{domain:"www.qualitydigest.com",server:"169.47.211.87"} Skip to main content

User account menu
Main navigation
  • Topics
    • Customer Care
    • FDA Compliance
    • Healthcare
    • Innovation
    • Lean
    • Management
    • Metrology
    • Operations
    • Risk Management
    • Six Sigma
    • Standards
    • Statistics
    • Supply Chain
    • Sustainability
    • Training
  • Videos/Webinars
    • All videos
    • Product Demos
    • Webinars
  • Advertise
    • Advertise
    • Submit B2B Press Release
    • Write for us
  • Metrology Hub
  • Training
  • Subscribe
  • Log in
Mobile Menu
  • Home
  • Topics
    • 3D Metrology-CMSC
    • Customer Care
    • FDA Compliance
    • Healthcare
    • Innovation
    • Lean
    • Management
    • Metrology
    • Operations
    • Risk Management
    • Six Sigma
    • Standards
    • Statistics
    • Supply Chain
    • Sustainability
    • Training
  • Login / Subscribe
  • More...
    • All Features
    • All News
    • All Videos
    • Contact
    • Training

HP to Acquire SPI Dynamics

Quality Digest
Mon, 07/16/2007 - 22:00
  • Comment
  • RSS

Social Sharing block

  • Print
Body

(Hewlett-Packard: Cupertino, California) -- Hewlett-Packard has signed a definitive agreement to acquire SPI Dynamics Inc., a provider of Web-application security assessment software and services.
Application quality management ensures that business systems, such as E-commerce Web sites or financial and supply-chain applications, function well without performance issues.
SPI Dynamics technology is already integrated with HP Quality Center software and enables customers to assess and identify security vulnerabilities along the entire life cycle of Web applications. Customers can also use SPI Dynamics software to validate application security and quality after deployment and to meet auditing and compliance requirements, such as Sarbanes-Oxley.

Failure to test and remediate security defects or vulnerabilities before a business application goes into production leaves confidential information within a business-critical application at risk for security attacks and misuse.

 …

Want to continue?
Log in or create a FREE account.
Enter your username or email address
Enter the password that accompanies your username.
By logging in you agree to receive communication from Quality Digest. Privacy Policy.
Create a FREE account
Forgot My Password

Add new comment

Image CAPTCHA
Enter the characters shown in the image.
Please login to comment.
      

© 2025 Quality Digest. Copyright on content held by Quality Digest or by individual authors. Contact Quality Digest for reprint information.
“Quality Digest" is a trademark owned by Quality Circle Institute Inc.

footer
  • Home
  • Print QD: 1995-2008
  • Print QD: 2008-2009
  • Videos
  • Privacy Policy
  • Write for us
footer second menu
  • Subscribe to Quality Digest
  • About Us
  • Contact Us