SlideShare a Scribd company logo
1 of 5
Download to read offline
Questions? Email us at contact@castsoftware.com 1
Ensure Architectural Designs, Rules
and Standards are Followed
Today, many organizations depend on
mandates and processes to ensure that the
building blocks put in place by architects are
followed—not necessarily implying that they
are. So code reviews also take place, at least
occasionally but these however are expen-
sive, time-consuming and often can only
cover a small percentage of the code. So
how well are these really being followed?
Application design is done for a reason not
unlike the way we draw very structured
architectural plans for a building: to ensure
its structural integrity. However, that is often
where the similarities end. A building is then
inspected every step of the way to ensure it
is built to specification. Software on the other
hand is much more of a trust factor. Archi-
tects design a sound system, one which can
be easily changed over time, one that meets
industry and organization standards, one that
avoids individual lock-in and is easy for a new
development resource to begin working on,
but that is where control often ends.
As organizations have evolved over the past
three decades, we have seen applications
that we thought were not going to last more
than a few years continue to be the back-
bones of the organization 30 years later. As
we are building systems, we need to ensure
that they can endure the same tests of time
and today those systems are more important
than they ever were, not only supporting the
business, but running them.
CAST Application Intelligence
Platform
The CAST Application Intelligence Platform—
automatically analyzes entire business-critical
applications across all tiers and languages
to provide real data. Architects are provided
with the actionable metrics and information
needed to assess the implemented code, to
understand its health, know where risk lies
and understand how well the architectural
designs, rules and standards have been fol-
lowed.
CAST Application Intelligence Platform
Overview for the Architect
“Toomanytimes,software
developersactasiftheyare
architectswithintheirown
areasofexpertise.Implement-
ingarchitecturesastheyseefit,
followingguidelines,but
strayingfromthemwhen-
evertheyfeelitisneededand
workingwithintheirown
worlds.Thishastostop!”
Questions? Email us at contact@castsoftware.com 2
1
2
Objective monitoring and measurement of the health of the application or system to ensure
adherence to architectural, coding and documentation best practices and standards along
with high level information on the transferability, changeability, robustness, performance,
security and maintainability.
Each of these higher level measures is made up of several technical metrics which include
both code quality and application sizing. Some examples of technical metrics are Cyclomatic
complexity, object-level dependencies, polymorphism, cross-technology dependencies and
others. These are also then comprised of issues specific to a language or database technol-
ogy.
Figure 1 Specific assessment of an application’s health and how well it complies with standards
Figure 2 Example of the technical metrics used to describe changeability
Questions? Email us at contact@castsoftware.com 3
3
Taking Action
Monitoring and measuring is just the start, you then need to take action. CAST AIP doesn’t
just provide information at the highest levels, it enables you to dive as deep as needed to
understand exactly which code files are exposed and where within those files issues may ex-
ist. See the rules that haven’t been followed specific to a language or technology and include
custom rules, designs and specifications put in place by your organization.
Figure 3 Drill down to the specific files considered unacceptable
Architectural Governance
As an architect, you need to have the tools to move your organization to the future state for
the enterprise. You may have an architectural roadmap, perhaps migrating to specific archi-
tectural constructs, reusing certain components, or a SOA roadmap. Together with CAST En-
lighten, the Architecture Checker enables you to identify components that need to be reused,
to find risk hotspots, define your application layers and set policies that you can automatically
monitor in the construction of the system. Some of these may have to do with security, or
system resilience. The ability to customize architectural checks is unique in the marketplace.
4 Figure 4 Architecture Checker
www.castsoftware.com
Europe 3 rue Marcel Allégot 92190 Meudon - France Phone: +33 1 46 90 21 00
North America 373 Park Avenue South New York, NY 10016 Phone:+1 212-871-8330
Questions?
Email us at contact@castsoftware.com
Copyright © CAST All Rights Reserved
4
How Does It Work
CAST AIP analyzes all of the code that makes
up an application or system including the
database, business and user interface lay-
ers. From there, the information is stored in
a knowledge base “repository” from which
reports are extracted and decisions can be
made. The platform is made up of 3 engines:
• Quality
• Compliance
• Structure
Each engine brings its specific expertise, the
platform combining them to assess the entire
application across all areas needed. The ana-
lyzers look at the application from a static point
of view, but are able to simulate how the ap-
plication will run, connecting all of the pieces of
the puzzle, looking across different languages
including the database. Because of this, CAST
is able to perform analysis of the entire applica-
tion or system as to its health.
About CAST
CAST is a pioneer and world leader in Soft-
ware Analysis and Measurement, with unique
technology resulting from more than $100
million in R&D investment. CAST introduces
fact-based transparency into application
development and sourcing to transform it
into a management discipline. More than
250 companies across all industry sectors
and geographies rely on CAST to prevent
business disruption while reducing hard IT
costs. CAST is an integral part of software
delivery and maintenance at the world’s
leading IT service providers such as IBM and
Capgemini. 
Founded in 1990, CAST is listed on NYSE-
Euronext (Euronext: CAS) and serves IT
intensive enterprises worldwide with a
network of offices in North America, Eu-
rope and India. For more information, visit
www.castsoftware.com.

More Related Content

What's hot

Resume Sylvia Lowry 7-8-16
Resume Sylvia Lowry 7-8-16Resume Sylvia Lowry 7-8-16
Resume Sylvia Lowry 7-8-16Sylvia Lowry
 
Framework for Evaluating Martech
Framework for Evaluating Martech Framework for Evaluating Martech
Framework for Evaluating Martech Blue Leopard LLC
 
Troux Presentation Austin Texas
Troux Presentation Austin TexasTroux Presentation Austin Texas
Troux Presentation Austin TexasJoeFaghani
 
21 cfr part 11 compliance for software validation and saa s
21 cfr part 11 compliance for software validation and saa s21 cfr part 11 compliance for software validation and saa s
21 cfr part 11 compliance for software validation and saa sGlobalCompliancePanel
 
Treating Security Like a Product
Treating Security Like a ProductTreating Security Like a Product
Treating Security Like a ProductVMware Tanzu
 
Anton Chuvakin on Security Data Centralization
Anton Chuvakin on Security Data CentralizationAnton Chuvakin on Security Data Centralization
Anton Chuvakin on Security Data CentralizationAnton Chuvakin
 
Leverage Micro-Segmentation to Build a Zero Trust Network (Forrester)
Leverage Micro-Segmentation to Build a Zero Trust Network (Forrester)Leverage Micro-Segmentation to Build a Zero Trust Network (Forrester)
Leverage Micro-Segmentation to Build a Zero Trust Network (Forrester)VMware
 
Continuity Software Profile
Continuity Software ProfileContinuity Software Profile
Continuity Software ProfileRoy Goffer
 
SAP Security & Compliance Audits. Find your vulnerabilities before you get hu...
SAP Security & Compliance Audits. Find your vulnerabilities before you get hu...SAP Security & Compliance Audits. Find your vulnerabilities before you get hu...
SAP Security & Compliance Audits. Find your vulnerabilities before you get hu...akquinet enterprise solutions GmbH
 
Symantec Mobility Suite -Workforce apps
 Symantec Mobility Suite -Workforce apps Symantec Mobility Suite -Workforce apps
Symantec Mobility Suite -Workforce appsSymantec
 
Splunk app for_enterprise_security
Splunk app for_enterprise_securitySplunk app for_enterprise_security
Splunk app for_enterprise_securityGreg Hanchin
 
Arch Review Check List
Arch Review Check ListArch Review Check List
Arch Review Check ListJoe Francis
 
Data integrity pdf
Data integrity pdfData integrity pdf
Data integrity pdfJanardhan R
 
X-Tour: Managing Your Datacenter with Prism and Prism Pro
X-Tour: Managing Your Datacenter with Prism and Prism ProX-Tour: Managing Your Datacenter with Prism and Prism Pro
X-Tour: Managing Your Datacenter with Prism and Prism ProNEXTtour
 

What's hot (20)

Resume Sylvia Lowry 7-8-16
Resume Sylvia Lowry 7-8-16Resume Sylvia Lowry 7-8-16
Resume Sylvia Lowry 7-8-16
 
Framework for Evaluating Martech
Framework for Evaluating Martech Framework for Evaluating Martech
Framework for Evaluating Martech
 
Troux Presentation Austin Texas
Troux Presentation Austin TexasTroux Presentation Austin Texas
Troux Presentation Austin Texas
 
6 aproaches
6 aproaches6 aproaches
6 aproaches
 
21 cfr part 11 compliance for software validation and saa s
21 cfr part 11 compliance for software validation and saa s21 cfr part 11 compliance for software validation and saa s
21 cfr part 11 compliance for software validation and saa s
 
Treating Security Like a Product
Treating Security Like a ProductTreating Security Like a Product
Treating Security Like a Product
 
Anton Chuvakin on Security Data Centralization
Anton Chuvakin on Security Data CentralizationAnton Chuvakin on Security Data Centralization
Anton Chuvakin on Security Data Centralization
 
Leverage Micro-Segmentation to Build a Zero Trust Network (Forrester)
Leverage Micro-Segmentation to Build a Zero Trust Network (Forrester)Leverage Micro-Segmentation to Build a Zero Trust Network (Forrester)
Leverage Micro-Segmentation to Build a Zero Trust Network (Forrester)
 
Continuity Software Profile
Continuity Software ProfileContinuity Software Profile
Continuity Software Profile
 
Scaling agile
Scaling agileScaling agile
Scaling agile
 
SAP Security & Compliance Audits. Find your vulnerabilities before you get hu...
SAP Security & Compliance Audits. Find your vulnerabilities before you get hu...SAP Security & Compliance Audits. Find your vulnerabilities before you get hu...
SAP Security & Compliance Audits. Find your vulnerabilities before you get hu...
 
Tesseract Service Portfolio
Tesseract Service PortfolioTesseract Service Portfolio
Tesseract Service Portfolio
 
Symantec Mobility Suite -Workforce apps
 Symantec Mobility Suite -Workforce apps Symantec Mobility Suite -Workforce apps
Symantec Mobility Suite -Workforce apps
 
Splunk app for_enterprise_security
Splunk app for_enterprise_securitySplunk app for_enterprise_security
Splunk app for_enterprise_security
 
Arch Review Check List
Arch Review Check ListArch Review Check List
Arch Review Check List
 
Data integrity pdf
Data integrity pdfData integrity pdf
Data integrity pdf
 
It Budget Tips
It Budget TipsIt Budget Tips
It Budget Tips
 
Isms3
Isms3Isms3
Isms3
 
X-Tour: Managing Your Datacenter with Prism and Prism Pro
X-Tour: Managing Your Datacenter with Prism and Prism ProX-Tour: Managing Your Datacenter with Prism and Prism Pro
X-Tour: Managing Your Datacenter with Prism and Prism Pro
 
Isms4
Isms4Isms4
Isms4
 

Viewers also liked

A Trusted Integrity verification Architecture for Commodity Computers
A Trusted Integrity verification Architecture for Commodity ComputersA Trusted Integrity verification Architecture for Commodity Computers
A Trusted Integrity verification Architecture for Commodity ComputersEditor IJCATR
 
Review presentation Part 2
Review presentation Part 2Review presentation Part 2
Review presentation Part 2n5075858
 
Fighting corruption or building integrity: review and reflection on IRC and p...
Fighting corruption or building integrity: review and reflection on IRC and p...Fighting corruption or building integrity: review and reflection on IRC and p...
Fighting corruption or building integrity: review and reflection on IRC and p...IRC
 
Building Integrity In Seminar
Building Integrity In   SeminarBuilding Integrity In   Seminar
Building Integrity In SeminarChris Sterling
 
Structural Integrity Analysis. Chapter 1 Stress Concentration
Structural Integrity Analysis. Chapter 1 Stress ConcentrationStructural Integrity Analysis. Chapter 1 Stress Concentration
Structural Integrity Analysis. Chapter 1 Stress ConcentrationIgor Kokcharov
 
UT Architectural Engineering Integrated Design Course Presentation
UT Architectural Engineering  Integrated Design Course PresentationUT Architectural Engineering  Integrated Design Course Presentation
UT Architectural Engineering Integrated Design Course Presentationmeinkeb
 
SSL & TLS Architecture short
SSL & TLS Architecture shortSSL & TLS Architecture short
SSL & TLS Architecture shortAvirot Mitamura
 
Personal Integrity
Personal IntegrityPersonal Integrity
Personal Integritydheva B
 
Architectural conservation
Architectural conservationArchitectural conservation
Architectural conservationAditi Koshley
 
An introduction to fundamental architecture concepts
An introduction to fundamental architecture conceptsAn introduction to fundamental architecture concepts
An introduction to fundamental architecture conceptswweinmeyer79
 

Viewers also liked (12)

ynSynopsis 2
ynSynopsis 2ynSynopsis 2
ynSynopsis 2
 
A Trusted Integrity verification Architecture for Commodity Computers
A Trusted Integrity verification Architecture for Commodity ComputersA Trusted Integrity verification Architecture for Commodity Computers
A Trusted Integrity verification Architecture for Commodity Computers
 
Review presentation Part 2
Review presentation Part 2Review presentation Part 2
Review presentation Part 2
 
Fighting corruption or building integrity: review and reflection on IRC and p...
Fighting corruption or building integrity: review and reflection on IRC and p...Fighting corruption or building integrity: review and reflection on IRC and p...
Fighting corruption or building integrity: review and reflection on IRC and p...
 
Building Integrity In Seminar
Building Integrity In   SeminarBuilding Integrity In   Seminar
Building Integrity In Seminar
 
Structural Integrity Analysis. Chapter 1 Stress Concentration
Structural Integrity Analysis. Chapter 1 Stress ConcentrationStructural Integrity Analysis. Chapter 1 Stress Concentration
Structural Integrity Analysis. Chapter 1 Stress Concentration
 
UT Architectural Engineering Integrated Design Course Presentation
UT Architectural Engineering  Integrated Design Course PresentationUT Architectural Engineering  Integrated Design Course Presentation
UT Architectural Engineering Integrated Design Course Presentation
 
SSL & TLS Architecture short
SSL & TLS Architecture shortSSL & TLS Architecture short
SSL & TLS Architecture short
 
Personal Integrity
Personal IntegrityPersonal Integrity
Personal Integrity
 
Architectural conservation
Architectural conservationArchitectural conservation
Architectural conservation
 
5 Type Of Architecture Design Process
5 Type Of Architecture Design Process 5 Type Of Architecture Design Process
5 Type Of Architecture Design Process
 
An introduction to fundamental architecture concepts
An introduction to fundamental architecture conceptsAn introduction to fundamental architecture concepts
An introduction to fundamental architecture concepts
 

Similar to CAST for the Architect

CAST Architecture Checker
CAST Architecture CheckerCAST Architecture Checker
CAST Architecture CheckerCAST
 
AWS Partner: Grindr: Aggregate, Analyze, and Act on 900M Daily API Calls
AWS Partner: Grindr: Aggregate, Analyze, and Act on 900M Daily API CallsAWS Partner: Grindr: Aggregate, Analyze, and Act on 900M Daily API Calls
AWS Partner: Grindr: Aggregate, Analyze, and Act on 900M Daily API CallsAmazon Web Services
 
Enterprise Architecture Verification Validation
Enterprise Architecture Verification Validation Enterprise Architecture Verification Validation
Enterprise Architecture Verification Validation William Francis
 
Chapter_01.ppt
Chapter_01.pptChapter_01.ppt
Chapter_01.pptMSahibKhan
 
BCBS -By Ontology2
BCBS -By Ontology2BCBS -By Ontology2
BCBS -By Ontology2bfreeman1987
 
Introduction to CAST HIGHLIGHT - Rapid Application Portfolio Analysis
Introduction to CAST HIGHLIGHT - Rapid Application Portfolio AnalysisIntroduction to CAST HIGHLIGHT - Rapid Application Portfolio Analysis
Introduction to CAST HIGHLIGHT - Rapid Application Portfolio AnalysisCAST
 
Cloud Design Patterns Book from Microsoft
Cloud Design Patterns Book from MicrosoftCloud Design Patterns Book from Microsoft
Cloud Design Patterns Book from MicrosoftKesavan Munuswamy
 
How to add security in dataops and devops
How to add security in dataops and devopsHow to add security in dataops and devops
How to add security in dataops and devopsUlf Mattsson
 
Microsoft Mimarisi
Microsoft MimarisiMicrosoft Mimarisi
Microsoft MimarisiNuri Cankaya
 
Software process methodologies and a comparative study of various models
Software process methodologies and a comparative study of various modelsSoftware process methodologies and a comparative study of various models
Software process methodologies and a comparative study of various modelsiaemedu
 
Building Secure Services in the Cloud
Building Secure Services in the CloudBuilding Secure Services in the Cloud
Building Secure Services in the CloudSumo Logic
 
A Successful SAST Tool Implementation
A Successful SAST Tool ImplementationA Successful SAST Tool Implementation
A Successful SAST Tool ImplementationCheckmarx
 
CAST for PeopleSoft
CAST for PeopleSoftCAST for PeopleSoft
CAST for PeopleSoftCAST
 
Maintaining Continuous Compliance with HCL BigFix
Maintaining Continuous Compliance with HCL BigFixMaintaining Continuous Compliance with HCL BigFix
Maintaining Continuous Compliance with HCL BigFixHCLSoftware
 
Software Engineering Important Short Question for Exams
Software Engineering Important Short Question for ExamsSoftware Engineering Important Short Question for Exams
Software Engineering Important Short Question for ExamsMuhammadTalha436
 
Case study of rules as relational data
Case study of rules as relational dataCase study of rules as relational data
Case study of rules as relational dataJeff Long
 
Case study of rules as relational data
Case study of rules as relational dataCase study of rules as relational data
Case study of rules as relational dataJeff Long
 
Architecture and Distributed Systems, Web Distributed Systems Design
Architecture and Distributed Systems, Web Distributed Systems DesignArchitecture and Distributed Systems, Web Distributed Systems Design
Architecture and Distributed Systems, Web Distributed Systems DesignArmen Arzumanyan
 
Architecture centered publishing systems
Architecture centered publishing systemsArchitecture centered publishing systems
Architecture centered publishing systemsGlen Alleman
 

Similar to CAST for the Architect (20)

CAST Architecture Checker
CAST Architecture CheckerCAST Architecture Checker
CAST Architecture Checker
 
AWS Partner: Grindr: Aggregate, Analyze, and Act on 900M Daily API Calls
AWS Partner: Grindr: Aggregate, Analyze, and Act on 900M Daily API CallsAWS Partner: Grindr: Aggregate, Analyze, and Act on 900M Daily API Calls
AWS Partner: Grindr: Aggregate, Analyze, and Act on 900M Daily API Calls
 
Enterprise Architecture Verification Validation
Enterprise Architecture Verification Validation Enterprise Architecture Verification Validation
Enterprise Architecture Verification Validation
 
Chapter_01.ppt
Chapter_01.pptChapter_01.ppt
Chapter_01.ppt
 
BCBS -By Ontology2
BCBS -By Ontology2BCBS -By Ontology2
BCBS -By Ontology2
 
Introduction to CAST HIGHLIGHT - Rapid Application Portfolio Analysis
Introduction to CAST HIGHLIGHT - Rapid Application Portfolio AnalysisIntroduction to CAST HIGHLIGHT - Rapid Application Portfolio Analysis
Introduction to CAST HIGHLIGHT - Rapid Application Portfolio Analysis
 
Cloud Design Patterns Book from Microsoft
Cloud Design Patterns Book from MicrosoftCloud Design Patterns Book from Microsoft
Cloud Design Patterns Book from Microsoft
 
How to add security in dataops and devops
How to add security in dataops and devopsHow to add security in dataops and devops
How to add security in dataops and devops
 
Managing Compliance
Managing ComplianceManaging Compliance
Managing Compliance
 
Microsoft Mimarisi
Microsoft MimarisiMicrosoft Mimarisi
Microsoft Mimarisi
 
Software process methodologies and a comparative study of various models
Software process methodologies and a comparative study of various modelsSoftware process methodologies and a comparative study of various models
Software process methodologies and a comparative study of various models
 
Building Secure Services in the Cloud
Building Secure Services in the CloudBuilding Secure Services in the Cloud
Building Secure Services in the Cloud
 
A Successful SAST Tool Implementation
A Successful SAST Tool ImplementationA Successful SAST Tool Implementation
A Successful SAST Tool Implementation
 
CAST for PeopleSoft
CAST for PeopleSoftCAST for PeopleSoft
CAST for PeopleSoft
 
Maintaining Continuous Compliance with HCL BigFix
Maintaining Continuous Compliance with HCL BigFixMaintaining Continuous Compliance with HCL BigFix
Maintaining Continuous Compliance with HCL BigFix
 
Software Engineering Important Short Question for Exams
Software Engineering Important Short Question for ExamsSoftware Engineering Important Short Question for Exams
Software Engineering Important Short Question for Exams
 
Case study of rules as relational data
Case study of rules as relational dataCase study of rules as relational data
Case study of rules as relational data
 
Case study of rules as relational data
Case study of rules as relational dataCase study of rules as relational data
Case study of rules as relational data
 
Architecture and Distributed Systems, Web Distributed Systems Design
Architecture and Distributed Systems, Web Distributed Systems DesignArchitecture and Distributed Systems, Web Distributed Systems Design
Architecture and Distributed Systems, Web Distributed Systems Design
 
Architecture centered publishing systems
Architecture centered publishing systemsArchitecture centered publishing systems
Architecture centered publishing systems
 

More from CAST

Six steps-to-enhance-performance-of-critical-systems
Six steps-to-enhance-performance-of-critical-systemsSix steps-to-enhance-performance-of-critical-systems
Six steps-to-enhance-performance-of-critical-systemsCAST
 
Application Performance: 6 Steps to Enhance Performance of Critical Systems
Application Performance: 6 Steps to Enhance Performance of Critical SystemsApplication Performance: 6 Steps to Enhance Performance of Critical Systems
Application Performance: 6 Steps to Enhance Performance of Critical SystemsCAST
 
Application Assessment - Executive Summary Report
Application Assessment - Executive Summary ReportApplication Assessment - Executive Summary Report
Application Assessment - Executive Summary ReportCAST
 
Cloud Migration: Azure acceleration with CAST Highlight
Cloud Migration: Azure acceleration with CAST HighlightCloud Migration: Azure acceleration with CAST Highlight
Cloud Migration: Azure acceleration with CAST HighlightCAST
 
Cloud Readiness : CAST & Microsoft Azure Partnership Overview
Cloud Readiness : CAST & Microsoft Azure Partnership OverviewCloud Readiness : CAST & Microsoft Azure Partnership Overview
Cloud Readiness : CAST & Microsoft Azure Partnership OverviewCAST
 
Cloud Migration: Cloud Readiness Assessment Case Study
Cloud Migration: Cloud Readiness Assessment Case StudyCloud Migration: Cloud Readiness Assessment Case Study
Cloud Migration: Cloud Readiness Assessment Case StudyCAST
 
Digital Transformation e-book: Taking the 20X20n approach to accelerating Dig...
Digital Transformation e-book: Taking the 20X20n approach to accelerating Dig...Digital Transformation e-book: Taking the 20X20n approach to accelerating Dig...
Digital Transformation e-book: Taking the 20X20n approach to accelerating Dig...CAST
 
Why computers will never be safe
Why computers will never be safeWhy computers will never be safe
Why computers will never be safeCAST
 
Green indexes used in CAST to measure the energy consumption in code
Green indexes used in CAST to measure the energy consumption in codeGreen indexes used in CAST to measure the energy consumption in code
Green indexes used in CAST to measure the energy consumption in codeCAST
 
9 Steps to Creating ADM Budgets
9 Steps to Creating ADM Budgets9 Steps to Creating ADM Budgets
9 Steps to Creating ADM BudgetsCAST
 
Improving ADM Vendor Relationship through Outcome Based Contracts
Improving ADM Vendor Relationship through Outcome Based ContractsImproving ADM Vendor Relationship through Outcome Based Contracts
Improving ADM Vendor Relationship through Outcome Based ContractsCAST
 
Drive Business Excellence with Outcomes-Based Contracting: The OBC Toolkit
Drive Business Excellence with Outcomes-Based Contracting: The OBC ToolkitDrive Business Excellence with Outcomes-Based Contracting: The OBC Toolkit
Drive Business Excellence with Outcomes-Based Contracting: The OBC ToolkitCAST
 
CAST Highlight: Code-level portfolio analysis. FAST.
CAST Highlight: Code-level portfolio analysis. FAST.CAST Highlight: Code-level portfolio analysis. FAST.
CAST Highlight: Code-level portfolio analysis. FAST.CAST
 
Shifting Vendor Management Focus to Risk and Business Outcomes
Shifting Vendor Management Focus to Risk and Business OutcomesShifting Vendor Management Focus to Risk and Business Outcomes
Shifting Vendor Management Focus to Risk and Business OutcomesCAST
 
Applying Software Quality Models to Software Security
Applying Software Quality Models to Software SecurityApplying Software Quality Models to Software Security
Applying Software Quality Models to Software SecurityCAST
 
The business case for software analysis & measurement
The business case for software analysis & measurementThe business case for software analysis & measurement
The business case for software analysis & measurementCAST
 
Cast Highlight Software Maintenance Infographic
Cast Highlight Software Maintenance InfographicCast Highlight Software Maintenance Infographic
Cast Highlight Software Maintenance InfographicCAST
 
What is system level analysis
What is system level analysisWhat is system level analysis
What is system level analysisCAST
 
Deloitte Tech Trends 2014 Technical Debt
Deloitte Tech Trends 2014 Technical DebtDeloitte Tech Trends 2014 Technical Debt
Deloitte Tech Trends 2014 Technical DebtCAST
 
What you should know about software measurement platforms
What you should know about software measurement platformsWhat you should know about software measurement platforms
What you should know about software measurement platformsCAST
 

More from CAST (20)

Six steps-to-enhance-performance-of-critical-systems
Six steps-to-enhance-performance-of-critical-systemsSix steps-to-enhance-performance-of-critical-systems
Six steps-to-enhance-performance-of-critical-systems
 
Application Performance: 6 Steps to Enhance Performance of Critical Systems
Application Performance: 6 Steps to Enhance Performance of Critical SystemsApplication Performance: 6 Steps to Enhance Performance of Critical Systems
Application Performance: 6 Steps to Enhance Performance of Critical Systems
 
Application Assessment - Executive Summary Report
Application Assessment - Executive Summary ReportApplication Assessment - Executive Summary Report
Application Assessment - Executive Summary Report
 
Cloud Migration: Azure acceleration with CAST Highlight
Cloud Migration: Azure acceleration with CAST HighlightCloud Migration: Azure acceleration with CAST Highlight
Cloud Migration: Azure acceleration with CAST Highlight
 
Cloud Readiness : CAST & Microsoft Azure Partnership Overview
Cloud Readiness : CAST & Microsoft Azure Partnership OverviewCloud Readiness : CAST & Microsoft Azure Partnership Overview
Cloud Readiness : CAST & Microsoft Azure Partnership Overview
 
Cloud Migration: Cloud Readiness Assessment Case Study
Cloud Migration: Cloud Readiness Assessment Case StudyCloud Migration: Cloud Readiness Assessment Case Study
Cloud Migration: Cloud Readiness Assessment Case Study
 
Digital Transformation e-book: Taking the 20X20n approach to accelerating Dig...
Digital Transformation e-book: Taking the 20X20n approach to accelerating Dig...Digital Transformation e-book: Taking the 20X20n approach to accelerating Dig...
Digital Transformation e-book: Taking the 20X20n approach to accelerating Dig...
 
Why computers will never be safe
Why computers will never be safeWhy computers will never be safe
Why computers will never be safe
 
Green indexes used in CAST to measure the energy consumption in code
Green indexes used in CAST to measure the energy consumption in codeGreen indexes used in CAST to measure the energy consumption in code
Green indexes used in CAST to measure the energy consumption in code
 
9 Steps to Creating ADM Budgets
9 Steps to Creating ADM Budgets9 Steps to Creating ADM Budgets
9 Steps to Creating ADM Budgets
 
Improving ADM Vendor Relationship through Outcome Based Contracts
Improving ADM Vendor Relationship through Outcome Based ContractsImproving ADM Vendor Relationship through Outcome Based Contracts
Improving ADM Vendor Relationship through Outcome Based Contracts
 
Drive Business Excellence with Outcomes-Based Contracting: The OBC Toolkit
Drive Business Excellence with Outcomes-Based Contracting: The OBC ToolkitDrive Business Excellence with Outcomes-Based Contracting: The OBC Toolkit
Drive Business Excellence with Outcomes-Based Contracting: The OBC Toolkit
 
CAST Highlight: Code-level portfolio analysis. FAST.
CAST Highlight: Code-level portfolio analysis. FAST.CAST Highlight: Code-level portfolio analysis. FAST.
CAST Highlight: Code-level portfolio analysis. FAST.
 
Shifting Vendor Management Focus to Risk and Business Outcomes
Shifting Vendor Management Focus to Risk and Business OutcomesShifting Vendor Management Focus to Risk and Business Outcomes
Shifting Vendor Management Focus to Risk and Business Outcomes
 
Applying Software Quality Models to Software Security
Applying Software Quality Models to Software SecurityApplying Software Quality Models to Software Security
Applying Software Quality Models to Software Security
 
The business case for software analysis & measurement
The business case for software analysis & measurementThe business case for software analysis & measurement
The business case for software analysis & measurement
 
Cast Highlight Software Maintenance Infographic
Cast Highlight Software Maintenance InfographicCast Highlight Software Maintenance Infographic
Cast Highlight Software Maintenance Infographic
 
What is system level analysis
What is system level analysisWhat is system level analysis
What is system level analysis
 
Deloitte Tech Trends 2014 Technical Debt
Deloitte Tech Trends 2014 Technical DebtDeloitte Tech Trends 2014 Technical Debt
Deloitte Tech Trends 2014 Technical Debt
 
What you should know about software measurement platforms
What you should know about software measurement platformsWhat you should know about software measurement platforms
What you should know about software measurement platforms
 

Recently uploaded

[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 

Recently uploaded (20)

[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 

CAST for the Architect

  • 1.
  • 2. Questions? Email us at contact@castsoftware.com 1 Ensure Architectural Designs, Rules and Standards are Followed Today, many organizations depend on mandates and processes to ensure that the building blocks put in place by architects are followed—not necessarily implying that they are. So code reviews also take place, at least occasionally but these however are expen- sive, time-consuming and often can only cover a small percentage of the code. So how well are these really being followed? Application design is done for a reason not unlike the way we draw very structured architectural plans for a building: to ensure its structural integrity. However, that is often where the similarities end. A building is then inspected every step of the way to ensure it is built to specification. Software on the other hand is much more of a trust factor. Archi- tects design a sound system, one which can be easily changed over time, one that meets industry and organization standards, one that avoids individual lock-in and is easy for a new development resource to begin working on, but that is where control often ends. As organizations have evolved over the past three decades, we have seen applications that we thought were not going to last more than a few years continue to be the back- bones of the organization 30 years later. As we are building systems, we need to ensure that they can endure the same tests of time and today those systems are more important than they ever were, not only supporting the business, but running them. CAST Application Intelligence Platform The CAST Application Intelligence Platform— automatically analyzes entire business-critical applications across all tiers and languages to provide real data. Architects are provided with the actionable metrics and information needed to assess the implemented code, to understand its health, know where risk lies and understand how well the architectural designs, rules and standards have been fol- lowed. CAST Application Intelligence Platform Overview for the Architect “Toomanytimes,software developersactasiftheyare architectswithintheirown areasofexpertise.Implement- ingarchitecturesastheyseefit, followingguidelines,but strayingfromthemwhen- evertheyfeelitisneededand workingwithintheirown worlds.Thishastostop!”
  • 3. Questions? Email us at contact@castsoftware.com 2 1 2 Objective monitoring and measurement of the health of the application or system to ensure adherence to architectural, coding and documentation best practices and standards along with high level information on the transferability, changeability, robustness, performance, security and maintainability. Each of these higher level measures is made up of several technical metrics which include both code quality and application sizing. Some examples of technical metrics are Cyclomatic complexity, object-level dependencies, polymorphism, cross-technology dependencies and others. These are also then comprised of issues specific to a language or database technol- ogy. Figure 1 Specific assessment of an application’s health and how well it complies with standards Figure 2 Example of the technical metrics used to describe changeability
  • 4. Questions? Email us at contact@castsoftware.com 3 3 Taking Action Monitoring and measuring is just the start, you then need to take action. CAST AIP doesn’t just provide information at the highest levels, it enables you to dive as deep as needed to understand exactly which code files are exposed and where within those files issues may ex- ist. See the rules that haven’t been followed specific to a language or technology and include custom rules, designs and specifications put in place by your organization. Figure 3 Drill down to the specific files considered unacceptable Architectural Governance As an architect, you need to have the tools to move your organization to the future state for the enterprise. You may have an architectural roadmap, perhaps migrating to specific archi- tectural constructs, reusing certain components, or a SOA roadmap. Together with CAST En- lighten, the Architecture Checker enables you to identify components that need to be reused, to find risk hotspots, define your application layers and set policies that you can automatically monitor in the construction of the system. Some of these may have to do with security, or system resilience. The ability to customize architectural checks is unique in the marketplace. 4 Figure 4 Architecture Checker
  • 5. www.castsoftware.com Europe 3 rue Marcel Allégot 92190 Meudon - France Phone: +33 1 46 90 21 00 North America 373 Park Avenue South New York, NY 10016 Phone:+1 212-871-8330 Questions? Email us at contact@castsoftware.com Copyright © CAST All Rights Reserved 4 How Does It Work CAST AIP analyzes all of the code that makes up an application or system including the database, business and user interface lay- ers. From there, the information is stored in a knowledge base “repository” from which reports are extracted and decisions can be made. The platform is made up of 3 engines: • Quality • Compliance • Structure Each engine brings its specific expertise, the platform combining them to assess the entire application across all areas needed. The ana- lyzers look at the application from a static point of view, but are able to simulate how the ap- plication will run, connecting all of the pieces of the puzzle, looking across different languages including the database. Because of this, CAST is able to perform analysis of the entire applica- tion or system as to its health. About CAST CAST is a pioneer and world leader in Soft- ware Analysis and Measurement, with unique technology resulting from more than $100 million in R&D investment. CAST introduces fact-based transparency into application development and sourcing to transform it into a management discipline. More than 250 companies across all industry sectors and geographies rely on CAST to prevent business disruption while reducing hard IT costs. CAST is an integral part of software delivery and maintenance at the world’s leading IT service providers such as IBM and Capgemini.  Founded in 1990, CAST is listed on NYSE- Euronext (Euronext: CAS) and serves IT intensive enterprises worldwide with a network of offices in North America, Eu- rope and India. For more information, visit www.castsoftware.com.