arcadsoftware.com\/arcad\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/pages\/Arcad-Software\/116086138469235","https:\/\/x.com\/arcad_software","https:\/\/www.linkedin.com\/company\/arcad-software","https:\/\/www.youtube.com\/user\/ARCADSoftwareInc"]},{"@type":"Person","@id":"https:\/\/www.arcadsoftware.com\/arcad\/#\/schema\/person\/56072f2a9491143460e3cadf23b9d730","name":"Myriam Goutte","url":"https:\/\/www.arcadsoftware.com\/arcad\/author\/myriam-goutte\/"}]}},"_links":{"self":[{"href":"https:\/\/www.arcadsoftware.com\/arcad\/wp-json\/wp\/v2\/posts\/74768","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.arcadsoftware.com\/arcad\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.arcadsoftware.com\/arcad\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.arcadsoftware.com\/arcad\/wp-json\/wp\/v2\/users\/16"}],"replies":[{"embeddable":true,"href":"https:\/\/www.arcadsoftware.com\/arcad\/wp-json\/wp\/v2\/comments?post=74768"}],"version-history":[{"count":3,"href":"https:\/\/www.arcadsoftware.com\/arcad\/wp-json\/wp\/v2\/posts\/74768\/revisions"}],"predecessor-version":[{"id":75500,"href":"https:\/\/www.arcadsoftware.com\/arcad\/wp-json\/wp\/v2\/posts\/74768\/revisions\/75500"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.arcadsoftware.com\/arcad\/wp-json\/wp\/v2\/media\/74758"}],"wp:attachment":[{"href":"https:\/\/www.arcadsoftware.com\/arcad\/wp-json\/wp\/v2\/media?parent=74768"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.arcadsoftware.com\/arcad\/wp-json\/wp\/v2\/categories?post=74768"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.arcadsoftware.com\/arcad\/wp-json\/wp\/v2\/tags?post=74768"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}