These are generally called "application compliance" or "application quality assurance" tools; I work for a Fortune...
By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
500 company and we use the term application quality assurance tools. In our case we have off-the-shelf tools that manage application changes through a "code checkout" process (developers must log when code is being edited or is in use, and then denote when the work is finished) that is followed by a scan of the application changes that have been "checked in" for security and quality compliance.
There are actually many off-the-shelf products that do this type of quality control. CA Inc., EMC Corp., IBM, Oracle Corp. and others have some form of application change control and/or monitoring software. But keep in mind, this software can come in two forms -- real-time or periodic audit discovery -- and you have to decide if your enterprise needs one or both functions. Real-time systems manage and control developer access and changes (similar to the off-the-shelf tools I described above), and then there are audit-discovery tools that periodically go out into the infrastructure, detect changes on applications and systems, and generate reports on any changes detected, usually in audit report format. The change-control tools are mature, but the audit-discovery tools are still fairly new, and their capabilities vary as to how well they can capture change information, especially in a complex, large and diversified environment like those found in many Fortune 500 companies.
For more information:
- How can quality assurance tools aid software development? Read more.
- Learn more about testing software with automated quality assurance tools.
Dig Deeper on Privileged access management
Related Q&A from Randall Gamby
Enterprise SSO products have matured over the years, so what's the state of eSSO today? Expert Randall Gamby discusses.continue reading
Enterprises need a full understanding of the FIDO authentication framework before switching to its technology. Expert Randall Gamby looks at the most...continue reading
A self-managed HSM appliance may be the safer external key management system to use with your organization's encryption keys. Here's why.continue reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.