{"payload":{"contentfulRawJsonResponse":{"sys":{"type":"Array"},"total":1,"skip":0,"limit":100,"items":[{"metadata":{"tags":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"8aevphvgewt8"}},"id":"2zBXTdoFvNsYVpDSzdYmBa","type":"Entry","createdAt":"2024-02-29T15:35:03.335Z","updatedAt":"2024-06-15T02:42:49.343Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"revision":3,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"containerPage"}},"locale":"en-US"},"fields":{"title":"Enterprise AppSec with GitHub Advanced Security","path":"/solutions/devsecops","template":{"sys":{"type":"Link","linkType":"Entry","id":"5AdK1hLKm4V5M3KfpQex47"}},"settings":{"sys":{"type":"Link","linkType":"Entry","id":"2f42NFoFdKEHFA6yBRP4MT"}},"seo":{"sys":{"type":"Link","linkType":"Entry","id":"2sqcDLLBO4qu28pOChOzjt"}}}}],"includes":{"Entry":[{"metadata":{"tags":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"8aevphvgewt8"}},"id":"0TKRXselVkkVeJPvqQ9QJ","type":"Entry","createdAt":"2024-02-29T15:49:42.315Z","updatedAt":"2024-06-11T13:48:39.527Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"revision":5,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"primerComponentRiver"}},"locale":"en-US"},"fields":{"title":"/solutions/devsecops River - Your workflows, your way. ","align":"end","imageTextRatio":"60:40","heading":"Your workflows, your way","text":{"data":{},"content":[{"data":{},"content":[{"data":{},"marks":[],"value":"With support for more than 17,000 app integrations, GitHub Advanced Security accommodates your team’s tooling preferences.","nodeType":"text"}],"nodeType":"paragraph"},{"data":{},"content":[{"data":{},"marks":[],"value":"\n","nodeType":"text"}],"nodeType":"paragraph"}],"nodeType":"document"},"callToAction":{"sys":{"type":"Link","linkType":"Entry","id":"6yS0kWNWu8ELjN2oR57TSu"}},"image":{"sys":{"type":"Link","linkType":"Asset","id":"35MGk5wBo8n5z6Ut7THgIq"}},"hasShadow":false}},{"metadata":{"tags":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"8aevphvgewt8"}},"id":"18xTCWgo40Y1Giv5Pju6Dy","type":"Entry","createdAt":"2024-02-29T16:06:32.971Z","updatedAt":"2024-06-11T13:48:40.080Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"revision":4,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"primerComponentCard"}},"locale":"en-US"},"fields":{"title":"Discover how AI is changing the security landscape.","href":"https://resources.github.com/security/transforming-application-security-with-ai/","heading":"Discover how AI is changing the security landscape","description":{"data":{},"content":[{"data":{},"content":[{"data":{},"marks":[],"value":"From prevention to remediation, see how AI can help fix issues instantly.","nodeType":"text"}],"nodeType":"paragraph"}],"nodeType":"document"},"ctaText":"Watch webinar","icon":"book","iconBackground":false,"iconColor":"default"}},{"metadata":{"tags":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"8aevphvgewt8"}},"id":"19pBUsFw7nW7sncaVCqMXR","type":"Entry","createdAt":"2024-02-29T15:43:25.026Z","updatedAt":"2024-06-07T17:19:06.979Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"revision":5,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"primerComponentPillar"}},"locale":"en-US"},"fields":{"title":"Secret scanning","align":"center","icon":"shield-slash","heading":"Secret scanning","description":{"data":{},"content":[{"data":{},"content":[{"data":{},"marks":[],"value":"Hunt, revoke, and prevent leaked secrets with automatic push protection.","nodeType":"text"}],"nodeType":"paragraph"}],"nodeType":"document"}}},{"metadata":{"tags":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"8aevphvgewt8"}},"id":"1MBwG4z3aA4DfrQnv4JMIg","type":"Entry","createdAt":"2024-05-17T15:31:10.077Z","updatedAt":"2024-05-17T15:31:10.077Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"revision":1,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"link"}},"locale":"en-US"},"fields":{"text":"Discover Azure DevOps security","href":"https://resources.github.com/security/github-advanced-security-for-azure-devops/","openInNewTab":false}},{"metadata":{"tags":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"8aevphvgewt8"}},"id":"1YCu5itFkbNfm7ex8TZ18e","type":"Entry","createdAt":"2024-05-17T15:31:09.577Z","updatedAt":"2024-05-17T15:31:09.577Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"revision":1,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"link"}},"locale":"en-US"},"fields":{"text":"Discover GitHub Copilot","href":"https://github.com/features/copilot","openInNewTab":false}},{"metadata":{"tags":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"8aevphvgewt8"}},"id":"1c6Hjrzqs1aLjC6hNcsthM","type":"Entry","createdAt":"2024-05-17T18:49:58.804Z","updatedAt":"2024-05-17T18:51:24.222Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"revision":2,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"primerComponentFaqBlock"}},"locale":"en-US"},"fields":{"title":"/solutions/devsecops FAQ","questions":[{"sys":{"type":"Link","linkType":"Entry","id":"21gNvN06pZeQTWwYeTDjeO"}},{"sys":{"type":"Link","linkType":"Entry","id":"vq2b6XqCX6f5oXPP9cdN2"}}]}},{"metadata":{"tags":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"8aevphvgewt8"}},"id":"21gNvN06pZeQTWwYeTDjeO","type":"Entry","createdAt":"2024-05-17T18:49:58.896Z","updatedAt":"2024-05-17T18:49:58.896Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"revision":1,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"primerComponentFaqQuestion"}},"locale":"en-US"},"fields":{"title":"(1) Fix vulnerabilities up to 7x faster than those using third-party tools.","question":"(1) Fix vulnerabilities up to 7x faster than those using third-party tools.","answer":{"nodeType":"document","data":{},"content":[{"nodeType":"paragraph","data":{},"content":[{"nodeType":"text","value":"Based on data from the industry’s longest running analysis of fix rates, Veracode State of Software Security 2023. Developers with GitHub Advanced Security fix 48% of vulnerabilities in real time, more than 7x faster than the industry average, where it takes 198 days to reach a 50% fix rate.","marks":[],"data":{}}]}]}}},{"metadata":{"tags":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"8aevphvgewt8"}},"id":"29vwruYwTEOekgbXjgMdKL","type":"Entry","createdAt":"2024-02-29T15:49:41.800Z","updatedAt":"2024-05-29T10:57:23.190Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"revision":4,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"primerComponentTimeline"}},"locale":"en-US"},"fields":{"title":"/solutions/devsecops River Breakout Timeline","blocks":[{"sys":{"type":"Link","linkType":"Entry","id":"3DYrNCSbiUdYenCSavF9WR"}},{"sys":{"type":"Link","linkType":"Entry","id":"6k4B6mAPGQb2KR32Imz7CR"}},{"sys":{"type":"Link","linkType":"Entry","id":"5FSuunesbWgcBhow7Hcv0W"}}],"hasFullWidth":false}},{"metadata":{"tags":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"8aevphvgewt8"}},"id":"2f42NFoFdKEHFA6yBRP4MT","type":"Entry","createdAt":"2024-02-29T15:35:03.592Z","updatedAt":"2024-06-14T11:04:13.876Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"revision":3,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"pageSettings"}},"locale":"en-US"},"fields":{"title":"/solutions/devsecops Settings","colorMode":"dark","globalNavbarStyle":"default"}},{"metadata":{"tags":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"8aevphvgewt8"}},"id":"2oJvhf0dMhOMJHO1RJ7f3b","type":"Entry","createdAt":"2024-02-29T15:43:25.045Z","updatedAt":"2024-06-07T17:19:11.233Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"revision":5,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"primerComponentPillar"}},"locale":"en-US"},"fields":{"title":"Supply chain security","align":"center","icon":"shield-lock","heading":"Supply chain security","description":{"data":{},"content":[{"data":{},"content":[{"data":{},"marks":[],"value":"Keep vulnerable dependencies out of your applications with software composition analysis (SCA).","nodeType":"text"}],"nodeType":"paragraph"},{"data":{},"content":[{"data":{},"marks":[],"value":"\n","nodeType":"text"}],"nodeType":"paragraph"}],"nodeType":"document"}}},{"metadata":{"tags":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"8aevphvgewt8"}},"id":"2sqcDLLBO4qu28pOChOzjt","type":"Entry","createdAt":"2024-06-15T02:42:47.351Z","updatedAt":"2024-06-15T02:42:47.351Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"revision":1,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"pageSeo"}},"locale":"en-US"},"fields":{"title":"SEO /solutions/devsecops","description":"With comprehensive security tools built into the developer workflow, you can build, secure, and ship all in one place."}},{"metadata":{"tags":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"8aevphvgewt8"}},"id":"38VgD0byv8OhIDwjo46yZh","type":"Entry","createdAt":"2024-02-29T16:06:32.929Z","updatedAt":"2024-06-11T13:48:39.696Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"revision":3,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"primerComponentCard"}},"locale":"en-US"},"fields":{"title":"DevSecOps explained.","href":"https://resources.github.com/devops/fundamentals/devsecops/","heading":"DevSecOps explained","description":{"data":{},"content":[{"data":{},"content":[{"data":{},"marks":[],"value":"Explore how DevSecOps builds on the ideas of DevOps by applying security practices throughout the SDLC.","nodeType":"text"}],"nodeType":"paragraph"},{"data":{},"content":[{"data":{},"marks":[],"value":"\n","nodeType":"text"}],"nodeType":"paragraph"}],"nodeType":"document"},"icon":"book","iconBackground":false,"iconColor":"default"}},{"metadata":{"tags":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"8aevphvgewt8"}},"id":"3DYrNCSbiUdYenCSavF9WR","type":"Entry","createdAt":"2024-05-29T10:57:23.227Z","updatedAt":"2024-06-07T17:15:55.341Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"revision":2,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"primerComponentTimelineBlock"}},"locale":"en-US"},"fields":{"title":"Fix vulnerabilities up to 7x faster than those using third-party tools. (1)","text":{"nodeType":"document","data":{},"content":[{"nodeType":"paragraph","data":{},"content":[{"nodeType":"text","value":"Fix vulnerabilities up to 7x faster than those using third-party tools. (1)","marks":[],"data":{}}]}]}}},{"metadata":{"tags":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"8aevphvgewt8"}},"id":"49iSf77s0yQejtlZ7aekA7","type":"Entry","createdAt":"2023-11-07T20:03:44.498Z","updatedAt":"2024-03-15T13:59:53.483Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"revision":2,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"link"}},"locale":"en-US"},"fields":{"text":"Explore GitHub Advanced Security","href":"https://github.com/enterprise/advanced-security","openInNewTab":false}},{"metadata":{"tags":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"8aevphvgewt8"}},"id":"4INsYEf1UXEJ6JvrpoE0Qn","type":"Entry","createdAt":"2024-02-29T15:35:03.503Z","updatedAt":"2024-06-11T19:43:17.949Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"revision":9,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"primerComponentHero"}},"locale":"en-US"},"fields":{"title":"/solutions/devsecops hero","align":"start","label":"GitHub DevSecOps","heading":"The AI-powered DevSecOps platform","image":{"sys":{"type":"Link","linkType":"Asset","id":"bOTn7PNGlUzb4Vra2ZNXI"}},"imagePosition":"Block","description":"With comprehensive security tools built into the developer workflow, you can build, secure, and ship all in one place. \n\n","callToActionPrimary":{"sys":{"type":"Link","linkType":"Entry","id":"527Hv1cB4wRgxfTf0AzLz"}},"callToActionSecondary":{"sys":{"type":"Link","linkType":"Entry","id":"6MPPlfhiu2QPcCkSOiWrhh"}}}},{"metadata":{"tags":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"8aevphvgewt8"}},"id":"4LDXcSOEeifuGqFmLi7EOL","type":"Entry","createdAt":"2024-02-29T15:35:03.540Z","updatedAt":"2024-06-11T13:48:39.442Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"revision":6,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"primerComponentRiver"}},"locale":"en-US"},"fields":{"title":"/solutions/devsecops River - Pump your team’s security prowess.","align":"start","imageTextRatio":"60:40","heading":"Pump your team’s security prowess","text":{"data":{},"content":[{"data":{},"content":[{"data":{},"marks":[],"value":"Developers aren’t security professionals. With GitHub Advanced Security, you can offload the technical complexity and give them the freedom to build and ship great software.","nodeType":"text"},{"data":{},"marks":[],"value":"\n","nodeType":"text"}],"nodeType":"paragraph"}],"nodeType":"document"},"callToAction":{"sys":{"type":"Link","linkType":"Entry","id":"6NcRDNG7hpW2T14eERiDec"}},"image":{"sys":{"type":"Link","linkType":"Asset","id":"2yTbRI9UPgLLRTewsJL8dG"}},"hasShadow":false}},{"metadata":{"tags":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"8aevphvgewt8"}},"id":"4nuaFKAsIYXgOWgXM0ha29","type":"Entry","createdAt":"2024-05-13T19:58:37.512Z","updatedAt":"2024-05-13T19:58:37.512Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"revision":1,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"person"}},"locale":"en-US"},"fields":{"fullName":"Emilio Escobar","position":"Chief Information Security Officer @ Datadog","photo":{"sys":{"type":"Link","linkType":"Asset","id":"6w7VtFNpK3sMJ8xnCiBCE"}}}},{"metadata":{"tags":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"8aevphvgewt8"}},"id":"4pTiiWlPEKTzRVmknYrMvW","type":"Entry","createdAt":"2024-02-29T15:49:42.298Z","updatedAt":"2024-06-11T13:48:39.486Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"revision":5,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"primerComponentRiver"}},"locale":"en-US"},"fields":{"title":"/solutions/devsecops River - Give AI the heavy lifting. ","align":"end","imageTextRatio":"60:40","heading":"Give AI the heavy lifting","text":{"data":{},"content":[{"data":{},"content":[{"data":{},"marks":[],"value":"Organizations struggle to fix their backlog of vulnerabilities, despite the risks. Coming next, security managers can burn down years of security debt in one simple sprint.","nodeType":"text"}],"nodeType":"paragraph"},{"data":{},"content":[{"data":{},"marks":[],"value":"\n","nodeType":"text"}],"nodeType":"paragraph"}],"nodeType":"document"},"callToAction":{"sys":{"type":"Link","linkType":"Entry","id":"1YCu5itFkbNfm7ex8TZ18e"}},"image":{"sys":{"type":"Link","linkType":"Asset","id":"6gbXLvWV2SKHPcKFcPcUJ1"}},"hasShadow":false}},{"metadata":{"tags":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"8aevphvgewt8"}},"id":"4xBFCzzh9GS4GnXAwhz792","type":"Entry","createdAt":"2024-02-29T15:43:25.007Z","updatedAt":"2024-06-07T17:19:02.967Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"revision":3,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"primerComponentPillar"}},"locale":"en-US"},"fields":{"title":"Code scanning","align":"center","icon":"shield-check","heading":"Code scanning","description":{"data":{},"content":[{"data":{},"content":[{"data":{},"marks":[],"value":"Find and fix security issues before production with static application security testing (SAST).","nodeType":"text"}],"nodeType":"paragraph"},{"data":{},"content":[{"data":{},"marks":[],"value":"\n","nodeType":"text"}],"nodeType":"paragraph"}],"nodeType":"document"}}},{"metadata":{"tags":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"8aevphvgewt8"}},"id":"527Hv1cB4wRgxfTf0AzLz","type":"Entry","createdAt":"2024-06-11T19:42:40.899Z","updatedAt":"2024-06-11T19:42:40.899Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"revision":1,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"link"}},"locale":"en-US"},"fields":{"text":"Contact sales","href":"https://github.com/enterprise/contact?ref_cta=Contact+sales&ref_loc=hero&ref_page=devsecops%2Fsolutions&scid=&utm_campaign=adv-security&utm_content=Security&utm_medium=site&utm_source=github","openInNewTab":false}},{"metadata":{"tags":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"8aevphvgewt8"}},"id":"5AdK1hLKm4V5M3KfpQex47","type":"Entry","createdAt":"2024-02-29T15:35:03.421Z","updatedAt":"2024-06-11T13:48:39.118Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"revision":9,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"templateF2"}},"locale":"en-US"},"fields":{"title":"/solutions/devsecops","hero":{"sys":{"type":"Link","linkType":"Entry","id":"4INsYEf1UXEJ6JvrpoE0Qn"}},"sectionIntro":{"sys":{"type":"Link","linkType":"Entry","id":"xtJRVOXPUMKcxCDJRd7DC"}},"pillars":[{"sys":{"type":"Link","linkType":"Entry","id":"4xBFCzzh9GS4GnXAwhz792"}},{"sys":{"type":"Link","linkType":"Entry","id":"19pBUsFw7nW7sncaVCqMXR"}},{"sys":{"type":"Link","linkType":"Entry","id":"2oJvhf0dMhOMJHO1RJ7f3b"}}],"rivers":[{"sys":{"type":"Link","linkType":"Entry","id":"5aO2kI8rsKzCDHYBiPSXFa"}},{"sys":{"type":"Link","linkType":"Entry","id":"4LDXcSOEeifuGqFmLi7EOL"}},{"sys":{"type":"Link","linkType":"Entry","id":"6phTHNp5AwrmJrFVA7nSzQ"}},{"sys":{"type":"Link","linkType":"Entry","id":"4pTiiWlPEKTzRVmknYrMvW"}},{"sys":{"type":"Link","linkType":"Entry","id":"0TKRXselVkkVeJPvqQ9QJ"}}],"testimonials":[{"sys":{"type":"Link","linkType":"Entry","id":"5uZWP4BF2qgMPXwxdQlnrl"}}],"ctaBanner":{"sys":{"type":"Link","linkType":"Entry","id":"7hlo0zQgsKybPqoSIqsH4d"}},"cardsHeading":"Continue learning about GitHub security","cards":[{"sys":{"type":"Link","linkType":"Entry","id":"38VgD0byv8OhIDwjo46yZh"}},{"sys":{"type":"Link","linkType":"Entry","id":"7CRxTBw1TmwbgyIJo715Qq"}},{"sys":{"type":"Link","linkType":"Entry","id":"18xTCWgo40Y1Giv5Pju6Dy"}}],"faq":{"sys":{"type":"Link","linkType":"Entry","id":"SCAYy59WJeZRNYS0Tpp6L"}}}},{"metadata":{"tags":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"8aevphvgewt8"}},"id":"5FSuunesbWgcBhow7Hcv0W","type":"Entry","createdAt":"2024-05-29T10:57:23.245Z","updatedAt":"2024-06-07T17:16:03.223Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"revision":2,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"primerComponentTimelineBlock"}},"locale":"en-US"},"fields":{"title":"Join the 20 million public and private repositories that have enabled secret scanning since 2020, according to GitHub data.","text":{"nodeType":"document","data":{},"content":[{"nodeType":"paragraph","data":{},"content":[{"nodeType":"text","value":"Join the 20 million public and private repositories that have enabled secret scanning since 2020, according to GitHub data.","marks":[],"data":{}}]},{"nodeType":"paragraph","data":{},"content":[{"nodeType":"text","value":"\n","marks":[],"data":{}}]}]}}},{"metadata":{"tags":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"8aevphvgewt8"}},"id":"5aO2kI8rsKzCDHYBiPSXFa","type":"Entry","createdAt":"2024-02-29T15:35:03.520Z","updatedAt":"2024-06-11T13:48:39.398Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"revision":14,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"primerComponentRiver"}},"locale":"en-US"},"fields":{"title":"/solutions/devsecops River - Found means fixed. ","align":"start","imageTextRatio":"60:40","heading":"Found means fixed","text":{"data":{},"content":[{"data":{},"content":[{"data":{},"marks":[],"value":"Don’t just find vulnerable code, fix it. GitHub Advanced Security flags problems and suggests AI-powered solutions, freeing teams to ship more secure software faster.","nodeType":"text"}],"nodeType":"paragraph"}],"nodeType":"document"},"callToAction":{"sys":{"type":"Link","linkType":"Entry","id":"5gINYrTtXDtncwlvDhACla"}},"image":{"sys":{"type":"Link","linkType":"Asset","id":"2HTQXiXvkVKJz4SMuntu3l"}},"hasShadow":false}},{"metadata":{"tags":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"8aevphvgewt8"}},"id":"5gINYrTtXDtncwlvDhACla","type":"Entry","createdAt":"2024-05-17T15:31:09.297Z","updatedAt":"2024-05-17T15:31:09.297Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"revision":1,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"link"}},"locale":"en-US"},"fields":{"text":"Explore AI-powered security","href":"https://resources.github.com/security/ai-powered-devsecops-checklist/","openInNewTab":false}},{"metadata":{"tags":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"8aevphvgewt8"}},"id":"5uZWP4BF2qgMPXwxdQlnrl","type":"Entry","createdAt":"2024-02-29T15:58:49.565Z","updatedAt":"2024-05-17T15:31:09.685Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"revision":2,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"primerComponentTestimonial"}},"locale":"en-US"},"fields":{"title":"We prefer to have security that leverages what developers are already using rather than trying to force them to use some other tool.","size":"small","quote":{"data":{},"content":[{"data":{},"content":[{"data":{},"marks":[],"value":"We prefer to have security that leverages what developers are already using rather than trying to force them to use some other tool.","nodeType":"text"}],"nodeType":"paragraph"},{"data":{},"content":[{"data":{},"marks":[],"value":"\n","nodeType":"text"}],"nodeType":"paragraph"}],"nodeType":"document"},"author":{"sys":{"type":"Link","linkType":"Entry","id":"4nuaFKAsIYXgOWgXM0ha29"}},"logo":{"sys":{"type":"Link","linkType":"Asset","id":"6w7VtFNpK3sMJ8xnCiBCE"}}}},{"metadata":{"tags":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"8aevphvgewt8"}},"id":"6MPPlfhiu2QPcCkSOiWrhh","type":"Entry","createdAt":"2024-05-17T15:31:08.915Z","updatedAt":"2024-05-17T15:31:08.915Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"revision":1,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"link"}},"locale":"en-US"},"fields":{"text":"Request a demo","href":"https://resources.github.com/demo/advanced-security/","openInNewTab":false}},{"metadata":{"tags":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"8aevphvgewt8"}},"id":"6NcRDNG7hpW2T14eERiDec","type":"Entry","createdAt":"2024-05-17T15:31:09.348Z","updatedAt":"2024-05-17T15:31:09.348Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"revision":1,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"link"}},"locale":"en-US"},"fields":{"text":"Discover code scanning autofix","href":"https://github.blog/2024-03-20-found-means-fixed-introducing-code-scanning-autofix-powered-by-github-copilot-and-codeql/","openInNewTab":false}},{"metadata":{"tags":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"8aevphvgewt8"}},"id":"6k4B6mAPGQb2KR32Imz7CR","type":"Entry","createdAt":"2024-02-29T15:49:42.095Z","updatedAt":"2024-06-07T17:15:52.119Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"revision":5,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"primerComponentTimelineBlock"}},"locale":"en-US"},"fields":{"title":"Keep new vulnerabilities out of your code","text":{"nodeType":"document","data":{},"content":[{"nodeType":"paragraph","data":{},"content":[{"nodeType":"text","value":"Find leaked secrets with 2.4 fewer false positives than the industry standard. (2)","marks":[],"data":{}}]}]}}},{"metadata":{"tags":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"8aevphvgewt8"}},"id":"6phTHNp5AwrmJrFVA7nSzQ","type":"Entry","createdAt":"2024-02-29T15:49:41.735Z","updatedAt":"2024-06-07T17:15:13.080Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"revision":8,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"primerComponentRiverBreakout"}},"locale":"en-US"},"fields":{"title":"/solutions/devsecops River Breakout - Fix vulnerabilities up to 7x faster than those using third-party tools.1","a11yHeading":"Fix vulnerabilities up to 7x faster than those using third-party tools.1","image":{"sys":{"type":"Link","linkType":"Asset","id":"6Ia7O6lk8a6gu4xyNCoIY7"}},"text":{"nodeType":"document","data":{},"content":[{"nodeType":"paragraph","data":{},"content":[{"nodeType":"text","value":"Keep developers in the flow. ","marks":[{"type":"bold"}],"data":{}},{"nodeType":"text","value":"GitHub Advanced Security enables developers to stay in their productivity-and-comfort zone, without demanding a high level of security expertise. ","marks":[],"data":{}}]}]},"trailingComponent":{"sys":{"type":"Link","linkType":"Entry","id":"29vwruYwTEOekgbXjgMdKL"}},"hasShadow":false}},{"metadata":{"tags":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"8aevphvgewt8"}},"id":"6yS0kWNWu8ELjN2oR57TSu","type":"Entry","createdAt":"2024-05-17T15:31:09.672Z","updatedAt":"2024-05-17T15:31:09.672Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"revision":1,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"link"}},"locale":"en-US"},"fields":{"text":"Explore GitHub Marketplace","href":"https://github.com/marketplace","openInNewTab":false}},{"metadata":{"tags":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"8aevphvgewt8"}},"id":"75KJsMktuWk43miIFzltNu","type":"Entry","createdAt":"2024-05-17T18:50:05.807Z","updatedAt":"2024-06-11T19:38:14.982Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"revision":2,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"primerComponentFaq"}},"locale":"en-US"},"fields":{"title":"/solutions/devsecops FAQ","heading":" ","blocks":[{"sys":{"type":"Link","linkType":"Entry","id":"1c6Hjrzqs1aLjC6hNcsthM"}}]}},{"metadata":{"tags":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"8aevphvgewt8"}},"id":"7CRxTBw1TmwbgyIJo715Qq","type":"Entry","createdAt":"2024-02-29T16:06:32.951Z","updatedAt":"2024-06-11T13:48:39.778Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"revision":3,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"primerComponentCard"}},"locale":"en-US"},"fields":{"title":"Meet the companies who build with unified DevSecOps.","href":"https://github.com/customer-stories/enterprise?feature=GitHub%2BAdvanced%2BSecurity#browse","heading":"Meet the companies who build with unified DevSecOps","description":{"data":{},"content":[{"data":{},"content":[{"data":{},"marks":[],"value":"Leading organizations choose GitHub to plan, build, secure, and ship software.","nodeType":"text"}],"nodeType":"paragraph"},{"data":{},"content":[{"data":{},"marks":[],"value":"\n","nodeType":"text"}],"nodeType":"paragraph"}],"nodeType":"document"},"ctaText":"Read customer stories","icon":"book","iconBackground":false,"iconColor":"default"}},{"metadata":{"tags":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"8aevphvgewt8"}},"id":"7hlo0zQgsKybPqoSIqsH4d","type":"Entry","createdAt":"2024-02-29T15:35:03.556Z","updatedAt":"2024-06-11T13:48:39.579Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"revision":4,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"primerComponentCtaBanner"}},"locale":"en-US"},"fields":{"title":"/solutions/devsecops CTA Banner","align":"center","heading":"Application security made simpler","description":{"data":{},"content":[{"data":{},"content":[{"data":{},"marks":[],"value":"Eliminate toolchain cost and complexity with native security tools for GitHub Enterprise and Azure DevOps customers.","nodeType":"text"}],"nodeType":"paragraph"}],"nodeType":"document"},"hasBackground":true,"hasShadow":true,"hasBorder":false,"callToActionPrimary":{"sys":{"type":"Link","linkType":"Entry","id":"49iSf77s0yQejtlZ7aekA7"}},"callToActionSecondary":{"sys":{"type":"Link","linkType":"Entry","id":"1MBwG4z3aA4DfrQnv4JMIg"}}}},{"metadata":{"tags":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"8aevphvgewt8"}},"id":"SCAYy59WJeZRNYS0Tpp6L","type":"Entry","createdAt":"2024-05-17T18:50:05.791Z","updatedAt":"2024-06-11T19:38:02.848Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"revision":2,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"primerComponentFaqGroup"}},"locale":"en-US"},"fields":{"title":"/solutions/devsecops","heading":" ","faqs":[{"sys":{"type":"Link","linkType":"Entry","id":"75KJsMktuWk43miIFzltNu"}}]}},{"metadata":{"tags":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"8aevphvgewt8"}},"id":"vq2b6XqCX6f5oXPP9cdN2","type":"Entry","createdAt":"2024-05-17T18:49:58.982Z","updatedAt":"2024-05-17T18:49:58.982Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"revision":1,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"primerComponentFaqQuestion"}},"locale":"en-US"},"fields":{"title":"(2) Find leaked secrets with 2.4 fewer false positives than the industry standard.","question":"(2) Find leaked secrets with 2.4 fewer false positives than the industry standard.","answer":{"data":{},"content":[{"data":{},"content":[{"data":{},"marks":[],"value":"A Comparative Study of Software Secrets Reporting by Secret Detection Tools, Setu Kumar Basak et al., North Carolina State University, 2023.","nodeType":"text"}],"nodeType":"paragraph"},{"data":{},"content":[{"data":{},"marks":[],"value":"","nodeType":"text"}],"nodeType":"paragraph"}],"nodeType":"document"}}},{"metadata":{"tags":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"8aevphvgewt8"}},"id":"xtJRVOXPUMKcxCDJRd7DC","type":"Entry","createdAt":"2024-02-29T15:43:24.943Z","updatedAt":"2024-06-11T13:48:39.282Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"revision":8,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"primerComponentSectionIntro"}},"locale":"en-US"},"fields":{"title":"/solutions/devsecops Section Intro","align":"center","heading":{"nodeType":"document","data":{},"content":[{"nodeType":"paragraph","data":{},"content":[{"nodeType":"text","value":"Manage less, accomplish more","marks":[],"data":{}}]}]},"description":{"data":{},"content":[{"data":{},"content":[{"data":{},"marks":[],"value":"GitHub Advanced Security integrates AI-powered security features directly into your development workflow, eliminating the need for third-party tools.","nodeType":"text"}],"nodeType":"paragraph"}],"nodeType":"document"},"fullWidth":false}}],"Asset":[{"metadata":{"tags":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"8aevphvgewt8"}},"id":"2HTQXiXvkVKJz4SMuntu3l","type":"Asset","createdAt":"2024-02-29T15:35:03.309Z","updatedAt":"2024-06-10T19:56:34.369Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"revision":3,"locale":"en-US"},"fields":{"title":"Image Area (60 40)","description":"","file":{"url":"//images.ctfassets.net/8aevphvgewt8/2HTQXiXvkVKJz4SMuntu3l/6925935829f9e4cb1432556a40da95ea/ai-suggested-fix.webp","details":{"size":249886,"image":{"width":1416,"height":1020}},"fileName":"ai-suggested-fix.webp","contentType":"image/webp"}}},{"metadata":{"tags":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"8aevphvgewt8"}},"id":"2yTbRI9UPgLLRTewsJL8dG","type":"Asset","createdAt":"2024-02-29T15:35:03.311Z","updatedAt":"2024-06-10T19:56:34.372Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"revision":3,"locale":"en-US"},"fields":{"title":"Image Area (60 40) (1)","description":"","file":{"url":"//images.ctfassets.net/8aevphvgewt8/2yTbRI9UPgLLRTewsJL8dG/a2230f0c55eec37f16be203f18a0e515/codeql-warning.webp","details":{"size":142138,"image":{"width":1416,"height":1020}},"fileName":"codeql-warning.webp","contentType":"image/webp"}}},{"metadata":{"tags":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"8aevphvgewt8"}},"id":"35MGk5wBo8n5z6Ut7THgIq","type":"Asset","createdAt":"2024-02-29T15:49:41.599Z","updatedAt":"2024-06-10T19:56:34.380Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"revision":3,"locale":"en-US"},"fields":{"title":"Image Area (60 40) (3)","description":"","file":{"url":"//images.ctfassets.net/8aevphvgewt8/35MGk5wBo8n5z6Ut7THgIq/de520feaf2b590da2ddf5bfb03605a9c/pyyaml-validation.webp","details":{"size":104828,"image":{"width":1416,"height":1020}},"fileName":"pyyaml-validation.webp","contentType":"image/webp"}}},{"metadata":{"tags":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"8aevphvgewt8"}},"id":"6Ia7O6lk8a6gu4xyNCoIY7","type":"Asset","createdAt":"2024-02-29T16:14:25.725Z","updatedAt":"2024-06-10T19:56:34.375Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"revision":4,"locale":"en-US"},"fields":{"title":"Bento (1)","description":"","file":{"url":"//images.ctfassets.net/8aevphvgewt8/6Ia7O6lk8a6gu4xyNCoIY7/306a31600b13f49a59abb3d106703e51/advisories.webp","details":{"size":176066,"image":{"width":2496,"height":1028}},"fileName":"advisories.webp","contentType":"image/webp"}}},{"metadata":{"tags":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"8aevphvgewt8"}},"id":"6gbXLvWV2SKHPcKFcPcUJ1","type":"Asset","createdAt":"2024-02-29T15:49:41.596Z","updatedAt":"2024-06-10T19:57:58.644Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"revision":4,"locale":"en-US"},"fields":{"title":"Image Area (60 40) (2)","description":"","file":{"url":"//images.ctfassets.net/8aevphvgewt8/6gbXLvWV2SKHPcKFcPcUJ1/68ff2a5381da67968a98b387f588563e/ai-suggested-fix2.webp","details":{"size":191440,"image":{"width":1416,"height":1020}},"fileName":"ai-suggested-fix2.webp","contentType":"image/webp"}}},{"metadata":{"tags":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"8aevphvgewt8"}},"id":"6w7VtFNpK3sMJ8xnCiBCE","type":"Asset","createdAt":"2024-02-29T15:58:49.476Z","updatedAt":"2024-05-13T19:58:37.268Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"revision":3,"locale":"en-US"},"fields":{"title":"Emilio Escobar avatar","description":"Emilio Escobar avatar","file":{"url":"//images.ctfassets.net/8aevphvgewt8/6w7VtFNpK3sMJ8xnCiBCE/cab41b669b94ce723462f269b2c6dae0/Emilio-Escobar-Datadog-thumbnail_1__1_.png","details":{"size":8757,"image":{"width":120,"height":120}},"fileName":"Emilio-Escobar-Datadog-thumbnail 1 (1).png","contentType":"image/png"}}},{"metadata":{"tags":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"8aevphvgewt8"}},"id":"bOTn7PNGlUzb4Vra2ZNXI","type":"Asset","createdAt":"2024-02-29T15:49:41.593Z","updatedAt":"2024-06-17T14:35:46.064Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"revision":4,"locale":"en-US"},"fields":{"title":"Bento","description":"Chart displaying decreasing security incidents, highlighted code with a suggested AI fix, and an automated update with a green button \"Review security update\"","file":{"url":"//images.ctfassets.net/8aevphvgewt8/bOTn7PNGlUzb4Vra2ZNXI/74c0f96e34cc1490fb5674563462d91a/Bento_Component.webp","details":{"size":303322,"image":{"width":2496,"height":1362}},"fileName":"Bento Component.webp","contentType":"image/webp"}}}]}},"userLoggedIn":false},"title":"Enterprise AppSec with GitHub Advanced Security"}