{"id":3672,"date":"2020-05-11T10:49:13","date_gmt":"2020-05-11T10:49:13","guid":{"rendered":"https:\/\/ecs-et.com\/?page_id=3672"},"modified":"2020-05-11T17:22:30","modified_gmt":"2020-05-11T17:22:30","slug":"checkmarx-appsec-awareness-solution-cxcodebashing","status":"publish","type":"page","link":"https:\/\/ecs-et.com\/am\/checkmarx-appsec-awareness-solution-cxcodebashing\/","title":{"rendered":"Checkmarx AppSec Awareness Solution (CxCodebashing)"},"content":{"rendered":"<div class=\"vc_row wpb_row vc_row-fluid vc_custom_1589217709202\"><div class=\"container\"><div class=\"row\"><div class=\"wpb_column vc_column_container vc_col-sm-12\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n\t<div class=\"wpb_text_column wpb_content_element\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p>As DevOps continues along its path of domination, organizations are seeking to bring development and security teams closer together to support the release of secure software and faster time-to-market. The needs and benefits of moving security into the realm of the developer are clear \u2013 it saves time, money and company resources. However, the reality is that around 60% of developers* don\u2019t have confidence in the security of their own applications. This gap exists as developers are often underserved when it comes to security strategy. Organizations normally put developers through secure code training once a year, or at best, once a quarter, and hope that from then onwards developers will be able to get on the same page as security teams. While thisapproach \u201cchecks the training box\u201d, it doesn\u2019t not truly cultivate a sustained culture of software awareness.<\/p>\n<p>Raising AppSec awareness cannot be thought of as a distinct step in the SDLC. It\u2019s all about inserting awareness into every step of the SDLC in a manner that actually fuels faster releases. CxCodebashing was designed exactly for this reason. Through the use of open communication, ongoing engagement, gamified training, and on-the-spot remediation support, security managers can cultivate a culture of software security that empowers developers to think and act securely in their day-to-day work.<\/p>\n\n\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div><\/div><\/div><\/div><div class=\"vc_row wpb_row vc_row-fluid vc_custom_1589195239962\"><div class=\"container\"><div class=\"row\"><div class=\"wpb_column vc_column_container vc_col-sm-12\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n\t<div class=\"wpb_text_column wpb_content_element\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p>CxCodebashing\u2019s unique value:<\/p>\n\n\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div><\/div><\/div><\/div><div class=\"vc_row wpb_row vc_row-fluid custom-class custom-first-row vc_custom_1589217723394\"><div class=\"container\"><div class=\"row\"><div class=\"wpb_column vc_column_container vc_col-sm-2\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n\t<div  class=\"wpb_single_image wpb_content_element vc_align_center\">\n\t\t\n\t\t<figure class=\"wpb_wrapper vc_figure\">\n\t\t\t<div class=\"vc_single_image-wrapper   vc_box_border_grey\"><img decoding=\"async\" width=\"97\" height=\"96\" src=\"https:\/\/ecs-et.com\/wp-content\/uploads\/2020\/05\/img-2.png\" class=\"vc_single_image-img attachment-thumbnail\" alt=\"\" srcset=\"https:\/\/ecs-et.com\/wp-content\/uploads\/2020\/05\/img-2.png 97w, https:\/\/ecs-et.com\/wp-content\/uploads\/2020\/05\/img-2-90x90.png 90w\" sizes=\"(max-width: 97px) 100vw, 97px\" \/><\/div>\n\t\t<\/figure>\n\t<\/div>\n<\/div><\/div><\/div><div class=\"wpb_column vc_column_container vc_col-sm-4\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n\t<div class=\"wpb_text_column wpb_content_element\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p><strong>Leveraging Over 13 years of AppSec Experience<\/strong><br \/>\nBeing an integral part of Checkmarx, CxCodebashing<br \/>\nmakes use of real-world examples and best practices<br \/>\ngained from years of experience with over 1400<br \/>\ncustomers around the globe<\/p>\n\n\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div><div class=\"wpb_column vc_column_container vc_col-sm-2\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n\t<div  class=\"wpb_single_image wpb_content_element vc_align_center\">\n\t\t\n\t\t<figure class=\"wpb_wrapper vc_figure\">\n\t\t\t<div class=\"vc_single_image-wrapper   vc_box_border_grey\"><img decoding=\"async\" width=\"97\" height=\"96\" src=\"https:\/\/ecs-et.com\/wp-content\/uploads\/2020\/05\/img-3.png\" class=\"vc_single_image-img attachment-thumbnail\" alt=\"\" srcset=\"https:\/\/ecs-et.com\/wp-content\/uploads\/2020\/05\/img-3.png 97w, https:\/\/ecs-et.com\/wp-content\/uploads\/2020\/05\/img-3-90x90.png 90w\" sizes=\"(max-width: 97px) 100vw, 97px\" \/><\/div>\n\t\t<\/figure>\n\t<\/div>\n<\/div><\/div><\/div><div class=\"wpb_column vc_column_container vc_col-sm-4\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n\t<div class=\"wpb_text_column wpb_content_element\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p><strong>Developer-Centric<\/strong><br \/>\nDevelopers \u201cwear the hacker\u2019s hat\u201d as they see all the<br \/>\nmoving parts of the application stack that are relevant<br \/>\nto explaining the vulnerability<\/p>\n\n\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div><\/div><\/div><\/div><div class=\"vc_row wpb_row vc_row-fluid custom-class custom-second-row vc_custom_1589206927293\"><div class=\"container\"><div class=\"row\"><div class=\"wpb_column vc_column_container vc_col-sm-2\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n\t<div  class=\"wpb_single_image wpb_content_element vc_align_center\">\n\t\t\n\t\t<figure class=\"wpb_wrapper vc_figure\">\n\t\t\t<div class=\"vc_single_image-wrapper   vc_box_border_grey\"><img decoding=\"async\" width=\"97\" height=\"96\" src=\"https:\/\/ecs-et.com\/wp-content\/uploads\/2020\/05\/img-4.png\" class=\"vc_single_image-img attachment-thumbnail\" alt=\"\" srcset=\"https:\/\/ecs-et.com\/wp-content\/uploads\/2020\/05\/img-4.png 97w, https:\/\/ecs-et.com\/wp-content\/uploads\/2020\/05\/img-4-90x90.png 90w\" sizes=\"(max-width: 97px) 100vw, 97px\" \/><\/div>\n\t\t<\/figure>\n\t<\/div>\n<\/div><\/div><\/div><div class=\"wpb_column vc_column_container vc_col-sm-4\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n\t<div class=\"wpb_text_column wpb_content_element\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p><strong>Training and Beyond<\/strong><br \/>\nProviding security teams with the communication,<br \/>\nengagement, training, and assessment tools they<br \/>\nneed to execute comprehensive AppSec Awareness<br \/>\ncampaigns for developers throughout the year<\/p>\n\n\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div><div class=\"wpb_column vc_column_container vc_col-sm-2\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n\t<div  class=\"wpb_single_image wpb_content_element vc_align_center\">\n\t\t\n\t\t<figure class=\"wpb_wrapper vc_figure\">\n\t\t\t<div class=\"vc_single_image-wrapper   vc_box_border_grey\"><img loading=\"lazy\" decoding=\"async\" width=\"97\" height=\"96\" src=\"https:\/\/ecs-et.com\/wp-content\/uploads\/2020\/05\/img-5.png\" class=\"vc_single_image-img attachment-thumbnail\" alt=\"\" srcset=\"https:\/\/ecs-et.com\/wp-content\/uploads\/2020\/05\/img-5.png 97w, https:\/\/ecs-et.com\/wp-content\/uploads\/2020\/05\/img-5-90x90.png 90w\" sizes=\"(max-width: 97px) 100vw, 97px\" \/><\/div>\n\t\t<\/figure>\n\t<\/div>\n<\/div><\/div><\/div><div class=\"wpb_column vc_column_container vc_col-sm-4\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n\t<div class=\"wpb_text_column wpb_content_element\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p><strong>Built to Scale<\/strong><br \/>\nLarge enterprise teams are easily be managed and<br \/>\ntracked in CxCodebashing with drill-down dashboard<br \/>\nanalytics and built-in support for major SAML\/SSO<br \/>\nproviders<\/p>\n\n\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div><\/div><\/div><\/div><div class=\"vc_row wpb_row vc_row-fluid custom-class custom-third-row vc_custom_1589217328914\"><div class=\"container\"><div class=\"row\"><div class=\"wpb_column vc_column_container vc_col-sm-6 vc_hidden-sm vc_hidden-xs\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><div class=\"vc_btn3-container vc_btn3-center vc_custom_1589217172670\" >\n\t<a onmouseleave=\"this.style.borderColor='#222222'; this.style.backgroundColor='transparent'; this.style.color='#222222'\" onmouseenter=\"this.style.borderColor='#ec262b'; this.style.backgroundColor='#ec262b'; this.style.color='#ffffff';\" style=\"border-color:#222222; color:#222222;\" class=\"vc_general vc_btn3 vc_btn3-size-md vc_btn3-shape-rounded vc_btn3-style-outline-custom\" href=\"#\" title=\"\">View or Download Brochure<\/a><\/div>\n<\/div><\/div><\/div><div class=\"wpb_column vc_column_container vc_col-sm-2\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n\t<div  class=\"wpb_single_image wpb_content_element vc_align_center\">\n\t\t\n\t\t<figure class=\"wpb_wrapper vc_figure\">\n\t\t\t<div class=\"vc_single_image-wrapper   vc_box_border_grey\"><img loading=\"lazy\" decoding=\"async\" width=\"97\" height=\"96\" src=\"https:\/\/ecs-et.com\/wp-content\/uploads\/2020\/05\/img-6.png\" class=\"vc_single_image-img attachment-thumbnail\" alt=\"\" srcset=\"https:\/\/ecs-et.com\/wp-content\/uploads\/2020\/05\/img-6.png 97w, https:\/\/ecs-et.com\/wp-content\/uploads\/2020\/05\/img-6-90x90.png 90w\" sizes=\"(max-width: 97px) 100vw, 97px\" \/><\/div>\n\t\t<\/figure>\n\t<\/div>\n<\/div><\/div><\/div><div class=\"wpb_column vc_column_container vc_col-sm-4\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n\t<div class=\"wpb_text_column wpb_content_element\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p><strong>Just-in-Time Remediation Support<\/strong><br \/>\nVulnerabilities detected in Checkmarx Static Application<br \/>\nSecurity Testing (CxSAST) include an easy-to-follow link<br \/>\nto the relevant CxCodebashing lesson<\/p>\n\n\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div><\/div><\/div><\/div><div class=\"vc_row wpb_row vc_row-fluid custom-class custom-third-row vc_custom_1589217328914\"><div class=\"container\"><div class=\"row\"><div class=\"wpb_column vc_column_container vc_col-sm-6 vc_hidden-lg vc_hidden-md\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><div class=\"vc_btn3-container vc_btn3-center vc_custom_1589217172670\" >\n\t<a onmouseleave=\"this.style.borderColor='#222222'; this.style.backgroundColor='transparent'; this.style.color='#222222'\" onmouseenter=\"this.style.borderColor='#ec262b'; this.style.backgroundColor='#ec262b'; this.style.color='#ffffff';\" style=\"border-color:#222222; color:#222222;\" class=\"vc_general vc_btn3 vc_btn3-size-md vc_btn3-shape-rounded vc_btn3-style-outline-custom\" href=\"#\" title=\"\">View or Download Brochure<\/a><\/div>\n<\/div><\/div><\/div><\/div><\/div><\/div><div class=\"vc_row wpb_row vc_row-fluid vc_custom_1589196299609\"><div class=\"container\"><div class=\"row\"><div class=\"lappy-pic-box wpb_column vc_column_container vc_col-sm-6\"><div class=\"vc_column-inner vc_custom_1589206398324\"><div class=\"wpb_wrapper\">\n\t<div  class=\"wpb_single_image wpb_content_element vc_align_left   custom-class-laptop-black\">\n\t\t\n\t\t<figure class=\"wpb_wrapper vc_figure\">\n\t\t\t<div class=\"vc_single_image-wrapper   vc_box_border_grey\"><img loading=\"lazy\" decoding=\"async\" width=\"880\" height=\"577\" src=\"https:\/\/ecs-et.com\/wp-content\/uploads\/2020\/05\/img-1.jpg\" class=\"vc_single_image-img attachment-full\" alt=\"\" srcset=\"https:\/\/ecs-et.com\/wp-content\/uploads\/2020\/05\/img-1.jpg 880w, https:\/\/ecs-et.com\/wp-content\/uploads\/2020\/05\/img-1-300x197.jpg 300w, https:\/\/ecs-et.com\/wp-content\/uploads\/2020\/05\/img-1-768x504.jpg 768w, https:\/\/ecs-et.com\/wp-content\/uploads\/2020\/05\/img-1-351x230.jpg 351w, https:\/\/ecs-et.com\/wp-content\/uploads\/2020\/05\/img-1-570x374.jpg 570w\" sizes=\"(max-width: 880px) 100vw, 880px\" \/><\/div>\n\t\t<\/figure>\n\t<\/div>\n<\/div><\/div><\/div><div class=\"lappy-pic-box wpb_column vc_column_container vc_col-sm-6\"><div class=\"vc_column-inner vc_custom_1589206413089\"><div class=\"wpb_wrapper\">\n\t<div  class=\"wpb_single_image wpb_content_element vc_align_left\">\n\t\t\n\t\t<figure class=\"wpb_wrapper vc_figure\">\n\t\t\t<div class=\"vc_single_image-wrapper   vc_box_border_grey\"><img loading=\"lazy\" decoding=\"async\" width=\"880\" height=\"577\" src=\"https:\/\/ecs-et.com\/wp-content\/uploads\/2020\/05\/computer-1.jpg\" class=\"vc_single_image-img attachment-full\" alt=\"\" srcset=\"https:\/\/ecs-et.com\/wp-content\/uploads\/2020\/05\/computer-1.jpg 880w, https:\/\/ecs-et.com\/wp-content\/uploads\/2020\/05\/computer-1-300x197.jpg 300w, https:\/\/ecs-et.com\/wp-content\/uploads\/2020\/05\/computer-1-768x504.jpg 768w, https:\/\/ecs-et.com\/wp-content\/uploads\/2020\/05\/computer-1-351x230.jpg 351w, https:\/\/ecs-et.com\/wp-content\/uploads\/2020\/05\/computer-1-570x374.jpg 570w\" sizes=\"(max-width: 880px) 100vw, 880px\" \/><\/div>\n\t\t<\/figure>\n\t<\/div>\n<\/div><\/div><\/div><\/div><\/div><\/div><div class=\"vc_row wpb_row vc_row-fluid vc_custom_1589196356137\"><div class=\"container\"><div class=\"row\"><div class=\"wpb_column vc_column_container vc_col-sm-12\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n\t<div class=\"wpb_text_column wpb_content_element\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p><strong>Raise the AppSec bar<\/strong><br \/>\nCxCodebashing allows organization to raise the baseline AppSec knowledge across their entire development team in a fast, scalable, and positive manner. The philosophy behind the solution is to empower developers long-term, by teaching them how to think and act with a secure mindset, rather than how to solve specific issues. Security managers can create and sustain an open channel of communication, keeping developers up-to-date on AppSec news and activities. Managers have full control and visibility \u2013 they can easily assign specific programming language courses to their teams and continuously track their progress.<\/p>\n<p><strong>Learn while coding<\/strong><br \/>\nUnlike traditional classroom or video-based training, CxCodebashing is a hands-on, interactive solution that fits into developers\u2019 daily routine. Rather than spending a whole day learning about security vulnerabilities out-of-context, developers receive bite-size, on-demand sessions that are relevant to the specific challenges they are facing in their code.<\/p>\n<p><strong>Find and fix in one go<\/strong><br \/>\nCheckmarx offers a unique integration between its Static Application Security Testing (CxSAST) solution and secure coding education solution. Vulnerabilities identified by static analysis are linked to practical training lessons, providing quick and pointed remediation guidance. This teaches the developer why the problem happened, how to fix it, and, more importantly, how to prevent making the same mistake again.<\/p>\n<p><strong>Comply with regulatory standards<\/strong><br \/>\nCxCodebashing is compatible with regulatory standards such as the PCI-DSS that requires either \u201crole based security training\u201d or more specifically \u201cdeveloper security training\u201d.<\/p>\n\n\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div><\/div><\/div><\/div><div class=\"vc_row wpb_row vc_row-fluid vc_custom_1589196614327\"><div class=\"container\"><div class=\"row\"><div class=\"wpb_column vc_column_container vc_col-sm-12\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n\t<div class=\"wpb_text_column wpb_content_element\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p><strong>Supported Languages and Frameworks <\/strong><\/p>\n\n\t\t<\/div>\n\t<\/div>\n\n\t<div  class=\"wpb_single_image wpb_content_element vc_align_left\">\n\t\t\n\t\t<figure class=\"wpb_wrapper vc_figure\">\n\t\t\t<div class=\"vc_single_image-wrapper   vc_box_border_grey\"><img loading=\"lazy\" decoding=\"async\" width=\"2110\" height=\"135\" src=\"https:\/\/ecs-et.com\/wp-content\/uploads\/2020\/05\/img-7.png\" class=\"vc_single_image-img attachment-full\" alt=\"\" srcset=\"https:\/\/ecs-et.com\/wp-content\/uploads\/2020\/05\/img-7.png 2110w, https:\/\/ecs-et.com\/wp-content\/uploads\/2020\/05\/img-7-300x19.png 300w, https:\/\/ecs-et.com\/wp-content\/uploads\/2020\/05\/img-7-1024x66.png 1024w, https:\/\/ecs-et.com\/wp-content\/uploads\/2020\/05\/img-7-768x49.png 768w, https:\/\/ecs-et.com\/wp-content\/uploads\/2020\/05\/img-7-1536x98.png 1536w, https:\/\/ecs-et.com\/wp-content\/uploads\/2020\/05\/img-7-2048x131.png 2048w, https:\/\/ecs-et.com\/wp-content\/uploads\/2020\/05\/img-7-410x26.png 410w, https:\/\/ecs-et.com\/wp-content\/uploads\/2020\/05\/img-7-570x36.png 570w\" sizes=\"(max-width: 2110px) 100vw, 2110px\" \/><\/div>\n\t\t<\/figure>\n\t<\/div>\n<\/div><\/div><\/div><\/div><\/div><\/div><div class=\"vc_row wpb_row vc_row-fluid vc_custom_1589205744947\"><div class=\"container\"><div class=\"row\"><div class=\"wpb_column vc_column_container vc_col-sm-12\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n\t<div class=\"wpb_text_column wpb_content_element\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p><strong>Vulnerability Coverage<\/strong><br \/>\nCxIAST detects input related and application vulnerabilities, including the OWASP Top Ten and more.<\/p>\n\n\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div><\/div><\/div><\/div><div class=\"vc_row wpb_row vc_row-fluid vc_custom_1589217742232\"><div class=\"container\"><div class=\"row\"><div class=\"wpb_column vc_column_container vc_col-sm-4\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n\t<div class=\"wpb_text_column wpb_content_element\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p>\u2022 SQL Injection<br \/>\n\u2022 XXE Injection<br \/>\n\u2022 Command Injection<br \/>\n\u2022 Session Fixation<br \/>\n\u2022 Use of Insufficiently Random Values<br \/>\n\u2022 Reflected XSS<br \/>\n\u2022 Persistent (Stored) XSS<br \/>\n\u2022 DOM XSS<\/p>\n\n\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div><div class=\"wpb_column vc_column_container vc_col-sm-4\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n\t<div class=\"wpb_text_column wpb_content_element\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p>\u2022 Directory (Path) Traversal<br \/>\n\u2022 Privileged Interface Exposure<br \/>\n\u2022 Leftover Debug Code<br \/>\n\u2022 Authentication Credentials In URL<br \/>\n\u2022 Session Exposure within URL<br \/>\n\u2022 User Enumeration<br \/>\n\u2022 Horizontal Privilege Escalation<br \/>\n\u2022 Vertical Privilege Escalation<\/p>\n\n\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div><div class=\"wpb_column vc_column_container vc_col-sm-4\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n\t<div class=\"wpb_text_column wpb_content_element\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p>\u2022 Cross Site Request Forgery (POST)<br \/>\n\u2022 Cross Site Request Forgery (GET)<br \/>\n\u2022 Click Jacking<br \/>\n\u2022 Insecure URL Redirect<br \/>\n\u2022 Insecure TLS Validation<br \/>\n\u2022 Insecure Object Deserialization<br \/>\n\u2022 Components with Known Vulnerabilities<\/p>\n\n\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div><\/div><\/div><\/div><div class=\"vc_row wpb_row vc_row-fluid vc_custom_1589207692556\"><div class=\"container\"><div class=\"row\"><div class=\"wpb_column vc_column_container vc_col-sm-12\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><div class='delaware-section-title  delaware_title-type-2 row' >\r\n\t\t\t\t<h2 class='col-xs-12 col-sm-12 text-center title no-underline' style='font-size:36px;'>CONNECT WITH US<\/h2>\r\n\t\t\t\t<div class=\"col-xs-12 col-sm-12 text-center desc\"><div style=\"color: #222; font-size: 18px;\">Please fill out the form and send us a message. We will get back to you within 1-3 business days.<\/div>\n<\/div> \r\n\t\t\t<\/div><div class=\"dl-contact-form-7 form-light\" style=\"\">\n<div class=\"wpcf7 no-js\" id=\"wpcf7-f1168-o1\" lang=\"en-US\" dir=\"ltr\" data-wpcf7-id=\"1168\">\n<div class=\"screen-reader-response\"><p role=\"status\" aria-live=\"polite\" aria-atomic=\"true\"><\/p> <ul><\/ul><\/div>\n<form action=\"\/am\/wp-json\/wp\/v2\/pages\/3672#wpcf7-f1168-o1\" method=\"post\" class=\"wpcf7-form init\" aria-label=\"Contact form\" novalidate=\"novalidate\" data-status=\"init\" data-trp-original-action=\"\/am\/wp-json\/wp\/v2\/pages\/3672#wpcf7-f1168-o1\">\n<fieldset class=\"hidden-fields-container\"><input type=\"hidden\" name=\"_wpcf7\" value=\"1168\" \/><input type=\"hidden\" name=\"_wpcf7_version\" value=\"6.1.5\" \/><input type=\"hidden\" name=\"_wpcf7_locale\" value=\"en_US\" \/><input type=\"hidden\" name=\"_wpcf7_unit_tag\" value=\"wpcf7-f1168-o1\" \/><input type=\"hidden\" name=\"_wpcf7_container_post\" value=\"0\" \/><input type=\"hidden\" name=\"_wpcf7_posted_data_hash\" value=\"\" \/><input type=\"hidden\" name=\"_wpcf7_recaptcha_response\" value=\"\" \/>\n<\/fieldset>\n<div class=\"dl-form dl-form-2\">\n\t<div class=\"row\">\n\t\t<div class=\"col-md-6\">\n\t\t\t<p><span class=\"wpcf7-form-control-wrap\" data-name=\"your-name\"><input size=\"40\" maxlength=\"400\" class=\"wpcf7-form-control wpcf7-text wpcf7-validates-as-required\" aria-required=\"true\" aria-invalid=\"false\" placeholder=\"Full name*\" value=\"\" type=\"text\" name=\"your-name\" \/><\/span><span class=\"wpcf7-form-control-wrap\" data-name=\"your-email\"><input size=\"40\" maxlength=\"400\" class=\"wpcf7-form-control wpcf7-email wpcf7-validates-as-required wpcf7-text wpcf7-validates-as-email\" aria-required=\"true\" aria-invalid=\"false\" placeholder=\"Email Address*\" value=\"\" type=\"email\" name=\"your-email\" \/><\/span><span class=\"wpcf7-form-control-wrap\" data-name=\"your-phone\"><input size=\"40\" maxlength=\"400\" class=\"wpcf7-form-control wpcf7-text wpcf7-validates-as-required\" aria-required=\"true\" aria-invalid=\"false\" placeholder=\"Phone Number*\" value=\"\" type=\"text\" name=\"your-phone\" \/><\/span>\n\t\t\t<\/p>\n\t\t<\/div>\n\t\t<div class=\"col-md-6\">\n\t\t\t<p><span class=\"wpcf7-form-control-wrap\" data-name=\"textarea-445\"><textarea cols=\"40\" rows=\"10\" maxlength=\"2000\" class=\"wpcf7-form-control wpcf7-textarea\" aria-invalid=\"false\" placeholder=\"Message\" name=\"textarea-445\"><\/textarea><\/span><input class=\"wpcf7-form-control wpcf7-submit has-spinner\" type=\"submit\" value=\"Send Now\" \/>\n\t\t\t<\/p>\n\t\t<\/div>\n\t<\/div>\n<\/div><div class=\"wpcf7-response-output\" aria-hidden=\"true\"><\/div>\n<input type=\"hidden\" name=\"trp-form-language\" value=\"am\"\/><\/form>\n<\/div>\n<\/div><\/div><\/div><\/div><\/div><\/div><\/div>","protected":false},"excerpt":{"rendered":"As DevOps continues along its path of domination, organizations are seeking to bring development and security teams closer together to support the release of secure software and faster time-to-market. The [...]","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-3672","page","type-page","status-publish","hentry","no-thumb"],"_links":{"self":[{"href":"https:\/\/ecs-et.com\/am\/wp-json\/wp\/v2\/pages\/3672","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ecs-et.com\/am\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/ecs-et.com\/am\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/ecs-et.com\/am\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/ecs-et.com\/am\/wp-json\/wp\/v2\/comments?post=3672"}],"version-history":[{"count":33,"href":"https:\/\/ecs-et.com\/am\/wp-json\/wp\/v2\/pages\/3672\/revisions"}],"predecessor-version":[{"id":3717,"href":"https:\/\/ecs-et.com\/am\/wp-json\/wp\/v2\/pages\/3672\/revisions\/3717"}],"wp:attachment":[{"href":"https:\/\/ecs-et.com\/am\/wp-json\/wp\/v2\/media?parent=3672"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}