{"id":7987,"date":"2024-04-22T14:52:37","date_gmt":"2024-04-22T21:52:37","guid":{"rendered":"https:\/\/apiiro.com\/?page_id=7987"},"modified":"2024-10-24T05:21:52","modified_gmt":"2024-10-24T12:21:52","slug":"application-software-supply-chain-inventory-risk-assessment","status":"publish","type":"page","link":"https:\/\/apiiro.com\/product\/application-software-supply-chain-inventory-risk-assessment\/","title":{"rendered":"Application Visibility &#038; Risk Assessment | Apiiro ASPM"},"content":{"rendered":"\n<div class=\"wp-block-group is-style-dark is-vertical is-content-justification-center is-nowrap is-layout-flex wp-container-core-group-is-layout-e862386f wp-block-group-is-layout-flex\">\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<h6 class=\"wp-block-heading has-text-align-center is-style-green\" id=\"h-visibility-amp-risk-assessment\"><strong>VISIBILITY &amp; RISK ASSESSMENT<\/strong><\/h6>\n\n\n\n<h1 class=\"wp-block-heading has-text-align-center is-style-default\" id=\"h-go-beyond-sbom-with-xbom\"><strong>Go beyond SBOM with XBOM<\/strong><\/h1>\n\n\n\n<p class=\"has-text-align-center\">Apiiro integrates and connects throughout the development lifecycle to build an exhaustive and continuous application inventory. We call it your eXtended software bill of materials (XBOM).<\/p>\n\n\n\n<div style=\"height:15px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns is-style-column-card-dark-gradient is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<div class=\"wp-block-group is-content-justification-center is-nowrap is-layout-flex wp-container-core-group-is-layout-94bc23d7 wp-block-group-is-layout-flex\">\n<div class=\"wp-block-columns are-vertically-aligned-center is-style-column-image-pull-left is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\">\n<figure class=\"wp-block-image size-full is-style-image-pull-left\"><img loading=\"lazy\" decoding=\"async\" width=\"2174\" height=\"1500\" src=\"https:\/\/apiiro.com\/wp-content\/uploads\/2024\/04\/Apiiro-ASPM-Application-Repository-Inventory-and-Technologies-in-Use.png\" alt=\"\" class=\"wp-image-8137\" srcset=\"https:\/\/apiiro.com\/wp-content\/uploads\/2024\/04\/Apiiro-ASPM-Application-Repository-Inventory-and-Technologies-in-Use.png 2174w, https:\/\/apiiro.com\/wp-content\/uploads\/2024\/04\/Apiiro-ASPM-Application-Repository-Inventory-and-Technologies-in-Use-300x207.png 300w, https:\/\/apiiro.com\/wp-content\/uploads\/2024\/04\/Apiiro-ASPM-Application-Repository-Inventory-and-Technologies-in-Use-1024x707.png 1024w, https:\/\/apiiro.com\/wp-content\/uploads\/2024\/04\/Apiiro-ASPM-Application-Repository-Inventory-and-Technologies-in-Use-768x530.png 768w, https:\/\/apiiro.com\/wp-content\/uploads\/2024\/04\/Apiiro-ASPM-Application-Repository-Inventory-and-Technologies-in-Use-1536x1060.png 1536w, https:\/\/apiiro.com\/wp-content\/uploads\/2024\/04\/Apiiro-ASPM-Application-Repository-Inventory-and-Technologies-in-Use-2048x1413.png 2048w\" sizes=\"auto, (max-width: 2174px) 100vw, 2174px\" \/><\/figure>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\">\n<ul class=\"wp-block-list\">\n<li>Connect your source control management system and runtime sources to understand every facet of your application and software attack surface.<\/li>\n\n\n\n<li>By mapping component interconnections, risks, and changes over time, Apiiro closes gaps left by siloed tools and detects toxic combinations.<\/li>\n\n\n\n<li>With continuous visibility into your applications, you can reliably govern usage and minimize sprawl without having to rely on developers and security questionnaires.<\/li>\n<\/ul>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\"><div class=\"grid grid-cols-1 md:grid-cols-2  gap-[30px] mt-[30px]  md:grid-cols-2\">\n                        <div class=\"relative z-10 card-link overflow-hidden p-[15px] md:p-[30px] rounded-[5px] relative  bg-black text-white \">\n                                    <img class=\"h-[30px] w-[30px] mb-[15px]\" src='https:\/\/apiiro.com\/wp-content\/uploads\/2023\/05\/icon-dataexposure.svg' alt='' \/>\n                                                                <h4 class='mb-3'>Deep Code Analysis (DCA)<\/h4>\n                                    <div class='text-sm mb-0 card-content \n                    '><p>With our patented Deep Code Analysis (DCA) technology, we go beyond vulnerability detection to continuously analyze code and extrapolate  all application components, insights, and risk context.<\/p>\n<p>DCA is the foundation of Apiiro&#8217;s XBOM, transforming the complexity of cloud-native applications into a structured and contextual inventory for understanding your application attack surface.<\/p>\n                    <\/div>\n                                                            <\/div>\n                                    <div class=\"relative z-10 card-link overflow-hidden p-[15px] md:p-[30px] rounded-[5px] relative  bg-black text-white \">\n                                    <img class=\"h-[30px] w-[30px] mb-[15px]\" src='https:\/\/apiiro.com\/wp-content\/uploads\/2023\/05\/icon-wand.svg' alt='' \/>\n                                                                <h4 class='mb-3'>Code-to-runtime context<\/h4>\n                                    <div class='text-sm mb-0 card-content \n                    '><p>Although deeply rooted in code, Apiiro enriches its inventory with runtime connectors, surfacing crucial risk context such as whether risks are deployed, internet-exposed, or behind a WAF. <\/p>\n<p>Our code-to-runtime modeling enables us to match runtime APIs, containers, and security alerts to their sources in code, identify code owners, and map the entire exposure path of risks.<\/p>\n                    <\/div>\n                                                            <\/div>\n                <\/div><\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-group is-style-default is-vertical is-content-justification-center is-nowrap is-layout-flex wp-container-core-group-is-layout-e862386f wp-block-group-is-layout-flex\">\n<div class=\"wp-block-columns is-style-default is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<div class=\"wp-block-group is-style-default is-horizontal is-content-justification-center is-nowrap is-layout-flex wp-container-core-group-is-layout-c1dfda1e wp-block-group-is-layout-flex\">\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<h6 class=\"wp-block-heading has-text-align-center is-style-green\" id=\"h-xbom\"><strong><strong>XBOM<\/strong><\/strong><\/h6>\n\n\n\n<h3 class=\"wp-block-heading has-text-align-center\" id=\"h-what-s-included-in-apiiro-s-application-inventory\" id=\"whats-included-in-apiiros-application-inventory\">What\u2019s included in Apiiro&#8217;s application inventory?<\/h3>\n\n\n\n<p class=\"has-text-align-center\">Deeply rooted in code and enriched with runtime sources, Apiiro\u2019s XBOM illuminates your entire application and software supply chain attack surface, including code modules, data, APIs, authorization and authentication controls, infrastructure, and more.<\/p>\n\n\n<div class=\"grid grid-cols-1 md:grid-cols-2  gap-[30px] mt-[30px]  lg:grid-cols-4\">\n                        <div class=\"relative z-10 card-link overflow-hidden p-[15px] md:p-[30px] rounded-[5px] relative  bg-gray_light_new \">\n                                    <img class=\"h-[30px] w-[30px] mb-[15px]\" src='https:\/\/apiiro.com\/wp-content\/uploads\/2023\/05\/icon-sca.svg' alt='' \/>\n                                                                <h4 class='mb-3'>Application<\/h4>\n                                    <div class='text-sm mb-0 card-content \n                    '><p>Modules<br \/>\nAPIs<br \/>\nGraphQL operations<br \/>\nProtobuf services<br \/>\nLanguages<br \/>\nTechnologies<br \/>\nOSS dependencies<br \/>\nOSS licenses<br \/>\nServerless<br \/>\nStorage bucket<\/p>\n                    <\/div>\n                                                            <\/div>\n                                    <div class=\"relative z-10 card-link overflow-hidden p-[15px] md:p-[30px] rounded-[5px] relative  bg-gray_light_new \">\n                                    <img class=\"h-[30px] w-[30px] mb-[15px]\" src='https:\/\/apiiro.com\/wp-content\/uploads\/2023\/05\/icon-api.svg' alt='' \/>\n                                                                <h4 class='mb-3'>Supply Chain<\/h4>\n                                    <div class='text-sm mb-0 card-content \n                    '><p>Projects<br \/>\nRepositories<br \/>\nSource control managers<br \/>\nCI\/CD Pipelines<br \/>\nPipeline dependencies<br \/>\nArtifacts<br \/>\nSecrets<br \/>\nContributors &amp; teams<br \/>\nTracked Issues<\/p>\n                    <\/div>\n                                                            <\/div>\n                                    <div class=\"relative z-10 card-link overflow-hidden p-[15px] md:p-[30px] rounded-[5px] relative  bg-gray_light_new \">\n                                    <img class=\"h-[30px] w-[30px] mb-[15px]\" src='https:\/\/apiiro.com\/wp-content\/uploads\/2023\/05\/icon-dataexposure.svg' alt='' \/>\n                                                                <h4 class='mb-3'>Data &#038; Controls<\/h4>\n                                    <div class='text-sm mb-0 card-content \n                    '><p>Authorization<br \/>\nAuthentication<br \/>\nEncryption<br \/>\nSession management<br \/>\nKey management<br \/>\nData models<br \/>\nGraphQL objects<br \/>\nProtobuf messages<br \/>\nData access objects<br \/>\nSensitive data<\/p>\n                    <\/div>\n                                                            <\/div>\n                                    <div class=\"relative z-10 card-link overflow-hidden p-[15px] md:p-[30px] rounded-[5px] relative  bg-gray_light_new \">\n                                    <img class=\"h-[30px] w-[30px] mb-[15px]\" src='https:\/\/apiiro.com\/wp-content\/uploads\/2023\/05\/icon-iac.svg' alt='' \/>\n                                                                <h4 class='mb-3'>Infrastructure<\/h4>\n                                    <div class='text-sm mb-0 card-content \n                    '><p>Infrastructure as code<br \/>\nContainer images<br \/>\nContainers<br \/>\nKubernetes services<br \/>\nWorkloads<br \/>\nClusters<br \/>\nCloud providers<br \/>\nCloud App Engine<br \/>\nAPI gateways<\/p>\n                    <\/div>\n                                                            <\/div>\n                <\/div><\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-group is-style-gray is-vertical is-content-justification-center is-nowrap is-layout-flex wp-container-core-group-is-layout-e862386f wp-block-group-is-layout-flex\">\n<div class=\"wp-block-columns is-style-column-card-light is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<div class=\"wp-block-group is-style-default is-horizontal is-content-justification-center is-nowrap is-layout-flex wp-container-core-group-is-layout-c1dfda1e wp-block-group-is-layout-flex\">\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<h6 class=\"wp-block-heading has-text-align-center is-style-green\" id=\"h-why-apiiro\"><strong>WHY APIIRO?<\/strong><\/h6>\n\n\n\n<h2 class=\"wp-block-heading has-text-align-center is-style-default\" id=\"h-more-than-just-visibility\" id=\"more-than-just-visibility\">More than just visibility<\/h2>\n\n\n\n<p class=\"has-text-align-center\">Our XBOM is the foundation for everything we do. It provides the necessary context to prioritize findings, exposes coverage gaps, and gives you the visibility to deeply understand your application security posture. Because of our depth of visibility, it also surfaces risks, insights, and context that no other ASPM can.<\/p>\n\n\n\n<div class=\"wp-block-buttons is-content-justification-center is-layout-flex wp-container-core-buttons-is-layout-16018d1d wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button is-style-btn-tertiary-light\"><a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/apiiro.com\/product\/aspm\/\">Learn more<\/a><\/div>\n<\/div>\n\n\n\n<div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-group is-content-justification-center is-nowrap is-layout-flex wp-container-core-group-is-layout-94bc23d7 wp-block-group-is-layout-flex\">\n<div class=\"wp-block-columns are-vertically-aligned-center is-style-column-image-pull-right is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\">\n<ul class=\"wp-block-list\">\n<li>Apiiro\u2019s deep inventory is what generates the context needed for accurate prioritization of security findings based on risk likelihood and impact.<\/li>\n\n\n\n<li>Apiiro analyzes developer behavior and surfaces insights to automatically identify security champions and flag anomalous behavior.<\/li>\n\n\n\n<li>By detecting, auditing, and tracking all material code changes, Apiiro takes the guesswork and manual data validation out of meeting regulatory requirements.<\/li>\n<\/ul>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\">\n<figure class=\"wp-block-image size-full is-style-image-pull-left\"><img loading=\"lazy\" decoding=\"async\" width=\"2174\" height=\"1500\" src=\"https:\/\/apiiro.com\/wp-content\/uploads\/2024\/04\/Apiiro-ASPM-Coverage-Map-and-Contributors.png\" alt=\"\" class=\"wp-image-8165\" srcset=\"https:\/\/apiiro.com\/wp-content\/uploads\/2024\/04\/Apiiro-ASPM-Coverage-Map-and-Contributors.png 2174w, https:\/\/apiiro.com\/wp-content\/uploads\/2024\/04\/Apiiro-ASPM-Coverage-Map-and-Contributors-300x207.png 300w, https:\/\/apiiro.com\/wp-content\/uploads\/2024\/04\/Apiiro-ASPM-Coverage-Map-and-Contributors-1024x707.png 1024w, https:\/\/apiiro.com\/wp-content\/uploads\/2024\/04\/Apiiro-ASPM-Coverage-Map-and-Contributors-768x530.png 768w, https:\/\/apiiro.com\/wp-content\/uploads\/2024\/04\/Apiiro-ASPM-Coverage-Map-and-Contributors-1536x1060.png 1536w, https:\/\/apiiro.com\/wp-content\/uploads\/2024\/04\/Apiiro-ASPM-Coverage-Map-and-Contributors-2048x1413.png 2048w\" sizes=\"auto, (max-width: 2174px) 100vw, 2174px\" \/><\/figure>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\"><div class=\"grid grid-cols-1 md:grid-cols-2  gap-[30px] mt-[30px]  lg:grid-cols-3\">\n                        <div class=\"relative z-10 card-link overflow-hidden p-[15px] md:p-[30px] rounded-[5px] relative  bg-gray_light_new \">\n                                                                    <img decoding=\"async\" src=\"https:\/\/apiiro.com\/wp-content\/uploads\/2024\/04\/Apiiro-ASPM-Risk-Graph-Explorer-Query.png\" alt=\"\" class=\"mb-4\">\n                                <h4 class='mb-3'>Explorer<\/h4>\n                                    <div class='text-sm mb-0 card-content \n                    '><p>Ask and answer any question about your application and software supply chain components, their connections, and their associated risks with Apiiro\u2019s query-based Explorer.<\/p>\n                    <\/div>\n                                                            <\/div>\n                                    <div class=\"relative z-10 card-link overflow-hidden p-[15px] md:p-[30px] rounded-[5px] relative  bg-gray_light_new \">\n                                                                    <img decoding=\"async\" src=\"https:\/\/apiiro.com\/wp-content\/uploads\/2024\/04\/Apiiro-ASPM-Timeline-of-Material-Code-Changes.png\" alt=\"\" class=\"mb-4\">\n                                <h4 class='mb-3'>Material change detection<\/h4>\n                                    <div class='text-sm mb-0 card-content \n                    '><p>Apiiro monitors each and every code change to automatically determine which may introduce material changes or risk, to more efficiently trigger security reviews, agile threat models, or other security controls.<\/p>\n                    <\/div>\n                                                            <\/div>\n                                    <div class=\"relative z-10 card-link overflow-hidden p-[15px] md:p-[30px] rounded-[5px] relative  bg-gray_light_new \">\n                                                                    <img decoding=\"async\" src=\"https:\/\/apiiro.com\/wp-content\/uploads\/2024\/04\/Apiiro-ASPM-Security-Testing-Coverage-Map-Overview.png\" alt=\"\" class=\"mb-4\">\n                                <h4 class='mb-3'>Coverage map<\/h4>\n                                    <div class='text-sm mb-0 card-content \n                    '><p>Because Apiiro has visibility across your repositories and your security testing tools, we can map your testing coverage to expose gaps and redundancies.<\/p>\n                    <\/div>\n                                                            <\/div>\n                <\/div><\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-group is-style-default is-content-justification-center is-nowrap is-layout-flex wp-container-core-group-is-layout-94bc23d7 wp-block-group-is-layout-flex\">\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<h2 class=\"wp-block-heading has-text-align-center\" id=\"h-illuminate-your-app-attack-surface\" id=\"illuminate-your-app-attack-surface\">Illuminate your app attack surface<\/h2>\n\n\n\n<p class=\"has-text-align-center\">Get a demo of Apiiro&#8217;s Deep ASPM platform.<\/p>\n\n\n\n<div class=\"wp-block-buttons is-content-justification-center is-layout-flex wp-container-core-buttons-is-layout-16018d1d wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button is-style-btn-green-gradient\"><a class=\"wp-block-button__link has-text-align-center wp-element-button\" href=\"https:\/\/apiiro.com\/schedule-a-demo\/\">Get a demo<\/a><\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-group is-style-dark is-content-justification-center is-nowrap is-layout-flex wp-container-core-group-is-layout-94bc23d7 wp-block-group-is-layout-flex\">\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<h3 class=\"wp-block-heading has-text-align-center\" id=\"h-learn-more-about-apiiro-s-visibility-first-approach\" id=\"learn-more-about-apiiros-visibility-first-approach\">Learn more about Apiiro&#8217;s visibility-first approach <\/h3>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\"><div class=\"grid grid-cols-1 md:grid-cols-2 gap-[30px] resources max-w-full lg:grid-cols-3\">\n            <a href=\"https:\/\/apiiro.com\/resource\/xbom-checklist-16-key-extended-software-bill-of-materials-components\/\">\n            <img class=\"mb-[15px] rounded-[4px]\" src='https:\/\/apiiro.com\/wp-content\/uploads\/2024\/03\/Checklist.jpg' alt='' \/>\n            <h3 class='text-[20px] mb-[19px]' id=\"xbom-checklist-16-key-extended-software-bill-of-materials-components\">XBOM Checklist: 16 Key eXtended Software Bill of Materials Components<\/h3>\n            <div class='excerpt line-clamp-3 text-sm mb-[15px]'>Learn how the eXtended Software Bill of Materials (XBOM) goes beyond SBOM for complete, real-time application attack surface visibility and risk assessment.<\/div>\n                            <\/a>\n            <a href=\"https:\/\/apiiro.com\/resource\/why-you-need-an-xbom-an-extended-software-bill-of-materials\/\">\n            <img class=\"mb-[15px] rounded-[4px]\" src='https:\/\/apiiro.com\/wp-content\/uploads\/2023\/11\/XBOM-The-Register.jpg' alt='' \/>\n            <h3 class='text-[20px] mb-[19px]' id=\"why-you-need-an-xbom-an-extended-software-bill-of-materials\">Why You Need an XBOM: An eXtended Software Bill of Materials<\/h3>\n            <div class='excerpt line-clamp-3 text-sm mb-[15px]'>Learn what your SBOM is missing and how having an XBOM can take your application and supply chain security program to the neXt level.<\/div>\n                            <\/a>\n            <a href=\"https:\/\/apiiro.com\/blog\/automating-material-code-change-detection-streamline-application-security-compliance\/\">\n            <img class=\"mb-[15px] rounded-[4px]\" src='https:\/\/apiiro.com\/wp-content\/uploads\/2024\/03\/Material-Changes.jpg' alt='' \/>\n            <h3 class='text-[20px] mb-[19px]' id=\"automating-material-code-change-detection-for-continuous-compliance\">Automating material code change detection for continuous compliance<\/h3>\n            <div class='excerpt line-clamp-3 text-sm mb-[15px]'>Read our blog on detecting material code changes automatically and at scale to reduce application risk and satisfy compliance and regulatory requirements.<\/div>\n                            <\/a>\n    <\/div><\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>VISIBILITY &amp; RISK ASSESSMENT Go beyond SBOM with XBOM Apiiro integrates and connects throughout the development lifecycle to build an exhaustive and continuous application inventory. We call it your eXtended software bill of materials (XBOM). XBOM What\u2019s included in Apiiro&#8217;s application inventory? Deeply rooted in code and enriched with runtime sources, Apiiro\u2019s XBOM illuminates your [&hellip;]<\/p>\n","protected":false},"author":28,"featured_media":8703,"parent":6050,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"coauthors":[80],"class_list":["post-7987","page","type-page","status-publish","has-post-thumbnail","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v25.9 (Yoast SEO v26.6) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Application and Software Supply Chain Inventory (XBOM) | Apiiro<\/title>\n<meta name=\"description\" content=\"Get a complete and continuous application inventory with Apiiro\u2019s eXtended software bill of materials (XBOM).\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/apiiro.com\/product\/application-software-supply-chain-inventory-risk-assessment\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Application Visibility &amp; Risk Assessment | Apiiro ASPM\" \/>\n<meta property=\"og:description\" content=\"Get a complete and continuous application inventory with Apiiro\u2019s eXtended software bill of materials (XBOM).\" \/>\n<meta property=\"og:url\" content=\"https:\/\/apiiro.com\/product\/application-software-supply-chain-inventory-risk-assessment\/\" \/>\n<meta property=\"og:site_name\" content=\"Apiiro | Deep Application Security Posture Management (ASPM)\" \/>\n<meta property=\"article:modified_time\" content=\"2024-10-24T12:21:52+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/apiiro.com\/wp-content\/uploads\/2024\/04\/Setting-the-diamond-standard-for-ASPM.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"678\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@apiirosecurity\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/apiiro.com\/product\/application-software-supply-chain-inventory-risk-assessment\/\",\"url\":\"https:\/\/apiiro.com\/product\/application-software-supply-chain-inventory-risk-assessment\/\",\"name\":\"Application and Software Supply Chain Inventory (XBOM) | Apiiro\",\"isPartOf\":{\"@id\":\"https:\/\/apiiro.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/apiiro.com\/product\/application-software-supply-chain-inventory-risk-assessment\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/apiiro.com\/product\/application-software-supply-chain-inventory-risk-assessment\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/apiiro.com\/wp-content\/uploads\/2024\/04\/Setting-the-diamond-standard-for-ASPM.jpg\",\"datePublished\":\"2024-04-22T21:52:37+00:00\",\"dateModified\":\"2024-10-24T12:21:52+00:00\",\"description\":\"Get a complete and continuous application inventory with Apiiro\u2019s eXtended software bill of materials (XBOM).\",\"breadcrumb\":{\"@id\":\"https:\/\/apiiro.com\/product\/application-software-supply-chain-inventory-risk-assessment\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/apiiro.com\/product\/application-software-supply-chain-inventory-risk-assessment\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/apiiro.com\/product\/application-software-supply-chain-inventory-risk-assessment\/#primaryimage\",\"url\":\"https:\/\/apiiro.com\/wp-content\/uploads\/2024\/04\/Setting-the-diamond-standard-for-ASPM.jpg\",\"contentUrl\":\"https:\/\/apiiro.com\/wp-content\/uploads\/2024\/04\/Setting-the-diamond-standard-for-ASPM.jpg\",\"width\":1200,\"height\":678},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/apiiro.com\/product\/application-software-supply-chain-inventory-risk-assessment\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/apiiro.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Product\",\"item\":\"https:\/\/apiiro.com\/product\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Application Visibility &#038; Risk Assessment | Apiiro ASPM\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/apiiro.com\/#website\",\"url\":\"https:\/\/apiiro.com\/\",\"name\":\"Apiiro | Secure your development and delivery to the cloud\",\"description\":\"Secure your development and delivery to the cloud.\",\"publisher\":{\"@id\":\"https:\/\/apiiro.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/apiiro.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/apiiro.com\/#organization\",\"name\":\"Apiiro\",\"url\":\"https:\/\/apiiro.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/apiiro.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/apiiro.com\/wp-content\/uploads\/2023\/05\/Apiiro-Logo-dark.png\",\"contentUrl\":\"https:\/\/apiiro.com\/wp-content\/uploads\/2023\/05\/Apiiro-Logo-dark.png\",\"width\":276,\"height\":80,\"caption\":\"Apiiro\"},\"image\":{\"@id\":\"https:\/\/apiiro.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/apiirosecurity\",\"https:\/\/www.linkedin.com\/company\/apiiro\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Application and Software Supply Chain Inventory (XBOM) | Apiiro","description":"Get a complete and continuous application inventory with Apiiro\u2019s eXtended software bill of materials (XBOM).","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/apiiro.com\/product\/application-software-supply-chain-inventory-risk-assessment\/","og_locale":"en_US","og_type":"article","og_title":"Application Visibility & Risk Assessment | Apiiro ASPM","og_description":"Get a complete and continuous application inventory with Apiiro\u2019s eXtended software bill of materials (XBOM).","og_url":"https:\/\/apiiro.com\/product\/application-software-supply-chain-inventory-risk-assessment\/","og_site_name":"Apiiro | Deep Application Security Posture Management (ASPM)","article_modified_time":"2024-10-24T12:21:52+00:00","og_image":[{"width":1200,"height":678,"url":"https:\/\/apiiro.com\/wp-content\/uploads\/2024\/04\/Setting-the-diamond-standard-for-ASPM.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_site":"@apiirosecurity","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/apiiro.com\/product\/application-software-supply-chain-inventory-risk-assessment\/","url":"https:\/\/apiiro.com\/product\/application-software-supply-chain-inventory-risk-assessment\/","name":"Application and Software Supply Chain Inventory (XBOM) | Apiiro","isPartOf":{"@id":"https:\/\/apiiro.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/apiiro.com\/product\/application-software-supply-chain-inventory-risk-assessment\/#primaryimage"},"image":{"@id":"https:\/\/apiiro.com\/product\/application-software-supply-chain-inventory-risk-assessment\/#primaryimage"},"thumbnailUrl":"https:\/\/apiiro.com\/wp-content\/uploads\/2024\/04\/Setting-the-diamond-standard-for-ASPM.jpg","datePublished":"2024-04-22T21:52:37+00:00","dateModified":"2024-10-24T12:21:52+00:00","description":"Get a complete and continuous application inventory with Apiiro\u2019s eXtended software bill of materials (XBOM).","breadcrumb":{"@id":"https:\/\/apiiro.com\/product\/application-software-supply-chain-inventory-risk-assessment\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/apiiro.com\/product\/application-software-supply-chain-inventory-risk-assessment\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/apiiro.com\/product\/application-software-supply-chain-inventory-risk-assessment\/#primaryimage","url":"https:\/\/apiiro.com\/wp-content\/uploads\/2024\/04\/Setting-the-diamond-standard-for-ASPM.jpg","contentUrl":"https:\/\/apiiro.com\/wp-content\/uploads\/2024\/04\/Setting-the-diamond-standard-for-ASPM.jpg","width":1200,"height":678},{"@type":"BreadcrumbList","@id":"https:\/\/apiiro.com\/product\/application-software-supply-chain-inventory-risk-assessment\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/apiiro.com\/"},{"@type":"ListItem","position":2,"name":"Product","item":"https:\/\/apiiro.com\/product\/"},{"@type":"ListItem","position":3,"name":"Application Visibility &#038; Risk Assessment | Apiiro ASPM"}]},{"@type":"WebSite","@id":"https:\/\/apiiro.com\/#website","url":"https:\/\/apiiro.com\/","name":"Apiiro | Secure your development and delivery to the cloud","description":"Secure your development and delivery to the cloud.","publisher":{"@id":"https:\/\/apiiro.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/apiiro.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/apiiro.com\/#organization","name":"Apiiro","url":"https:\/\/apiiro.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/apiiro.com\/#\/schema\/logo\/image\/","url":"https:\/\/apiiro.com\/wp-content\/uploads\/2023\/05\/Apiiro-Logo-dark.png","contentUrl":"https:\/\/apiiro.com\/wp-content\/uploads\/2023\/05\/Apiiro-Logo-dark.png","width":276,"height":80,"caption":"Apiiro"},"image":{"@id":"https:\/\/apiiro.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/apiirosecurity","https:\/\/www.linkedin.com\/company\/apiiro"]}]}},"_links":{"self":[{"href":"https:\/\/apiiro.com\/wp-json\/wp\/v2\/pages\/7987","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/apiiro.com\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/apiiro.com\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/apiiro.com\/wp-json\/wp\/v2\/users\/28"}],"replies":[{"embeddable":true,"href":"https:\/\/apiiro.com\/wp-json\/wp\/v2\/comments?post=7987"}],"version-history":[{"count":60,"href":"https:\/\/apiiro.com\/wp-json\/wp\/v2\/pages\/7987\/revisions"}],"predecessor-version":[{"id":9546,"href":"https:\/\/apiiro.com\/wp-json\/wp\/v2\/pages\/7987\/revisions\/9546"}],"up":[{"embeddable":true,"href":"https:\/\/apiiro.com\/wp-json\/wp\/v2\/pages\/6050"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/apiiro.com\/wp-json\/wp\/v2\/media\/8703"}],"wp:attachment":[{"href":"https:\/\/apiiro.com\/wp-json\/wp\/v2\/media?parent=7987"}],"wp:term":[{"taxonomy":"author","embeddable":true,"href":"https:\/\/apiiro.com\/wp-json\/wp\/v2\/coauthors?post=7987"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}