AZUL INTELLIGENCE CLOUD BOOSTS DEVOPS EFFICIENCY WITH INSIGHTS FROM PRODUCTION RUNTIME DATA ACROSS ENTIRE JAVA ESTATES
Powerful DevOps analytics solution now supports Oracle JDK and any OpenJDK-based distribution
SUNNYVALE, Calif., May 2 (Bernama-BUSINESS WIRE) -- Azul, the only company 100% focused on Java, today announced that Azul Intelligence Cloud, Azul’s cloud analytics solution which provides actionable intelligence from production Java runtime data to dramatically boost developer productivity, now supports Oracle JDK and any OpenJDK-based JVM (Java Virtual Machine) from any vendor or distribution.
Businesses are under pressure to accelerate application innovation cycles and optimize their development resources, while simultaneously ensuring the security of their applications and customer data. Azul’s Intelligence Cloud consists of two services which address these challenges for Java applications running in production:
· Azul Vulnerability Detection, to eliminate false positives by accurately identifying and prioritizing known security vulnerabilities; and
· Code Inventory, to help identify unused and dead code by precisely detailing what custom and third-party code is actually run.
“We clearly see the benefit that Azul Intelligence Cloud delivers to our customers by helping their DevOps teams save an immense amount of time and increasing their productivity,” said Ed Tybursky, managing partner at Remend, an independent Oracle advisory firm. “The ability to efficiently triage vulnerable code and identify unused code for removal from telemetry across an entire Java estate, regardless of JDK distribution or vendor, is a crucial capability that enables DevOps teams to effectively focus their time and attention.”
“Enterprise IT teams need accurate, unified insights they can put into action to improve efficiency and control costs,” said Jevin Jensen, IDC research vice president, Intelligent CloudOps. “A solution that can reduce false positives found in most vulnerability scanning enables DevOps, SRE and CloudOps teams to focus on the actual Common Vulnerability and Exposures (CVEs) that are executed by production applications. By avoiding code paths that are never executed, teams can move faster and reduce remediation costs.”
Comments