SlideShare uma empresa Scribd logo
1 de 44
OSS has taken over the
enterprise: The top five
OSS trends of 2015
Richard Sherrard
director of product management
Richard Sherrard
director of product management
Presenters
Rogue Wave Software
2© 2015 Rogue Wave Software, Inc. All Rights Reserved.
Top five open source
trends of 2015
Open source trends we’ve seen in 2015
© 2015 Rogue Wave Software, Inc. All Rights Reserved.
• Open source has taken over the enterprise
• Open source discovery challenges
• Open source risk management
• Open source governance
• Multi-tiered approach to open source management
4
#1
Open source has taken
over the enterprise
Growth of open source
© 2015 Rogue Wave Software, Inc. All Rights Reserved. 6
Use of open source continues to grow
at a fast pace!
90% of companies use
OSS components in
commercial software
(Gartner)
>80% of a typical Java
application is open-
source components and
frameworks
(TechCrunch)
11 million developers
worldwide make 13
billion open source
requests each year
Innovation drives open source adoption
7
 Open source components provide critical functionality
 Improves developer productivity
No license fees
 “More eyes” improves quality & security
Leveraged development effort
 Apache, Tomcat, Wildfly, Jakarta Commons, jQuery
 Communities continuously improve features
Mature, commoditized applications and libraries
Community peer review
© 2015 Rogue Wave Software, Inc. All Rights Reserved.
Open source in the enterprise
8
“By 2016, open source software will be in mission-critical software
portfolios within 99% of all Global 1,000 enterprises.”
Innovate
• Opens up code options
• Deploy applications with any
combination of code source
• Optimize developer effort and
time
• Quicker time to market
Identify and mitigate risk
• Technical risk
• Business risk
• Security risk
• Legal and compliance risk
Balance risk and reward
© 2015 Rogue Wave Software, Inc. All Rights Reserved.
How open source enters your codebase
9
“90% of code in modern applications is open source” and
“31% of companies have had or suspect a breach in an open source component“
Open source
community
Legacy code
Internally
developed code
Reused code
Third party code
Supply chain
code
Outsource code
© 2015 Rogue Wave Software, Inc. All Rights Reserved.
Delivered
code
Mixed source risks
10© 2015 Rogue Wave Software, Inc. All Rights Reserved.
Loss of
intellectual
property
Defects and quality
issues
License restrictions
and obligations
Support costs
Security
vulnerabilities
Injunctions
What organizations are looking to answer?
11
Dev VP
& Mgr
OSS Compliance Mgr
CTO/ CIO/CISO
Security Mgr
Legal
What open source am I using
Where are we using open source
across the organization
How can I increase the security
of the open source
What are my legal obligations
Are we able to participate in the
open source communities
© 2015 Rogue Wave Software, Inc. All Rights Reserved.
Embrace OSS and automate the governance process
12
Create an automated organization-wide OSS policy and leverage the
benefits
• Increase developer productivity
• Educate and develop OSS policies for the developers to follow
• Marshal the resources of the OSS community
• Accelerate software development
Understand, manage, and govern OSS comprehensively
Inventory Support Govern
© 2015 Rogue Wave Software, Inc. All Rights Reserved.
#2
Open source discovery
Large codebases: Open source is everywhere
14
• Companies today have extremely large codebases made up of 1000’s of
developed applications.
• Lots of different technologies in play – web, mobile, embedded
• Larger number of 3rd party software suppliers being used today
Over 100 million
lines of code goes
into a average high
end car today!
© 2015 Rogue Wave Software, Inc. All Rights Reserved.
Into the “unknown”
15
• Once DISCOVERY of the open source is known you can then better understand
it
– What license(s) is it distributed under – GPL, Apache, BSD…
– What version(s) are being used; are they outdated!
– Are there known security risks
– Do I have quality issues with it
– Is their a strong community behind it!
• A plan of action can then be worked on to resolve identified risks and issues
– There will be many!
Biggest open source
challenge organizations
face today is the “Not
knowing” what they have
and “Where they have it”
© 2015 Rogue Wave Software, Inc. All Rights Reserved.
How are they doing discovery today?
16
• Companies find it extremely hard if not impossible to uncover where open
source is being used across the organization
• It is a very ad hoc process across the organization
• Manual code reviews can take multiple man years to complete.
• Surveying or interviewing the development teams is slow and inaccurate as
developers leave and move on
• Larger number of 3rd party software suppliers being used today
© 2015 Rogue Wave Software, Inc. All Rights Reserved.
Automate the discovery of open source
17
Automated OSS
Scanning
SDLC
Integrations
OSS
Approvals
© 2015 Rogue Wave Software, Inc. All Rights Reserved.
Automate discovery of your open source
18
• Discovery by scanning your code
• Conduct scan in-place – access code where it is
• Run baseline and delta scans on your code
• Identify the “right” project
• Multiple matching techniques to find projects, files, snippets, modified code
• Patented noise reduction techniques to avoid false positives, pinpoint the
“right” project
• Search for the “right” OSS for your needs
• Large knowledgebase of OSS
• Rich information about the package
• Automated approval policy for OSS usage
• Integrate into the SDLC
• Continuous Integration builds enable on-going automation of your code
scanning
Get a comprehensive view
of OSS across projects &
teams
© 2015 Rogue Wave Software, Inc. All Rights Reserved.
#3
Open source risk
Assessing risk in open source
20
For all its benefits, risks exist
Legal risk
Using the wrong
license can
compromise IP
Security risk
The OSS
component can
include
vulnerabilities
Support risk
Who do you call
for help?
© 2015 Rogue Wave Software, Inc. All Rights Reserved.
Cisco’s loss of IP
21
•Used GPL code to
customize
Broadcom's Linux
distribution
CyberTan
• Embedded the
code in chipset
Broadcom
• Adopted this into
its WRT54G
router
Linksys
•Bought Linksys for
$500m
•FSF Accused Cisco of
license violation
•Source code made
available
CISCO
Developers modified
firmware turning a low-
end ($60) device into a
high functioning router
© 2015 Rogue Wave Software, Inc. All Rights Reserved.
Unknown OSS and security issues
22© 2015 Rogue Wave Software, Inc. All Rights Reserved.
Code vulnerabilities
23© 2015 Rogue Wave Software, Inc. All Rights Reserved.
Lack of open source support
24
• Open source software does not come with commercial support; you are
dependent upon the OSS communities to provide you help and fixes
• Who do you call when your “Mission Critical” open source application has
an issue?...“No throat to choke”!
• Developers have to negotiate wasted cycles and downtime while waiting for
fixes from the community
• Developers do not have anyone to help with risks and development pitfalls
• No formal training provided on the OSS package
© 2015 Rogue Wave Software, Inc. All Rights Reserved.
Managing OSS risk
25
20%
of organizations lack meaningful controls
over OSS selection and use
of developers need not prove security of
OSS they are using
of the organizations claim to track
vulnerabilities in OSS over time
76%
80%
Increased use + few controls = unmanaged risk
© 2015 Rogue Wave Software, Inc. All Rights Reserved.
Open source support
26
• With the ubiquity of open source, enterprises need commercial-grade
support.
• We are the only vendor offering 24x7 support across hundreds of
OSS packages.
• Our “Tier 4” support gives you one call access to enterprise
architects, tackling a range of challenging and critical issues.
• We are thought leaders in the industry, and can provide enormous
value to any business that utilizes open source software.
© 2015 Rogue Wave Software, Inc. All Rights Reserved.
Value of open source support
27
Support offerings range across hundreds of open source products. We
help customers:
 Avoid downtime and wasted cycles
 Navigate complex OSS packages requiring broad and deep expertise
 Mitigate risks and development pitfalls
 Receive formal, instructor-led training across several OSS packages
 Gain the peace of mind that comes with 24X7 support coverage
© 2015 Rogue Wave Software, Inc. All Rights Reserved.
We support the best of open source
28© 2015 Rogue Wave Software, Inc. All Rights Reserved.
#4
Open source governance
OSS best practices
30
Acquisition
& Approval
Support &
Maintenance
Tracking
Audit &
Governance
Training
Legal
Compliance
Community
Interaction
Acquisition
& Approval
Support &
Maintenance
Tracking
Audit &
Governance
Training
Legal
Compliance
Community
Interaction
Consulting
Certified library
request &
approval process
SLA support
OpenUpdate
Project tracking
Auditing services
License obligation audit
Certification services
Technical and
OSS training
OSS Policy
© 2015 Rogue Wave Software, Inc. All Rights Reserved.
Manual OSS process
31
Web search Ask around
Check the
spreadsheet
Answer
questions
Security
review
Update
spreadsheet
Contact legal
Fill out form Advocate
Monitor
security alerts
Where Used?
Code Review Rewrite
Wait Wait
Arch. review
Other approval
boards
Monitor
updates to
components
Select
Approve
Monitor
Discover
Inventory
© 2015 Rogue Wave Software, Inc. All Rights Reserved.
OSS management process
32
Select
Discover
ApproveInventory
Monitor
© 2015 Rogue Wave Software, Inc. All Rights Reserved.
Approve your OSS
33
Requirement: Workflows reflect policies
Request and approval workflow
– Fully customizable, flexible workflow engine
• Create workflows that match the way teams work
• Forms that ask the questions you need to approve requests
• Support complex workflows with serial or parallel reviewers
• Track OSS by use, what, where, when, how and who
Flexible OSS policy management
– Effectively communicate policies to all employees
• Easily create policies based on combination of OSS package, version
and license
• Auto approve or deny requests based on usage model
© 2015 Rogue Wave Software, Inc. All Rights Reserved.
Inventory and monitor your OSS
34
Requirement: Understand what you have, learn about it and where you
have it
See OSS inventory by project
– Policy violations
– Combined lists of both approved, known OSS, and newly discovered
OSS via scanning
– Comprehensive OSS Bill of Materials
Continuously monitor OSS for security vulnerabilities and updates
– Automatic: Daily updates via link to National Vulnerability Database
(NVD) to list all know CVEs by OSS package
– Manual: Daily updates on new security vulnerabilities from OSS experts
after reviewing of hundreds of packages
© 2015 Rogue Wave Software, Inc. All Rights Reserved.
#5
Multi tiered approach to
open source management
Multiple approaches to managing open source
36
• Finding issues late and maybe in production
are very expensive to resolve
• Not able to dig deeper into your code to find
potential problems
• Not able to fix issues on open source in use
• Continuous architecture and package reviews
to stay on top of the latest technology
© 2015 Rogue Wave Software, Inc. All Rights Reserved.
Static code analysis
37
Significantly reduces the cost of reliable, secure software
• Complements existing testing approaches
• Automated and repeatable analysis
Enforces key industry standards
• DISA STIG, CWE, MISRA
• CERT, SAMATE
• OWASP, DO-178B, FDA validation
• ...and more
© 2015 Rogue Wave Software, Inc. All Rights Reserved.
Dynamic code analysis
38
• Interactive debugging
• Interactive memory debugging
• Reverse debugging
• Unattended debugging
• Serial and parallel applications
© 2015 Rogue Wave Software, Inc. All Rights Reserved.
To wrap up
Open source is everywhere!
40
Open source can no longer be avoided in your application
development
Learn to embrace the usage of open source
Need to understand what you have and where you have it
Open source is not “FREE” and comes with it own risks and
rewards
With out checks & balances in place, open source chaos will arise
Take a multi pronged approach to managing open source
© 2015 Rogue Wave Software, Inc. All Rights Reserved.
Rogue Wave capabilities
41© 2015 Rogue Wave Software, Inc. All Rights Reserved.
What we do
42
Rogue Wave helps organizations simplify
complex software development, improve
code quality, and shorten cycle times
© 2015 Rogue Wave Software, Inc. All Rights Reserved.
See us in action:
www.roguewave.com
Richard Sherrard
richard.sherrard@roguewave.com
OSS has taken over the enterprise: The top five OSS trends of 2015

Mais conteúdo relacionado

Mais procurados

Black duck Software's pitch
Black duck Software's pitchBlack duck Software's pitch
Black duck Software's pitch
i7
 

Mais procurados (20)

Lyra Infosystems Services and Consulting Portfolio 2020
Lyra Infosystems Services and Consulting Portfolio 2020Lyra Infosystems Services and Consulting Portfolio 2020
Lyra Infosystems Services and Consulting Portfolio 2020
 
How enterprises learned to stop worrying and love open source
How enterprises learned to stop worrying and love open sourceHow enterprises learned to stop worrying and love open source
How enterprises learned to stop worrying and love open source
 
Security Champions: Pushing Security Expertise to the Edges of Your Organization
Security Champions: Pushing Security Expertise to the Edges of Your OrganizationSecurity Champions: Pushing Security Expertise to the Edges of Your Organization
Security Champions: Pushing Security Expertise to the Edges of Your Organization
 
Application Asset Management with ThreadFix
 Application Asset Management with ThreadFix Application Asset Management with ThreadFix
Application Asset Management with ThreadFix
 
Preventing Code Leaks & Other Critical Security Risks from Code
Preventing Code Leaks & Other Critical Security Risks from CodePreventing Code Leaks & Other Critical Security Risks from Code
Preventing Code Leaks & Other Critical Security Risks from Code
 
Webinar – Risk-based adaptive DevSecOps
Webinar – Risk-based adaptive DevSecOps Webinar – Risk-based adaptive DevSecOps
Webinar – Risk-based adaptive DevSecOps
 
Security in the age of open source - Myths and misperceptions
Security in the age of open source - Myths and misperceptionsSecurity in the age of open source - Myths and misperceptions
Security in the age of open source - Myths and misperceptions
 
Open source software support for the enterprise
Open source software support for the enterpriseOpen source software support for the enterprise
Open source software support for the enterprise
 
Collaborative Development the Gift That Keeps on Giving
Collaborative Development  the Gift That Keeps on GivingCollaborative Development  the Gift That Keeps on Giving
Collaborative Development the Gift That Keeps on Giving
 
Monitoring Application Attack Surface to Integrate Security into DevOps Pipel...
Monitoring Application Attack Surface to Integrate Security into DevOps Pipel...Monitoring Application Attack Surface to Integrate Security into DevOps Pipel...
Monitoring Application Attack Surface to Integrate Security into DevOps Pipel...
 
Shift Risk Left: Security Considerations When Migrating Apps to the Cloud
Shift Risk Left: Security Considerations When Migrating Apps to the CloudShift Risk Left: Security Considerations When Migrating Apps to the Cloud
Shift Risk Left: Security Considerations When Migrating Apps to the Cloud
 
Open Source Insight: You Can’t Beat Hackers and the Pentagon Moves into Open...
Open Source Insight: You Can’t Beat Hackers and the Pentagon Moves into Open...Open Source Insight: You Can’t Beat Hackers and the Pentagon Moves into Open...
Open Source Insight: You Can’t Beat Hackers and the Pentagon Moves into Open...
 
Bridging the Security Testing Gap in Your CI/CD Pipeline
Bridging the Security Testing Gap in Your CI/CD PipelineBridging the Security Testing Gap in Your CI/CD Pipeline
Bridging the Security Testing Gap in Your CI/CD Pipeline
 
Monitoring Attack Surface to Secure DevOps Pipelines
Monitoring Attack Surface to Secure DevOps PipelinesMonitoring Attack Surface to Secure DevOps Pipelines
Monitoring Attack Surface to Secure DevOps Pipelines
 
Making the Strategic Shift to Open Source at Fujitsu Network Communication
Making the Strategic Shift to Open Source at Fujitsu Network CommunicationMaking the Strategic Shift to Open Source at Fujitsu Network Communication
Making the Strategic Shift to Open Source at Fujitsu Network Communication
 
Secure DevOps with ThreadFix 2.3
Secure DevOps with ThreadFix 2.3Secure DevOps with ThreadFix 2.3
Secure DevOps with ThreadFix 2.3
 
Programming languages and techniques for today’s embedded andIoT world
Programming languages and techniques for today’s embedded andIoT worldProgramming languages and techniques for today’s embedded andIoT world
Programming languages and techniques for today’s embedded andIoT world
 
September 13, 2016: Security in the Age of Open Source:
September 13, 2016: Security in the Age of Open Source: September 13, 2016: Security in the Age of Open Source:
September 13, 2016: Security in the Age of Open Source:
 
Black duck Software's pitch
Black duck Software's pitchBlack duck Software's pitch
Black duck Software's pitch
 
Webinar–Mobile Application Hardening Protecting Business Critical Apps
Webinar–Mobile Application Hardening Protecting Business Critical AppsWebinar–Mobile Application Hardening Protecting Business Critical Apps
Webinar–Mobile Application Hardening Protecting Business Critical Apps
 

Semelhante a OSS has taken over the enterprise: The top five OSS trends of 2015

Best practices for using open source software in the enterprise
Best practices for using open source software in the enterpriseBest practices for using open source software in the enterprise
Best practices for using open source software in the enterprise
Marcel de Vries
 

Semelhante a OSS has taken over the enterprise: The top five OSS trends of 2015 (20)

Shifting the conversation from active interception to proactive neutralization
Shifting the conversation from active interception to proactive neutralization Shifting the conversation from active interception to proactive neutralization
Shifting the conversation from active interception to proactive neutralization
 
Create code confidence for better application security
Create code confidence for better application security Create code confidence for better application security
Create code confidence for better application security
 
RVAsec Bill Weinberg Open Source Hygiene Presentation
RVAsec Bill Weinberg Open Source Hygiene PresentationRVAsec Bill Weinberg Open Source Hygiene Presentation
RVAsec Bill Weinberg Open Source Hygiene Presentation
 
Managing the Software Supply Chain: Policies that Promote Innovation While Op...
Managing the Software Supply Chain: Policies that Promote Innovation While Op...Managing the Software Supply Chain: Policies that Promote Innovation While Op...
Managing the Software Supply Chain: Policies that Promote Innovation While Op...
 
Continuous security: Bringing agility to the secure development lifecycle
Continuous security: Bringing agility to the secure development lifecycleContinuous security: Bringing agility to the secure development lifecycle
Continuous security: Bringing agility to the secure development lifecycle
 
#OSSPARIS19 - Understanding Open Source Governance - Gilles Gravier, Wipro Li...
#OSSPARIS19 - Understanding Open Source Governance - Gilles Gravier, Wipro Li...#OSSPARIS19 - Understanding Open Source Governance - Gilles Gravier, Wipro Li...
#OSSPARIS19 - Understanding Open Source Governance - Gilles Gravier, Wipro Li...
 
Open Source Support
Open Source SupportOpen Source Support
Open Source Support
 
Identifying and managing the risks of open source software for PHP developers
Identifying and managing the risks of open source software for PHP developersIdentifying and managing the risks of open source software for PHP developers
Identifying and managing the risks of open source software for PHP developers
 
Open Source Outlook: Expected Developments for 2016
Open Source Outlook: Expected Developments for 2016Open Source Outlook: Expected Developments for 2016
Open Source Outlook: Expected Developments for 2016
 
Breaking Free from Proprietary Gravitational Pull
Breaking Free from Proprietary Gravitational PullBreaking Free from Proprietary Gravitational Pull
Breaking Free from Proprietary Gravitational Pull
 
Cyber security - It starts with the embedded system
Cyber security - It starts with the embedded systemCyber security - It starts with the embedded system
Cyber security - It starts with the embedded system
 
Open Source All The Things
Open Source All The ThingsOpen Source All The Things
Open Source All The Things
 
The road towards better automotive cybersecurity
The road towards better automotive cybersecurityThe road towards better automotive cybersecurity
The road towards better automotive cybersecurity
 
Top 5 best practice for delivering secure in-vehicle software
Top 5 best practice for delivering secure in-vehicle softwareTop 5 best practice for delivering secure in-vehicle software
Top 5 best practice for delivering secure in-vehicle software
 
Software Security Assurance for DevOps
Software Security Assurance for DevOpsSoftware Security Assurance for DevOps
Software Security Assurance for DevOps
 
Software Security Assurance for Devops
Software Security Assurance for DevopsSoftware Security Assurance for Devops
Software Security Assurance for Devops
 
Best practices for using open source software in the enterprise
Best practices for using open source software in the enterpriseBest practices for using open source software in the enterprise
Best practices for using open source software in the enterprise
 
Open Source evaluation: A comprehensive guide on what you are using
Open Source evaluation: A comprehensive guide on what you are usingOpen Source evaluation: A comprehensive guide on what you are using
Open Source evaluation: A comprehensive guide on what you are using
 
Open DevSecOps 2019 - Securing the Software Supply Chain - Sonatype
Open DevSecOps 2019 - Securing the Software Supply Chain - SonatypeOpen DevSecOps 2019 - Securing the Software Supply Chain - Sonatype
Open DevSecOps 2019 - Securing the Software Supply Chain - Sonatype
 
Create code confidence for better application security
Create code confidence for better application securityCreate code confidence for better application security
Create code confidence for better application security
 

Mais de Rogue Wave Software

Mais de Rogue Wave Software (20)

The Global Influence of Open Banking, API Security, and an Open Data Perspective
The Global Influence of Open Banking, API Security, and an Open Data PerspectiveThe Global Influence of Open Banking, API Security, and an Open Data Perspective
The Global Influence of Open Banking, API Security, and an Open Data Perspective
 
No liftoff, touchdown, or heartbeat shall miss because of a software failure
No liftoff, touchdown, or heartbeat shall miss because of a software failureNo liftoff, touchdown, or heartbeat shall miss because of a software failure
No liftoff, touchdown, or heartbeat shall miss because of a software failure
 
Disrupt or be disrupted – Using secure APIs to drive digital transformation
Disrupt or be disrupted – Using secure APIs to drive digital transformationDisrupt or be disrupted – Using secure APIs to drive digital transformation
Disrupt or be disrupted – Using secure APIs to drive digital transformation
 
Leveraging open banking specifications for rigorous API security – What’s in...
Leveraging open banking specifications for rigorous API security –  What’s in...Leveraging open banking specifications for rigorous API security –  What’s in...
Leveraging open banking specifications for rigorous API security – What’s in...
 
Adding layers of security to an API in real-time
Adding layers of security to an API in real-timeAdding layers of security to an API in real-time
Adding layers of security to an API in real-time
 
Getting the most from your API management platform: A case study
Getting the most from your API management platform: A case studyGetting the most from your API management platform: A case study
Getting the most from your API management platform: A case study
 
Advanced technologies and techniques for debugging HPC applications
Advanced technologies and techniques for debugging HPC applicationsAdvanced technologies and techniques for debugging HPC applications
Advanced technologies and techniques for debugging HPC applications
 
The forgotten route: Making Apache Camel work for you
The forgotten route: Making Apache Camel work for youThe forgotten route: Making Apache Camel work for you
The forgotten route: Making Apache Camel work for you
 
Are open source and embedded software development on a collision course?
Are open source and embedded software development on a  collision course?Are open source and embedded software development on a  collision course?
Are open source and embedded software development on a collision course?
 
Three big mistakes with APIs and microservices
Three big mistakes with APIs and microservices Three big mistakes with APIs and microservices
Three big mistakes with APIs and microservices
 
5 strategies for enterprise cloud infrastructure success
5 strategies for enterprise cloud infrastructure success5 strategies for enterprise cloud infrastructure success
5 strategies for enterprise cloud infrastructure success
 
PSD2 & Open Banking: How to go from standards to implementation and compliance
PSD2 & Open Banking: How to go from standards to implementation and compliancePSD2 & Open Banking: How to go from standards to implementation and compliance
PSD2 & Open Banking: How to go from standards to implementation and compliance
 
Java 10 and beyond: Keeping up with the language and planning for the future
Java 10 and beyond: Keeping up with the language and planning for the futureJava 10 and beyond: Keeping up with the language and planning for the future
Java 10 and beyond: Keeping up with the language and planning for the future
 
How to keep developers happy and lawyers calm (Presented at ESC Boston)
How to keep developers happy and lawyers calm (Presented at ESC Boston)How to keep developers happy and lawyers calm (Presented at ESC Boston)
How to keep developers happy and lawyers calm (Presented at ESC Boston)
 
Open source applied - Real world use cases (Presented at Open Source 101)
Open source applied - Real world use cases (Presented at Open Source 101)Open source applied - Real world use cases (Presented at Open Source 101)
Open source applied - Real world use cases (Presented at Open Source 101)
 
How to migrate SourcePro apps from Solaris to Linux
How to migrate SourcePro apps from Solaris to LinuxHow to migrate SourcePro apps from Solaris to Linux
How to migrate SourcePro apps from Solaris to Linux
 
Approaches to debugging mixed-language HPC apps
Approaches to debugging mixed-language HPC appsApproaches to debugging mixed-language HPC apps
Approaches to debugging mixed-language HPC apps
 
Enterprise Linux: Justify your migration from Red Hat to CentOS
Enterprise Linux: Justify your migration from Red Hat to CentOSEnterprise Linux: Justify your migration from Red Hat to CentOS
Enterprise Linux: Justify your migration from Red Hat to CentOS
 
Walk through an enterprise Linux migration
Walk through an enterprise Linux migrationWalk through an enterprise Linux migration
Walk through an enterprise Linux migration
 
How to keep developers happy and lawyers calm
How to keep developers happy and lawyers calmHow to keep developers happy and lawyers calm
How to keep developers happy and lawyers calm
 

Último

Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...
Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...
Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...
Medical / Health Care (+971588192166) Mifepristone and Misoprostol tablets 200mg
 
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
masabamasaba
 
Abortion Pills In Pretoria ](+27832195400*)[ 🏥 Women's Abortion Clinic In Pre...
Abortion Pills In Pretoria ](+27832195400*)[ 🏥 Women's Abortion Clinic In Pre...Abortion Pills In Pretoria ](+27832195400*)[ 🏥 Women's Abortion Clinic In Pre...
Abortion Pills In Pretoria ](+27832195400*)[ 🏥 Women's Abortion Clinic In Pre...
Medical / Health Care (+971588192166) Mifepristone and Misoprostol tablets 200mg
 
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
masabamasaba
 

Último (20)

WSO2CON 2024 - Does Open Source Still Matter?
WSO2CON 2024 - Does Open Source Still Matter?WSO2CON 2024 - Does Open Source Still Matter?
WSO2CON 2024 - Does Open Source Still Matter?
 
What Goes Wrong with Language Definitions and How to Improve the Situation
What Goes Wrong with Language Definitions and How to Improve the SituationWhat Goes Wrong with Language Definitions and How to Improve the Situation
What Goes Wrong with Language Definitions and How to Improve the Situation
 
VTU technical seminar 8Th Sem on Scikit-learn
VTU technical seminar 8Th Sem on Scikit-learnVTU technical seminar 8Th Sem on Scikit-learn
VTU technical seminar 8Th Sem on Scikit-learn
 
Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...
Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...
Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...
 
WSO2CON2024 - It's time to go Platformless
WSO2CON2024 - It's time to go PlatformlessWSO2CON2024 - It's time to go Platformless
WSO2CON2024 - It's time to go Platformless
 
WSO2CON 2024 - Navigating API Complexity: REST, GraphQL, gRPC, Websocket, Web...
WSO2CON 2024 - Navigating API Complexity: REST, GraphQL, gRPC, Websocket, Web...WSO2CON 2024 - Navigating API Complexity: REST, GraphQL, gRPC, Websocket, Web...
WSO2CON 2024 - Navigating API Complexity: REST, GraphQL, gRPC, Websocket, Web...
 
Devoxx UK 2024 - Going serverless with Quarkus, GraalVM native images and AWS...
Devoxx UK 2024 - Going serverless with Quarkus, GraalVM native images and AWS...Devoxx UK 2024 - Going serverless with Quarkus, GraalVM native images and AWS...
Devoxx UK 2024 - Going serverless with Quarkus, GraalVM native images and AWS...
 
WSO2Con2024 - Hello Choreo Presentation - Kanchana
WSO2Con2024 - Hello Choreo Presentation - KanchanaWSO2Con2024 - Hello Choreo Presentation - Kanchana
WSO2Con2024 - Hello Choreo Presentation - Kanchana
 
WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...
WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...
WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...
 
%in Soweto+277-882-255-28 abortion pills for sale in soweto
%in Soweto+277-882-255-28 abortion pills for sale in soweto%in Soweto+277-882-255-28 abortion pills for sale in soweto
%in Soweto+277-882-255-28 abortion pills for sale in soweto
 
%in Benoni+277-882-255-28 abortion pills for sale in Benoni
%in Benoni+277-882-255-28 abortion pills for sale in Benoni%in Benoni+277-882-255-28 abortion pills for sale in Benoni
%in Benoni+277-882-255-28 abortion pills for sale in Benoni
 
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...
 
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
 
Abortion Pills In Pretoria ](+27832195400*)[ 🏥 Women's Abortion Clinic In Pre...
Abortion Pills In Pretoria ](+27832195400*)[ 🏥 Women's Abortion Clinic In Pre...Abortion Pills In Pretoria ](+27832195400*)[ 🏥 Women's Abortion Clinic In Pre...
Abortion Pills In Pretoria ](+27832195400*)[ 🏥 Women's Abortion Clinic In Pre...
 
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
 
WSO2CON 2024 - Freedom First—Unleashing Developer Potential with Open Source
WSO2CON 2024 - Freedom First—Unleashing Developer Potential with Open SourceWSO2CON 2024 - Freedom First—Unleashing Developer Potential with Open Source
WSO2CON 2024 - Freedom First—Unleashing Developer Potential with Open Source
 
Architecture decision records - How not to get lost in the past
Architecture decision records - How not to get lost in the pastArchitecture decision records - How not to get lost in the past
Architecture decision records - How not to get lost in the past
 
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
 
%in Rustenburg+277-882-255-28 abortion pills for sale in Rustenburg
%in Rustenburg+277-882-255-28 abortion pills for sale in Rustenburg%in Rustenburg+277-882-255-28 abortion pills for sale in Rustenburg
%in Rustenburg+277-882-255-28 abortion pills for sale in Rustenburg
 
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
 

OSS has taken over the enterprise: The top five OSS trends of 2015

  • 1. OSS has taken over the enterprise: The top five OSS trends of 2015 Richard Sherrard director of product management
  • 2. Richard Sherrard director of product management Presenters Rogue Wave Software 2© 2015 Rogue Wave Software, Inc. All Rights Reserved.
  • 3. Top five open source trends of 2015
  • 4. Open source trends we’ve seen in 2015 © 2015 Rogue Wave Software, Inc. All Rights Reserved. • Open source has taken over the enterprise • Open source discovery challenges • Open source risk management • Open source governance • Multi-tiered approach to open source management 4
  • 5. #1 Open source has taken over the enterprise
  • 6. Growth of open source © 2015 Rogue Wave Software, Inc. All Rights Reserved. 6 Use of open source continues to grow at a fast pace! 90% of companies use OSS components in commercial software (Gartner) >80% of a typical Java application is open- source components and frameworks (TechCrunch) 11 million developers worldwide make 13 billion open source requests each year
  • 7. Innovation drives open source adoption 7  Open source components provide critical functionality  Improves developer productivity No license fees  “More eyes” improves quality & security Leveraged development effort  Apache, Tomcat, Wildfly, Jakarta Commons, jQuery  Communities continuously improve features Mature, commoditized applications and libraries Community peer review © 2015 Rogue Wave Software, Inc. All Rights Reserved.
  • 8. Open source in the enterprise 8 “By 2016, open source software will be in mission-critical software portfolios within 99% of all Global 1,000 enterprises.” Innovate • Opens up code options • Deploy applications with any combination of code source • Optimize developer effort and time • Quicker time to market Identify and mitigate risk • Technical risk • Business risk • Security risk • Legal and compliance risk Balance risk and reward © 2015 Rogue Wave Software, Inc. All Rights Reserved.
  • 9. How open source enters your codebase 9 “90% of code in modern applications is open source” and “31% of companies have had or suspect a breach in an open source component“ Open source community Legacy code Internally developed code Reused code Third party code Supply chain code Outsource code © 2015 Rogue Wave Software, Inc. All Rights Reserved. Delivered code
  • 10. Mixed source risks 10© 2015 Rogue Wave Software, Inc. All Rights Reserved. Loss of intellectual property Defects and quality issues License restrictions and obligations Support costs Security vulnerabilities Injunctions
  • 11. What organizations are looking to answer? 11 Dev VP & Mgr OSS Compliance Mgr CTO/ CIO/CISO Security Mgr Legal What open source am I using Where are we using open source across the organization How can I increase the security of the open source What are my legal obligations Are we able to participate in the open source communities © 2015 Rogue Wave Software, Inc. All Rights Reserved.
  • 12. Embrace OSS and automate the governance process 12 Create an automated organization-wide OSS policy and leverage the benefits • Increase developer productivity • Educate and develop OSS policies for the developers to follow • Marshal the resources of the OSS community • Accelerate software development Understand, manage, and govern OSS comprehensively Inventory Support Govern © 2015 Rogue Wave Software, Inc. All Rights Reserved.
  • 14. Large codebases: Open source is everywhere 14 • Companies today have extremely large codebases made up of 1000’s of developed applications. • Lots of different technologies in play – web, mobile, embedded • Larger number of 3rd party software suppliers being used today Over 100 million lines of code goes into a average high end car today! © 2015 Rogue Wave Software, Inc. All Rights Reserved.
  • 15. Into the “unknown” 15 • Once DISCOVERY of the open source is known you can then better understand it – What license(s) is it distributed under – GPL, Apache, BSD… – What version(s) are being used; are they outdated! – Are there known security risks – Do I have quality issues with it – Is their a strong community behind it! • A plan of action can then be worked on to resolve identified risks and issues – There will be many! Biggest open source challenge organizations face today is the “Not knowing” what they have and “Where they have it” © 2015 Rogue Wave Software, Inc. All Rights Reserved.
  • 16. How are they doing discovery today? 16 • Companies find it extremely hard if not impossible to uncover where open source is being used across the organization • It is a very ad hoc process across the organization • Manual code reviews can take multiple man years to complete. • Surveying or interviewing the development teams is slow and inaccurate as developers leave and move on • Larger number of 3rd party software suppliers being used today © 2015 Rogue Wave Software, Inc. All Rights Reserved.
  • 17. Automate the discovery of open source 17 Automated OSS Scanning SDLC Integrations OSS Approvals © 2015 Rogue Wave Software, Inc. All Rights Reserved.
  • 18. Automate discovery of your open source 18 • Discovery by scanning your code • Conduct scan in-place – access code where it is • Run baseline and delta scans on your code • Identify the “right” project • Multiple matching techniques to find projects, files, snippets, modified code • Patented noise reduction techniques to avoid false positives, pinpoint the “right” project • Search for the “right” OSS for your needs • Large knowledgebase of OSS • Rich information about the package • Automated approval policy for OSS usage • Integrate into the SDLC • Continuous Integration builds enable on-going automation of your code scanning Get a comprehensive view of OSS across projects & teams © 2015 Rogue Wave Software, Inc. All Rights Reserved.
  • 20. Assessing risk in open source 20 For all its benefits, risks exist Legal risk Using the wrong license can compromise IP Security risk The OSS component can include vulnerabilities Support risk Who do you call for help? © 2015 Rogue Wave Software, Inc. All Rights Reserved.
  • 21. Cisco’s loss of IP 21 •Used GPL code to customize Broadcom's Linux distribution CyberTan • Embedded the code in chipset Broadcom • Adopted this into its WRT54G router Linksys •Bought Linksys for $500m •FSF Accused Cisco of license violation •Source code made available CISCO Developers modified firmware turning a low- end ($60) device into a high functioning router © 2015 Rogue Wave Software, Inc. All Rights Reserved.
  • 22. Unknown OSS and security issues 22© 2015 Rogue Wave Software, Inc. All Rights Reserved.
  • 23. Code vulnerabilities 23© 2015 Rogue Wave Software, Inc. All Rights Reserved.
  • 24. Lack of open source support 24 • Open source software does not come with commercial support; you are dependent upon the OSS communities to provide you help and fixes • Who do you call when your “Mission Critical” open source application has an issue?...“No throat to choke”! • Developers have to negotiate wasted cycles and downtime while waiting for fixes from the community • Developers do not have anyone to help with risks and development pitfalls • No formal training provided on the OSS package © 2015 Rogue Wave Software, Inc. All Rights Reserved.
  • 25. Managing OSS risk 25 20% of organizations lack meaningful controls over OSS selection and use of developers need not prove security of OSS they are using of the organizations claim to track vulnerabilities in OSS over time 76% 80% Increased use + few controls = unmanaged risk © 2015 Rogue Wave Software, Inc. All Rights Reserved.
  • 26. Open source support 26 • With the ubiquity of open source, enterprises need commercial-grade support. • We are the only vendor offering 24x7 support across hundreds of OSS packages. • Our “Tier 4” support gives you one call access to enterprise architects, tackling a range of challenging and critical issues. • We are thought leaders in the industry, and can provide enormous value to any business that utilizes open source software. © 2015 Rogue Wave Software, Inc. All Rights Reserved.
  • 27. Value of open source support 27 Support offerings range across hundreds of open source products. We help customers:  Avoid downtime and wasted cycles  Navigate complex OSS packages requiring broad and deep expertise  Mitigate risks and development pitfalls  Receive formal, instructor-led training across several OSS packages  Gain the peace of mind that comes with 24X7 support coverage © 2015 Rogue Wave Software, Inc. All Rights Reserved.
  • 28. We support the best of open source 28© 2015 Rogue Wave Software, Inc. All Rights Reserved.
  • 30. OSS best practices 30 Acquisition & Approval Support & Maintenance Tracking Audit & Governance Training Legal Compliance Community Interaction Acquisition & Approval Support & Maintenance Tracking Audit & Governance Training Legal Compliance Community Interaction Consulting Certified library request & approval process SLA support OpenUpdate Project tracking Auditing services License obligation audit Certification services Technical and OSS training OSS Policy © 2015 Rogue Wave Software, Inc. All Rights Reserved.
  • 31. Manual OSS process 31 Web search Ask around Check the spreadsheet Answer questions Security review Update spreadsheet Contact legal Fill out form Advocate Monitor security alerts Where Used? Code Review Rewrite Wait Wait Arch. review Other approval boards Monitor updates to components Select Approve Monitor Discover Inventory © 2015 Rogue Wave Software, Inc. All Rights Reserved.
  • 32. OSS management process 32 Select Discover ApproveInventory Monitor © 2015 Rogue Wave Software, Inc. All Rights Reserved.
  • 33. Approve your OSS 33 Requirement: Workflows reflect policies Request and approval workflow – Fully customizable, flexible workflow engine • Create workflows that match the way teams work • Forms that ask the questions you need to approve requests • Support complex workflows with serial or parallel reviewers • Track OSS by use, what, where, when, how and who Flexible OSS policy management – Effectively communicate policies to all employees • Easily create policies based on combination of OSS package, version and license • Auto approve or deny requests based on usage model © 2015 Rogue Wave Software, Inc. All Rights Reserved.
  • 34. Inventory and monitor your OSS 34 Requirement: Understand what you have, learn about it and where you have it See OSS inventory by project – Policy violations – Combined lists of both approved, known OSS, and newly discovered OSS via scanning – Comprehensive OSS Bill of Materials Continuously monitor OSS for security vulnerabilities and updates – Automatic: Daily updates via link to National Vulnerability Database (NVD) to list all know CVEs by OSS package – Manual: Daily updates on new security vulnerabilities from OSS experts after reviewing of hundreds of packages © 2015 Rogue Wave Software, Inc. All Rights Reserved.
  • 35. #5 Multi tiered approach to open source management
  • 36. Multiple approaches to managing open source 36 • Finding issues late and maybe in production are very expensive to resolve • Not able to dig deeper into your code to find potential problems • Not able to fix issues on open source in use • Continuous architecture and package reviews to stay on top of the latest technology © 2015 Rogue Wave Software, Inc. All Rights Reserved.
  • 37. Static code analysis 37 Significantly reduces the cost of reliable, secure software • Complements existing testing approaches • Automated and repeatable analysis Enforces key industry standards • DISA STIG, CWE, MISRA • CERT, SAMATE • OWASP, DO-178B, FDA validation • ...and more © 2015 Rogue Wave Software, Inc. All Rights Reserved.
  • 38. Dynamic code analysis 38 • Interactive debugging • Interactive memory debugging • Reverse debugging • Unattended debugging • Serial and parallel applications © 2015 Rogue Wave Software, Inc. All Rights Reserved.
  • 40. Open source is everywhere! 40 Open source can no longer be avoided in your application development Learn to embrace the usage of open source Need to understand what you have and where you have it Open source is not “FREE” and comes with it own risks and rewards With out checks & balances in place, open source chaos will arise Take a multi pronged approach to managing open source © 2015 Rogue Wave Software, Inc. All Rights Reserved.
  • 41. Rogue Wave capabilities 41© 2015 Rogue Wave Software, Inc. All Rights Reserved.
  • 42. What we do 42 Rogue Wave helps organizations simplify complex software development, improve code quality, and shorten cycle times © 2015 Rogue Wave Software, Inc. All Rights Reserved.
  • 43. See us in action: www.roguewave.com Richard Sherrard richard.sherrard@roguewave.com