{"id":4907,"date":"2020-05-14T07:42:24","date_gmt":"2020-05-14T04:42:24","guid":{"rendered":"https:\/\/www.almtoolbox.com\/blog_he\/?p=4907"},"modified":"2020-05-14T13:30:52","modified_gmt":"2020-05-14T10:30:52","slug":"sonarsource-acquires-rips-better-sonarqube","status":"publish","type":"post","link":"https:\/\/www.almtoolbox.com\/blog_he\/sonarsource-acquires-rips-better-sonarqube\/","title":{"rendered":"SonarQube \u05e8\u05d5\u05db\u05e9\u05ea \u05d0\u05ea \u05d7\u05d1\u05e8\u05ea RIPS \u05db\u05d3\u05d9 \u05dc\u05d4\u05d5\u05e1\u05d9\u05e3 \u05d9\u05db\u05d5\u05dc\u05d5\u05ea Security \u05dc\u05e1\u05e8\u05d9\u05e7\u05ea \u05d4\u05e7\u05d5\u05d3 \u05e9\u05dc\u05d4"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-4908\" src=\"https:\/\/www.almtoolbox.com\/blog_he\/wp-content\/uploads\/2020\/05\/df1872ae-aaf1-4cff-b2c0-d6f998423009_Hero-blog@2x.jpg\" alt=\"sonarqube rips security testing\" width=\"710\" height=\"200\" srcset=\"https:\/\/www.almtoolbox.com\/blog_he\/wp-content\/uploads\/2020\/05\/df1872ae-aaf1-4cff-b2c0-d6f998423009_Hero-blog@2x.jpg 710w, https:\/\/www.almtoolbox.com\/blog_he\/wp-content\/uploads\/2020\/05\/df1872ae-aaf1-4cff-b2c0-d6f998423009_Hero-blog@2x-300x85.jpg 300w\" sizes=\"auto, (max-width: 710px) 100vw, 710px\" \/><\/p>\n<p>&nbsp;<\/p>\n<p>\u05d7\u05d1\u05e8\u05ea SonarSource, \u05d9\u05e6\u05e8\u05e0\u05d9\u05ea SonarQube, \u05d4\u05d5\u05d3\u05d9\u05e2\u05d4 \u05d0\u05ea\u05de\u05d5\u05dc \u05e2\u05dc \u05e8\u05db\u05d9\u05e9\u05ea \u05d7\u05d1\u05e8\u05ea RIPS Technologies .<br \/>\n\u05de\u05e0\u05db&quot;\u05dc SonarSource \u05e1\u05d9\u05e4\u05e8 \u05e9\u05d4\u05d7\u05d9\u05d1\u05d5\u05e8 \u05d4\u05d7\u05d3\u05e9 \u05d9\u05d7\u05d6\u05e7 \u05d0\u05ea \u05d9\u05db\u05d5\u05dc\u05d5\u05ea SonarQube \u05d1\u05ea\u05d7\u05d5\u05dd \u05e0\u05d9\u05ea\u05d5\u05d7 \u05e7\u05d5\u05d3 \u05e1\u05d8\u05d8\u05d9 \u05d5\u05d1\u05d3\u05d9\u05e7\u05d5\u05ea security \u05e2\u05d1\u05d5\u05e8 \u05d4\u05e9\u05e4\u05d5\u05ea PHP Java Node.JS .<\/p>\n<p>\u05d4\u05e4\u05ea\u05e8\u05d5\u05df \u05e9\u05dc RIPS \u05d9\u05d3\u05d5\u05e2 \u05db\u05d0\u05d7\u05d3 \u05de\u05d4\u05d8\u05d5\u05d1\u05d9\u05dd \u05d1\u05e9\u05d5\u05e7 \u05db\u05d9\u05d5\u05dd\u00a0\u05d1\u05e0\u05d9\u05ea\u05d5\u05d7 \u05e7\u05d5\u05d3 \u05d4\u05de\u05d0\u05d1\u05d7\u05df \u05de\u05e7\u05e8\u05d9\u05dd \u05de\u05d5\u05e8\u05db\u05d1\u05d9\u05dd \u05e9\u05dc vulnerabilities \u05d1\u05e7\u05d5\u05d3.<\/p>\n<p>\u05d0\u05e0\u05d5 \u05de\u05d9\u05d9\u05e6\u05d2\u05d9\u05dd \u05d0\u05ea SonarQube \u05d1\u05d0\u05e8\u05e5, \u05d5\u05de\u05e6\u05d9\u05e2\u05d9\u05dd \u05e8\u05d9\u05e9\u05d5\u05d9, \u05d9\u05e2\u05d5\u05e5 \u05d1\u05e0\u05d9\u05ea\u05d5\u05d7 \u05e7\u05d5\u05d3, \u05ea\u05de\u05d9\u05db\u05d4 , \u05d4\u05d3\u05e8\u05db\u05d5\u05ea, \u05d7\u05d9\u05d1\u05d5\u05e8 \u05dc\u05ea\u05d4\u05dc\u05d9\u05db\u05d9 CI\/CD , \u05d7\u05d9\u05d1\u05d5\u05e8 \u05dc\u05db\u05dc\u05d9 version control \u05d5\u05e2\u05d5\u05d3.<\/p>\n<p>\u05e0\u05e9\u05de\u05d7 \u05dc\u05e2\u05e0\u05d5\u05ea \u05dc\u05db\u05dc \u05e9\u05d0\u05dc\u05d4 \u05d1\u05e0\u05d5\u05e9\u05d0 &#8211; \u05e0\u05d9\u05ea\u05df \u05dc\u05e4\u05e0\u05d5\u05ea \u05d0\u05dc\u05d9\u05e0\u05d5 \u05d8\u05dc\u05e4\u05d5\u05e0\u05d9\u05ea (072-240-5222) \u05d0\u05d5 \u05d1\u05de\u05d9\u05d9\u05dc <a href=\"mailto:sonarqube@almtoolbox.com\" target=\"_blank\" rel=\"noopener\">sonarqube@almtoolbox.com<\/a>\u00a0.<\/p>\n<p>&nbsp;<\/p>\n<h3>\u05e7\u05d9\u05e9\u05d5\u05e8\u05d9\u05dd \u05e8\u05dc\u05d1\u05e0\u05d8\u05d9\u05dd:<\/h3>\n<ul>\n<li><a href=\"https:\/\/blog.sonarsource.com\/sonarsource-acquires-rips-technologies\" target=\"_blank\" rel=\"noopener\">\u05d4\u05d4\u05d5\u05d3\u05e2\u05d4 \u05d4\u05e8\u05e9\u05de\u05d9\u05ea \u05d1\u05d0\u05ea\u05e8 SonarQube<\/a><\/li>\n<li><a href=\"https:\/\/www.almtoolbox.com\/blog_he\/sonarqube-quality-gates-demo\/\" target=\"_blank\" rel=\"noopener\">\u05d4\u05e1\u05d1\u05e8 \u05e2\u05dc Quality Gates \u05d1- SonarQube<\/a> (\u05d5\u05d9\u05d3\u05d0\u05d5 \u05e7\u05e6\u05e8 \u05d1\u05e2\u05d1\u05e8\u05d9\u05ea)<\/li>\n<li><a href=\"https:\/\/www.ripstech.com\/\" target=\"_blank\" rel=\"noopener\">\u05d0\u05ea\u05e8 \u05d4\u05d7\u05d1\u05e8\u05d4 \u05d4\u05e0\u05e8\u05db\u05e9\u05ea (RIPS)<\/a><\/li>\n<li>\u05d0\u05ea\u05e8 SonarQube \u05d1\u05e2\u05d1\u05e8\u05d9\u05ea<\/li>\n<li>\u05d7\u05d3\u05e9: \u05d0\u05d9\u05e0\u05d8\u05d2\u05e8\u05e6\u05d9\u05d4 \u05d1\u05d9\u05df SonarQube \u05dc- GitLab<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>&nbsp; \u05d7\u05d1\u05e8\u05ea SonarSource, \u05d9\u05e6\u05e8\u05e0\u05d9\u05ea SonarQube, \u05d4\u05d5\u05d3\u05d9\u05e2\u05d4 \u05d0\u05ea\u05de\u05d5\u05dc \u05e2\u05dc \u05e8\u05db\u05d9\u05e9\u05ea \u05d7\u05d1\u05e8\u05ea RIPS Technologies . \u05de\u05e0\u05db&quot;\u05dc SonarSource \u05e1\u05d9\u05e4\u05e8 \u05e9\u05d4\u05d7\u05d9\u05d1\u05d5\u05e8 \u05d4\u05d7\u05d3\u05e9 \u05d9\u05d7\u05d6\u05e7 \u05d0\u05ea \u05d9\u05db\u05d5\u05dc\u05d5\u05ea SonarQube \u05d1\u05ea\u05d7\u05d5\u05dd \u05e0\u05d9\u05ea\u05d5\u05d7 \u05e7\u05d5\u05d3 \u05e1\u05d8\u05d8\u05d9 \u05d5\u05d1\u05d3\u05d9\u05e7\u05d5\u05ea security \u05e2\u05d1\u05d5\u05e8 \u05d4\u05e9\u05e4\u05d5\u05ea PHP Java Node.JS . \u05d4\u05e4\u05ea\u05e8\u05d5\u05df \u05e9\u05dc RIPS \u05d9\u05d3\u05d5\u05e2 \u05db\u05d0\u05d7\u05d3 \u05de\u05d4\u05d8\u05d5\u05d1\u05d9\u05dd \u05d1\u05e9\u05d5\u05e7 \u05db\u05d9\u05d5\u05dd\u00a0\u05d1\u05e0\u05d9\u05ea\u05d5\u05d7 \u05e7\u05d5\u05d3 \u05d4\u05de\u05d0\u05d1\u05d7\u05df \u05de\u05e7\u05e8\u05d9\u05dd \u05de\u05d5\u05e8\u05db\u05d1\u05d9\u05dd \u05e9\u05dc vulnerabilities \u05d1\u05e7\u05d5\u05d3. \u05d0\u05e0\u05d5 \u05de\u05d9\u05d9\u05e6\u05d2\u05d9\u05dd \u05d0\u05ea SonarQube \u05d1\u05d0\u05e8\u05e5, \u05d5\u05de\u05e6\u05d9\u05e2\u05d9\u05dd [&hellip;]<\/p>\n","protected":false},"author":5,"featured_media":4908,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[189,367,43],"tags":[423,374,128,424,422],"class_list":["post-4907","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-devsecops","category-sonarqube","category-static-code-analysis","tag-code-security","tag-java","tag-js","tag-php","tag-rips"],"_links":{"self":[{"href":"https:\/\/www.almtoolbox.com\/blog_he\/wp-json\/wp\/v2\/posts\/4907","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.almtoolbox.com\/blog_he\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.almtoolbox.com\/blog_he\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.almtoolbox.com\/blog_he\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/www.almtoolbox.com\/blog_he\/wp-json\/wp\/v2\/comments?post=4907"}],"version-history":[{"count":0,"href":"https:\/\/www.almtoolbox.com\/blog_he\/wp-json\/wp\/v2\/posts\/4907\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.almtoolbox.com\/blog_he\/wp-json\/wp\/v2\/media\/4908"}],"wp:attachment":[{"href":"https:\/\/www.almtoolbox.com\/blog_he\/wp-json\/wp\/v2\/media?parent=4907"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.almtoolbox.com\/blog_he\/wp-json\/wp\/v2\/categories?post=4907"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.almtoolbox.com\/blog_he\/wp-json\/wp\/v2\/tags?post=4907"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}