{"id":277,"date":"2005-12-01T00:02:35","date_gmt":"2005-12-01T00:02:35","guid":{"rendered":"http:\/\/news.a1enterprise.com\/?p=277"},"modified":"2012-04-14T00:11:13","modified_gmt":"2012-04-14T00:11:13","slug":"software-security-software-vulnerability-assessment","status":"publish","type":"post","link":"https:\/\/news.a1enterprise.com\/index.php\/software-security-software-vulnerability-assessment\/","title":{"rendered":"Software Security | Software Vulnerability Assessment"},"content":{"rendered":"<p>A1 Enterprise has recently taken a software security project that has lead to a value added service offering to accompany our integrated database and software design services. Software Vulnerability Assessments and Network Vulnerability Assessments are an integral part for ensuring the longest life for your business application software, web sites, and network technology. This process will our customer can count on the security of the software.<\/p>\n<p><strong>12-1-2005<\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"<p>A1 Enterprise has recently taken a software security project that has lead to a value added service offering to accompany our integrated database and software design services. Software Vulnerability Assessments and Network Vulnerability Assessments are an integral part for ensuring the longest life for your business application software, web sites, and network technology. This process [&hellip;]<\/p>\n","protected":false},"author":7,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1,223],"tags":[227,224,225],"class_list":["post-277","post","type-post","status-publish","format-standard","hentry","category-a1-enterprise-software","category-software-security-vulnerability-penetration-testing","tag-software-penetration-testing","tag-software-security","tag-software-vulnerability-testing"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.1.1 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Software Security Testing | Software Penetration Testing<\/title>\n<meta name=\"description\" content=\"Software Security Testing for online and web application software\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/news.a1enterprise.com\/index.php\/software-security-software-vulnerability-assessment\/\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Chris Day\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/news.a1enterprise.com\/index.php\/software-security-software-vulnerability-assessment\/\",\"url\":\"https:\/\/news.a1enterprise.com\/index.php\/software-security-software-vulnerability-assessment\/\",\"name\":\"Software Security Testing | Software Penetration Testing\",\"isPartOf\":{\"@id\":\"https:\/\/news.a1enterprise.com\/#website\"},\"datePublished\":\"2005-12-01T00:02:35+00:00\",\"dateModified\":\"2012-04-14T00:11:13+00:00\",\"author\":{\"@id\":\"https:\/\/news.a1enterprise.com\/#\/schema\/person\/e12cb47fb4b31b506be018ec0e062e55\"},\"description\":\"Software Security Testing for online and web application software\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/news.a1enterprise.com\/index.php\/software-security-software-vulnerability-assessment\/\"]}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/news.a1enterprise.com\/#website\",\"url\":\"https:\/\/news.a1enterprise.com\/\",\"name\":\"Risk Management Software: Contracts, Claims, Insurance, Incidents, Litigation, Safety, OSHA, Warranty\",\"description\":\"Risk Management Software for Businesses\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/news.a1enterprise.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Software Security Testing | Software Penetration Testing","description":"Software Security Testing for online and web application software","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/news.a1enterprise.com\/index.php\/software-security-software-vulnerability-assessment\/","twitter_misc":{"Written by":"Chris Day"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/news.a1enterprise.com\/index.php\/software-security-software-vulnerability-assessment\/","url":"https:\/\/news.a1enterprise.com\/index.php\/software-security-software-vulnerability-assessment\/","name":"Software Security Testing | Software Penetration Testing","isPartOf":{"@id":"https:\/\/news.a1enterprise.com\/#website"},"datePublished":"2005-12-01T00:02:35+00:00","dateModified":"2012-04-14T00:11:13+00:00","author":{"@id":"https:\/\/news.a1enterprise.com\/#\/schema\/person\/e12cb47fb4b31b506be018ec0e062e55"},"description":"Software Security Testing for online and web application software","inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/news.a1enterprise.com\/index.php\/software-security-software-vulnerability-assessment\/"]}]},{"@type":"WebSite","@id":"https:\/\/news.a1enterprise.com\/#website","url":"https:\/\/news.a1enterprise.com\/","name":"Risk Management Software: Contracts, Claims, Insurance, Incidents, Litigation, Safety, OSHA, Warranty","description":"Risk Management Software for Businesses","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/news.a1enterprise.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/news.a1enterprise.com\/index.php\/wp-json\/wp\/v2\/posts\/277","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/news.a1enterprise.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/news.a1enterprise.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/news.a1enterprise.com\/index.php\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/news.a1enterprise.com\/index.php\/wp-json\/wp\/v2\/comments?post=277"}],"version-history":[{"count":1,"href":"https:\/\/news.a1enterprise.com\/index.php\/wp-json\/wp\/v2\/posts\/277\/revisions"}],"predecessor-version":[{"id":278,"href":"https:\/\/news.a1enterprise.com\/index.php\/wp-json\/wp\/v2\/posts\/277\/revisions\/278"}],"wp:attachment":[{"href":"https:\/\/news.a1enterprise.com\/index.php\/wp-json\/wp\/v2\/media?parent=277"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/news.a1enterprise.com\/index.php\/wp-json\/wp\/v2\/categories?post=277"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/news.a1enterprise.com\/index.php\/wp-json\/wp\/v2\/tags?post=277"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}