{"id":34855,"date":"2023-08-18T10:41:18","date_gmt":"2023-08-18T02:41:18","guid":{"rendered":"https:\/\/hongtronics.com\/?page_id=34855"},"modified":"2025-10-15T14:03:44","modified_gmt":"2025-10-15T06:03:44","slug":"mend-io","status":"publish","type":"page","link":"https:\/\/hongtronics.com\/en\/mend-io\/","title":{"rendered":"Application Security (Mend.io)"},"content":{"rendered":"<div data-elementor-type=\"wp-page\" data-elementor-id=\"34855\" class=\"elementor elementor-34855\" data-elementor-post-type=\"page\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2b23ce3 e-flex e-con-boxed e-con e-parent\" data-id=\"2b23ce3\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-2d016bb e-con-full e-flex e-con e-child\" data-id=\"2d016bb\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-0846da1 e-con-full e-flex e-con e-child\" data-id=\"0846da1\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-7f3800b elementor-widget elementor-widget-heading\" data-id=\"7f3800b\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Mend.io<p> Open Source Component Scanning <p>Managing the AppSec Platform<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-71743c0 elementor-widget elementor-widget-text-editor\" data-id=\"71743c0\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p data-start=\"0\" data-end=\"90\"><span style=\"font-size: 12pt;\"><span style=\"color: #000000;\">Mend is the world's first platform to support both open source and proprietary code bug fixing.<\/span><span style=\"color: #000000;\">Integration of AI security detection, SCA open source component management and SAST code scanning.<\/span><\/span><\/p><p data-start=\"92\" data-end=\"178\"><span style=\"font-size: 12pt;\"><span style=\"color: #000000;\">Relying on the world's leading vulnerability database and accessibility analysis technology.<\/span><span style=\"color: #000000;\">It can effectively reduce false alarms and invalid alarms of the 85%.<\/span><span style=\"color: #000000;\">It also supports one-click auto-generation of PR (Pull Request).<\/span><\/span><span style=\"font-size: 12pt;\"><span style=\"color: #000000;\">Standardized SBOM (Software Bill of Materials) reports are also provided.<\/span><span style=\"color: #000000;\">Help organizations meet software supply chain security and compliance requirements.<\/span><\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-014a221 e-flex e-con-boxed e-con e-child\" data-id=\"014a221\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-b06f658 elementor-widget elementor-widget-button\" data-id=\"b06f658\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/line.me\/R\/ti\/p\/@433rhnwm\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Free Consultation<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-a3b57f1 e-con-full e-flex e-con e-child\" data-id=\"a3b57f1\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-e4320c1 elementor-widget elementor-widget-image\" data-id=\"e4320c1\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"1024\" height=\"905\" src=\"https:\/\/hongtronics.com\/wp-content\/uploads\/2025\/10\/10001-6-1024x905.png\" class=\"attachment-large size-large wp-image-73723\" alt=\"\" srcset=\"https:\/\/hongtronics.com\/wp-content\/uploads\/2025\/10\/10001-6-1024x905.png 1024w, https:\/\/hongtronics.com\/wp-content\/uploads\/2025\/10\/10001-6-300x265.png 300w, https:\/\/hongtronics.com\/wp-content\/uploads\/2025\/10\/10001-6-768x679.png 768w, https:\/\/hongtronics.com\/wp-content\/uploads\/2025\/10\/10001-6-600x530.png 600w, https:\/\/hongtronics.com\/wp-content\/uploads\/2025\/10\/10001-6.png 1280w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-ccf9db1 e-con-full e-flex e-con e-child\" data-id=\"ccf9db1\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4fa5e4c elementor-widget elementor-widget-spacer\" data-id=\"4fa5e4c\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7d1837f elementor-widget elementor-widget-heading\" data-id=\"7d1837f\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Open Source Vulnerability Status<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-0ee6be7 e-flex e-con-boxed e-con e-child\" data-id=\"0ee6be7\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-7af8441 e-con-full e-flex e-con e-child\" data-id=\"7af8441\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-54e0964 elementor-widget elementor-widget-text-editor\" data-id=\"54e0964\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p data-start=\"16\" data-end=\"47\"><span style=\"color: #000000;\">More than 95% of enterprise applications use open source components to aid in development<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-920fa77 e-con-full e-flex e-con e-child\" data-id=\"920fa77\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-df09083 elementor-widget elementor-widget-text-editor\" data-id=\"df09083\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p data-start=\"50\" data-end=\"90\"><span style=\"color: #000000; font-size: 12pt;\">Open Source Component Vulnerability in 86% Could Lead to Massive Personal Data Leakage in the Event of a Hacker Attack<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-e8c92f4 e-con-full e-flex e-con e-child\" data-id=\"e8c92f4\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-ab5d8d3 elementor-widget elementor-widget-text-editor\" data-id=\"ab5d8d3\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"color: #000000;\">As of 2019, the number of known open source component vulnerabilities is up to 500,000<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-8891419 e-con-full e-flex e-con e-child\" data-id=\"8891419\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2fefdc1 elementor-widget elementor-widget-text-editor\" data-id=\"2fefdc1\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"color: #000000; font-size: 12pt;\">The application program of about 67% contains a known open source security vulnerability.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-9a3d387 e-con-full e-flex e-con e-child\" data-id=\"9a3d387\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-5f7985d e-con-full e-flex e-con e-child\" data-id=\"5f7985d\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-c527e40 elementor-widget elementor-widget-text-editor\" data-id=\"c527e40\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"color: #000000;\">The global library of open source software suites has been downloaded more than 31 trillion times by 2023.<\/span><br data-start=\"41\" data-end=\"44\" \/><span style=\"color: #000000;\">Malicious Attacks Against Open Source Libraries Surge 633%<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-f736e2d e-con-full e-flex e-con e-child\" data-id=\"f736e2d\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-877e4d6 elementor-widget elementor-widget-text-editor\" data-id=\"877e4d6\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"color: #000000; font-size: 12pt;\">There are currently 2,300 open source license types.<\/span><span style=\"color: #000000; font-size: 12pt;\">Most companies do not know whether they are in breach of licenses such as the GPL\/AGPL.<\/span><span style=\"color: #000000; font-size: 12pt;\">Even more than half of all open source projects are licensed under the GPL.<\/span><span style=\"color: #000000; font-size: 12pt;\">Increasing compliance management risk<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-850c6fe e-con-full e-flex e-con e-child\" data-id=\"850c6fe\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-5d24e2b e-con-full e-flex e-con e-child\" data-id=\"5d24e2b\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-072d91b elementor-widget elementor-widget-text-editor\" data-id=\"072d91b\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"color: #000000; font-size: 12pt;\">Open Source Components Notified of Record Number of Vulnerabilities in 2019 with Annual Increase of Nearly 50%<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-1cb75c8 e-con-full e-flex e-con e-child\" data-id=\"1cb75c8\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-b86d674 elementor-widget elementor-widget-text-editor\" data-id=\"b86d674\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"color: #000000; font-size: 12pt;\">Of the 100 most popular open source projects, 32% are at risk of security vulnerabilities.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-b8d5823 e-con-full e-flex e-con e-child\" data-id=\"b8d5823\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-14b6da2 elementor-widget elementor-widget-text-editor\" data-id=\"14b6da2\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"color: #000000;\">Nearly 40% developers spend 20 to 60 hours per month addressing and patching open source vulnerabilities.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-8440dfc e-con-full e-flex e-con e-parent\" data-id=\"8440dfc\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-57ac65b elementor-widget elementor-widget-spacer\" data-id=\"57ac65b\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7457754 elementor-widget elementor-widget-heading\" data-id=\"7457754\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Why open source components need to be managed<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-9f52ce8 e-flex e-con-boxed e-con e-parent\" data-id=\"9f52ce8\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-6ed54b1 e-con-full e-flex e-con e-child\" data-id=\"6ed54b1\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-7dff751 elementor-widget elementor-widget-heading\" data-id=\"7dff751\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Why is it difficult to manage open source components?<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2514306 elementor-align-left elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"2514306\" data-element_type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"far fa-tired\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Organizations often do not have an accurate picture of how many open source components are actually used in their systems.<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"far fa-tired\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">When a major vulnerability occurs in an open-source component, a large amount of labor must be devoted to fixing it, and the manual auditing process is prone to errors.<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"far fa-tired\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Does the open source component used have a comprehensive version management mechanism? Does it meet the company's internal policies and license compliance requirements?<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-0f4422a e-con-full e-flex e-con e-child\" data-id=\"0f4422a\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-cef3b5c elementor-widget elementor-widget-heading\" data-id=\"cef3b5c\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Advantages of using a systematic risk management tool to manage open source components<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-529d5b2 elementor-align-left elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"529d5b2\" data-element_type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"far fa-smile\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Integrate the CI\/CD development process with tools to identify and control potential sources of risk in advance.<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"far fa-smile\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Establish an early warning mechanism in accordance with the company's information security policy to keep abreast of vulnerability information updates.<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"far fa-smile\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Automatically compares and tracks multiple international vulnerability databases to provide complete security risk and license risk information for open source software.<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"far fa-smile\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Comprehensively grasp the potential problems of open source components, so as to be well-prepared for the enterprise's risk management.<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-32d3293 e-flex e-con-boxed e-con e-parent\" data-id=\"32d3293\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-63ce807 elementor-widget elementor-widget-spacer\" data-id=\"63ce807\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2282a6e elementor-widget elementor-widget-heading\" data-id=\"2282a6e\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Mend functional modules<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-07581a8 e-flex e-con-boxed e-con e-child\" data-id=\"07581a8\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-fd4977b e-con-full e-flex e-con e-child\" data-id=\"fd4977b\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1c5539c elementor-widget elementor-widget-image\" data-id=\"1c5539c\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.itbigtec.com\/mend\/ai\/\">\n\t\t\t\t\t\t\t<img decoding=\"async\" width=\"578\" height=\"459\" src=\"https:\/\/hongtronics.com\/wp-content\/uploads\/2025\/10\/AI-Premium-hero-2.jpg\" class=\"elementor-animation-grow attachment-large size-large wp-image-73725\" alt=\"\" srcset=\"https:\/\/hongtronics.com\/wp-content\/uploads\/2025\/10\/AI-Premium-hero-2.jpg 578w, https:\/\/hongtronics.com\/wp-content\/uploads\/2025\/10\/AI-Premium-hero-2-300x238.jpg 300w\" sizes=\"(max-width: 578px) 100vw, 578px\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-eb4a541 e-con-full e-flex e-con e-child\" data-id=\"eb4a541\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-bc65849 elementor-widget elementor-widget-image\" data-id=\"bc65849\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.itbigtec.com\/mend\/sca\/\">\n\t\t\t\t\t\t\t<img decoding=\"async\" width=\"1024\" height=\"862\" src=\"https:\/\/hongtronics.com\/wp-content\/uploads\/2025\/10\/10001-2-2-1024x862.png\" class=\"elementor-animation-grow attachment-large size-large wp-image-73726\" alt=\"\" srcset=\"https:\/\/hongtronics.com\/wp-content\/uploads\/2025\/10\/10001-2-2-1024x862.png 1024w, https:\/\/hongtronics.com\/wp-content\/uploads\/2025\/10\/10001-2-2-300x253.png 300w, https:\/\/hongtronics.com\/wp-content\/uploads\/2025\/10\/10001-2-2-768x647.png 768w, https:\/\/hongtronics.com\/wp-content\/uploads\/2025\/10\/10001-2-2-600x505.png 600w, https:\/\/hongtronics.com\/wp-content\/uploads\/2025\/10\/10001-2-2.png 1280w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-d97f3d1 e-con-full e-flex e-con e-child\" data-id=\"d97f3d1\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6b62741 elementor-widget elementor-widget-image\" data-id=\"6b62741\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.itbigtec.com\/mend\/sast\/\">\n\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"906\" src=\"https:\/\/hongtronics.com\/wp-content\/uploads\/2025\/10\/10007-2-1-1024x906.png\" class=\"elementor-animation-grow attachment-large size-large wp-image-73727\" alt=\"\" srcset=\"https:\/\/hongtronics.com\/wp-content\/uploads\/2025\/10\/10007-2-1-1024x906.png 1024w, https:\/\/hongtronics.com\/wp-content\/uploads\/2025\/10\/10007-2-1-300x265.png 300w, https:\/\/hongtronics.com\/wp-content\/uploads\/2025\/10\/10007-2-1-768x679.png 768w, https:\/\/hongtronics.com\/wp-content\/uploads\/2025\/10\/10007-2-1-600x531.png 600w, https:\/\/hongtronics.com\/wp-content\/uploads\/2025\/10\/10007-2-1.png 1280w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-fc1f229 e-flex e-con-boxed e-con e-child\" data-id=\"fc1f229\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-c344b4a e-con-full e-flex e-con e-child\" data-id=\"c344b4a\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1db1ae4 elementor-widget elementor-widget-heading\" data-id=\"1db1ae4\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\"><a href=\"https:\/\/www.itbigtec.com\/mend\/ai\/\">Mend AI<\/a><\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-de7baa0 elementor-widget elementor-widget-text-editor\" data-id=\"de7baa0\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"color: #000000; font-size: 12pt;\">Unlike tools that only support AI red team testing, Mend pioneered the full coverage of AI security testing.<\/span><span style=\"color: #000000; font-size: 12pt;\">Not only does it provide insight into the security of AI-generated content.<\/span><span style=\"color: #000000; font-size: 12pt;\">AI component identification and exposure level assessment.<\/span><span style=\"color: #000000; font-size: 12pt;\">It can accurately assess the overall security level of AI components used by an organization.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5abe0d3 elementor-widget elementor-widget-button\" data-id=\"5abe0d3\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/hongtronics.com\/en\/product\/mend-supply-chain-defender\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Learn more \u2192<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-9bc6023 e-con-full e-flex e-con e-child\" data-id=\"9bc6023\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-0237458 elementor-widget elementor-widget-heading\" data-id=\"0237458\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\"><a href=\"https:\/\/www.itbigtec.com\/mend\/sca\/\">Mend SCA<\/a><\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c7613eb elementor-widget elementor-widget-text-editor\" data-id=\"c7613eb\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"color: #000000; font-size: 12pt;\">Based on the world's leading vulnerability database<\/span><br data-start=\"169\" data-end=\"172\" \/><span style=\"color: #000000; font-size: 12pt;\">Combining CVSS 4.0 and the EPSS assessment system.<\/span><span style=\"color: #000000; font-size: 12pt;\">Quantifying vulnerability impacts and exploitation rates.<\/span><span style=\"color: #000000; font-size: 12pt;\">Effectively reduces security alarms on the 85% to avoid \"alarm fatigue,\"<\/span><span style=\"color: #000000; font-size: 12pt;\">Allowing the team to focus on truly high-risk vulnerabilities, the<\/span><span style=\"color: #000000; font-size: 12pt;\">Ensure the security and compliance of the software supply chain.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d821c77 elementor-widget elementor-widget-button\" data-id=\"d821c77\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/hongtronics.com\/en\/product\/mend-sca-autopilot-for-appsec\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Learn more \u2192<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-3105704 e-con-full e-flex e-con e-child\" data-id=\"3105704\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-92bf28f elementor-widget elementor-widget-heading\" data-id=\"92bf28f\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\"><a href=\"https:\/\/www.itbigtec.com\/mend\/sast\/\">Mend SAST<\/a><\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a8ef421 elementor-widget elementor-widget-text-editor\" data-id=\"a8ef421\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"color: #000000; font-size: 12pt;\">Mend accurately detects over 70 CWE vulnerability types.<\/span><span style=\"color: #000000; font-size: 12pt;\">(covering OWASP Top 10 and SANS 25).<\/span><span style=\"color: #000000; font-size: 12pt;\">Supporting applications developed on multiple platforms and frameworks.<\/span><span style=\"color: #000000; font-size: 12pt;\">Scanning speeds are up to 10 times faster than traditional SAST solutions.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9847874 elementor-widget elementor-widget-button\" data-id=\"9847874\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/hongtronics.com\/en\/product\/mend-sast\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Learn more \u2192<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-317a5e0 elementor-widget elementor-widget-spacer\" data-id=\"317a5e0\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c3ab00d elementor-widget elementor-widget-heading\" data-id=\"c3ab00d\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Mend Product Advantages <br> Focus on fixing, not just finding bugs<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-f7686a0 e-flex e-con-boxed e-con e-child\" data-id=\"f7686a0\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-d00fddc e-con-full e-flex e-con e-child\" data-id=\"d00fddc\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-b79d3ef elementor-widget elementor-widget-heading\" data-id=\"b79d3ef\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">The World's Leading Vulnerability Database<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3dc03d2 elementor-widget elementor-widget-text-editor\" data-id=\"3dc03d2\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li data-start=\"18\" data-end=\"72\"><span style=\"color: #000000;\">Culvert<span style=\"color: #0e407e;\"> <strong data-start=\"21\" data-end=\"35\">2.7 Billion Open Source Components<\/strong><\/span> \u8207 <span style=\"color: #0e407e;\"><strong data-start=\"38\" data-end=\"50\">13 billion files<\/strong><\/span>It provides a full range of threat and attack vector monitoring.<\/span><\/li><li data-start=\"18\" data-end=\"72\"><span style=\"color: #000000;\">Support over <span style=\"color: #0e407e;\"><strong data-start=\"79\" data-end=\"92\">200 Programming Languages<\/strong><\/span> \u8207 <span style=\"color: #0e407e;\"><strong data-start=\"95\" data-end=\"107\">3 million components<\/strong><\/span>The NVD is a multi-disciplinary program that integrates information from multiple sources such as the NVD, security bulletins, and open source project trackers multiple times a day.<\/span><\/li><li data-start=\"152\" data-end=\"239\"><span style=\"color: #000000;\">The database covers the international mainstream open source projects, including projects from<span style=\"color: #0e407e;\"><strong data-start=\"174\" data-end=\"204\">GitHub, Maven Central, npmjs<\/strong><\/span> vulnerability and license agreement information for platforms such as<\/span><br data-start=\"219\" data-end=\"222\" \/><span style=\"color: #000000;\">Assist enterprises to grasp the open source risk dynamics in real time.<\/span><\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-ea4e6cc e-con-full e-flex e-con e-child\" data-id=\"ea4e6cc\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-8ba468d elementor-widget elementor-widget-heading\" data-id=\"8ba468d\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Prioritization Based on Availability Analysis<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9ee4023 elementor-widget elementor-widget-text-editor\" data-id=\"9ee4023\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p data-start=\"0\" data-end=\"119\"><span style=\"color: #000000;\"><span style=\"font-size: 12pt;\">Mend <\/span>The ability to analyze whether vulnerable code is actually being called by the project.<\/span><span style=\"color: #000000;\">If the vulnerability function is never executed, the risk level is significantly reduced.<\/span><span style=\"color: #000000;\">Reduced through full link analysis <span style=\"color: #0e407e;\"><strong data-start=\"70\" data-end=\"83\" data-is-only-node=\"\">Security Alarm for 85%<\/strong><\/span>\uff0c<\/span><span style=\"color: #000000;\">Effectively avoiding \"alert fatigue\" and allowing the security team to prioritize the truly risky vulnerabilities.<\/span><\/p><p data-start=\"121\" data-end=\"235\"><span style=\"color: #000000;\">In contrast, many traditional tools are based solely on <span style=\"color: #0e407e;\"><strong data-start=\"136\" data-end=\"154\">CVSS (Common Vulnerability Scoring System)<\/strong><\/span> The scores are sorted.<\/span><span style=\"color: #000000;\">But the fact is, a CVSS score of 9 for a vulnerability that has never been called.<\/span><span style=\"color: #000000;\">The actual risk is probably much lower than a called CVSS 7-point vulnerability.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-cee1a5b e-con-full e-flex e-con e-child\" data-id=\"cee1a5b\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-a12cdb2 elementor-widget elementor-widget-heading\" data-id=\"a12cdb2\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">One-Click Auto Repair<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f89d4b4 elementor-widget elementor-widget-text-editor\" data-id=\"f89d4b4\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p data-start=\"15\" data-end=\"115\"><span style=\"color: #000000; font-size: 12pt;\">Mend, in addition to telling you there's a vulnerability.<\/span><span style=\"color: #000000; font-size: 12pt;\">It can also be used directly in your code repository (e.g., the <span style=\"color: #0e407e;\"><strong data-start=\"55\" data-end=\"85\">GitHub, GitLab, Azure DevOps<\/strong><\/span> etc.)<\/span><span style=\"color: #000000; font-size: 12pt;\">Automatic creation of patches<span style=\"color: #0e407e;\"> <strong data-start=\"100\" data-end=\"112\" data-is-only-node=\"\">Pull Request (PR)<\/strong><\/span>\u3002<\/span><\/p><p data-start=\"117\" data-end=\"165\"><span style=\"color: #000000; font-size: 12pt;\">The PR will contain all the changes required to upgrade to a secure version.<\/span><span style=\"color: #000000; font-size: 12pt;\">The developer only needs to review and merge to complete the fix.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-6fc3ee6 e-con-full e-flex e-con e-child\" data-id=\"6fc3ee6\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-8bc3ca1 elementor-widget elementor-widget-heading\" data-id=\"8bc3ca1\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Rich Software Bill of Materials (SBOM)<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9d8b43f elementor-widget elementor-widget-text-editor\" data-id=\"9d8b43f\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p data-start=\"23\" data-end=\"188\"><span style=\"font-size: 12pt;\"><span style=\"color: #000000;\">Mend is easily accessible in a variety of standardized formats such as <span style=\"color: #0e407e;\"><strong data-start=\"46\" data-end=\"64\">SPDX, CycloneDX<\/strong><\/span>\uff09<\/span><span style=\"color: #000000;\">Send us your <span style=\"color: #0e407e;\"><strong data-start=\"73\" data-end=\"84\">SBOM Report<\/strong><\/span>and support for importing third-party SBOMs.<\/span><span style=\"color: #000000;\">Combined with <span style=\"color: #0e407e;\"><strong data-start=\"107\" data-end=\"117\">VEX Information<\/strong><\/span> \u8207 <span style=\"color: #0e407e;\"><strong data-start=\"120\" data-end=\"132\">AI Verification Transparency<\/strong><\/span>\uff0c<\/span><\/span><br data-start=\"133\" data-end=\"136\" \/><span style=\"font-size: 12pt;\"><span style=\"color: #000000;\">To meet government and customer requirements for software supply chain security compliance.<\/span><span style=\"color: #000000;\">(e.g. <span style=\"color: #0e407e;\"><strong data-start=\"163\" data-end=\"180\">NTIA, CISA, FDA<\/strong> <\/span>(etc. standards).<\/span><\/span><\/p><p data-start=\"190\" data-end=\"245\"><span style=\"font-size: 12pt;\"><span style=\"color: #000000;\">The report has a highly visual presentation that<\/span><span style=\"color: #000000;\">The chain of dependencies between components can be clearly demonstrated.<\/span><span style=\"color: #000000;\">Helps organizations gain real-time visibility into sources of risk and supply chain transparency.<\/span><\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-011bd21 e-con-full e-flex e-con e-parent\" data-id=\"011bd21\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-64ac99b elementor-widget elementor-widget-spacer\" data-id=\"64ac99b\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f181512 elementor-widget elementor-widget-heading\" data-id=\"f181512\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Recognized AppSec Leader in the Industry<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b770084 elementor-widget elementor-widget-text-editor\" data-id=\"b770084\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Recognized by FORRESTER as a leading brand in management tools for six consecutive years.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-c60b450 elementor-section-height-min-height elementor-section-boxed elementor-section-height-default elementor-section-items-middle\" data-id=\"c60b450\" data-element_type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;shape_divider_top&quot;:&quot;tilt&quot;,&quot;shape_divider_bottom&quot;:&quot;tilt&quot;}\">\n\t\t\t\t\t<div class=\"elementor-shape elementor-shape-top\" aria-hidden=\"true\" data-negative=\"false\">\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewbox=\"0 0 1000 100\" preserveaspectratio=\"none\">\n\t<path class=\"elementor-shape-fill\" d=\"M0,6V0h1000v100L0,6z\"\/>\n<\/svg>\t\t<\/div>\n\t\t\t\t<div class=\"elementor-shape elementor-shape-bottom\" aria-hidden=\"true\" data-negative=\"false\">\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewbox=\"0 0 1000 100\" preserveaspectratio=\"none\">\n\t<path class=\"elementor-shape-fill\" d=\"M0,6V0h1000v100L0,6z\"\/>\n<\/svg>\t\t<\/div>\n\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-top-column elementor-element elementor-element-7038548\" data-id=\"7038548\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-e7d346a elementor-widget elementor-widget-elementskit-piechart\" data-id=\"e7d346a\" data-element_type=\"widget\" data-widget_type=\"elementskit-piechart.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"ekit-wid-con\">        <div class=\"ekit-single-piechart withcontent\">\n\n            \n            <div class=\"colorful-chart piechart\" data-pie_color_style=\"normal\" data-gradientcolor1=\"\" data-gradientcolor2=\"\" data-color=\"#0D274D\" data-size=\"170\" data-linewidth=\"8\" data-percent=\"80\">\n\n                \n                    <span class=\"ekit-chart-content\">80&#37;<\/span>\n\n                \n                \n                \n\n\n            <\/div>\n                         <h2 class=\"ekit-piechart-title\">Shrink MTTR<\/h2>\n                    <\/div>\n    <\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-top-column elementor-element elementor-element-8c3f183\" data-id=\"8c3f183\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-9b8c95e elementor-widget elementor-widget-elementskit-piechart\" data-id=\"9b8c95e\" data-element_type=\"widget\" data-widget_type=\"elementskit-piechart.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"ekit-wid-con\">        <div class=\"ekit-single-piechart withcontent\">\n\n            \n            <div class=\"colorful-chart piechart\" data-pie_color_style=\"normal\" data-gradientcolor1=\"\" data-gradientcolor2=\"\" data-color=\"#0D274D\" data-size=\"170\" data-linewidth=\"8\" data-percent=\"95\">\n\n                \n                    <span class=\"ekit-chart-content\">95&#37;<\/span>\n\n                \n                \n                \n\n\n            <\/div>\n                         <h2 class=\"ekit-piechart-title\">Developers use<\/h2>\n                    <\/div>\n    <\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-top-column elementor-element elementor-element-e9ea21f\" data-id=\"e9ea21f\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-f468550 elementor-widget elementor-widget-elementskit-piechart\" data-id=\"f468550\" data-element_type=\"widget\" data-widget_type=\"elementskit-piechart.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"ekit-wid-con\">        <div class=\"ekit-single-piechart withcontent\">\n\n            \n            <div class=\"colorful-chart piechart\" data-pie_color_style=\"normal\" data-gradientcolor1=\"\" data-gradientcolor2=\"\" data-color=\"#0D274D\" data-size=\"170\" data-linewidth=\"8\" data-percent=\"100\">\n\n                \n                    <span class=\"ekit-chart-content\">100&#37;<\/span>\n\n                \n                \n                \n\n\n            <\/div>\n                         <h2 class=\"ekit-piechart-title\">Expanded to 10,000 developers in a matter of days<\/h2>\n                    <\/div>\n    <\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-7e76149 elementor-section-content-middle elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"7e76149\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-f772104\" data-id=\"f772104\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-6488efd elementor-widget elementor-widget-image\" data-id=\"6488efd\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"475\" height=\"541\" src=\"https:\/\/hongtronics.com\/wp-content\/uploads\/2022\/11\/about-us_img-1.png\" class=\"attachment-large size-large wp-image-26427\" alt=\"\" srcset=\"https:\/\/hongtronics.com\/wp-content\/uploads\/2022\/11\/about-us_img-1.png 475w, https:\/\/hongtronics.com\/wp-content\/uploads\/2022\/11\/about-us_img-1-300x342.png 300w, https:\/\/hongtronics.com\/wp-content\/uploads\/2022\/11\/about-us_img-1-263x300.png 263w\" sizes=\"(max-width: 475px) 100vw, 475px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-17e32d0\" data-id=\"17e32d0\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-128c32c elementor-widget elementor-widget-elementskit-heading\" data-id=\"128c32c\" data-element_type=\"widget\" data-widget_type=\"elementskit-heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"ekit-wid-con\" ><div class=\"ekit-heading elementskit-section-title-wraper text_left   ekit_heading_tablet-   ekit_heading_mobile-\"><h2 class=\"ekit-heading--title elementskit-section-title\">Complete integration program<\/h2>\t\t\t\t<div class='ekit-heading__description'>\n\t\t\t\t\t<p>Mend.io's integrations work seamlessly across the tools your team already uses to reduce the burden while realizing a 100% adoption rate among contributing developers. Learn how your AppSec program can benefit from moving vulnerabilities and remediation to a repository - whether you use Github, Azure DevOps, Bitbucket Cloud, Bitbucket Data Center, Gitlab, or Artifactory!<\/p>\n\t\t\t\t<\/div>\n\t\t\t<\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e304d7c elementor-widget elementor-widget-button\" data-id=\"e304d7c\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"#elementor-action%3Aaction%3Dpopup%3Aopen%26settings%3DeyJpZCI6IjUxMDMyIiwidG9nZ2xlIjpmYWxzZX0%3D\" target=\"_blank\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Learn More<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-e4d59d1 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"e4d59d1\" data-element_type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-8f00edc\" data-id=\"8f00edc\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-ea30a50 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"ea30a50\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-e942e91\" data-id=\"e942e91\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-e78c05c elementor-widget elementor-widget-elementskit-heading\" data-id=\"e78c05c\" data-element_type=\"widget\" data-widget_type=\"elementskit-heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"ekit-wid-con\" ><div class=\"ekit-heading elementskit-section-title-wraper text_left   ekit_heading_tablet-   ekit_heading_mobile-\"><h2 class=\"ekit-heading--title elementskit-section-title\">For any request or customized solution<\/h2><h3 class=\"ekit-heading--subtitle elementskit-section-subtitle\">\n\t\t\t\t\t\tFeel free to contact us!\n\t\t\t\t\t<\/h3><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-f7b453f\" data-id=\"f7b453f\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-6d62e2f elementor-align-center elementor-widget elementor-widget-elementskit-button\" data-id=\"6d62e2f\" data-element_type=\"widget\" data-widget_type=\"elementskit-button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"ekit-wid-con\" >\t\t<div class=\"ekit-btn-wraper\">\n\t\t\t\t\t\t\t<a href=\"https:\/\/lin.ee\/3SXsg5E\" class=\"elementskit-btn  whitespace--normal\" id=\"\">\n\t\t\t\t\tContact Hong Hong\t\t\t\t<\/a>\n\t\t\t\t\t<\/div>\n        <\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-6db07df7 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"6db07df7\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7571ca6\" data-id=\"7571ca6\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-45bf8e53 elementor-widget elementor-widget-spacer\" data-id=\"45bf8e53\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>Mend.io \u200b \u958b\u6e90\u5143\u4ef6\u6383\u63cf \u7ba1\u7406 AppSec \u5e73\u53f0 Mend \u662f\u5168\u7403\u9996\u6b3e\u540c\u6642\u652f\u63f4\u958b\u6e90\u8207\u81ea\u6709\u7a0b\u5f0f\u78bc\u6f0f\u6d1e\u81ea [&hellip;]<\/p>","protected":false},"author":34,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_eb_attr":"","ocean_post_layout":"full-screen","ocean_both_sidebars_style":"","ocean_both_sidebars_content_width":0,"ocean_both_sidebars_sidebars_width":0,"ocean_sidebar":"0","ocean_second_sidebar":"0","ocean_disable_margins":"enable","ocean_add_body_class":"","ocean_shortcode_before_top_bar":"","ocean_shortcode_after_top_bar":"","ocean_shortcode_before_header":"","ocean_shortcode_after_header":"","ocean_has_shortcode":"","ocean_shortcode_after_title":"","ocean_shortcode_before_footer_widgets":"","ocean_shortcode_after_footer_widgets":"","ocean_shortcode_before_footer_bottom":"","ocean_shortcode_after_footer_bottom":"","ocean_display_top_bar":"default","ocean_display_header":"default","ocean_header_style":"","ocean_center_header_left_menu":"0","ocean_custom_header_template":"0","ocean_custom_logo":0,"ocean_custom_retina_logo":0,"ocean_custom_logo_max_width":0,"ocean_custom_logo_tablet_max_width":0,"ocean_custom_logo_mobile_max_width":0,"ocean_custom_logo_max_height":0,"ocean_custom_logo_tablet_max_height":0,"ocean_custom_logo_mobile_max_height":0,"ocean_header_custom_menu":"0","ocean_menu_typo_font_family":"0","ocean_menu_typo_font_subset":"","ocean_menu_typo_font_size":0,"ocean_menu_typo_font_size_tablet":0,"ocean_menu_typo_font_size_mobile":0,"ocean_menu_typo_font_size_unit":"px","ocean_menu_typo_font_weight":"","ocean_menu_typo_font_weight_tablet":"","ocean_menu_typo_font_weight_mobile":"","ocean_menu_typo_transform":"","ocean_menu_typo_transform_tablet":"","ocean_menu_typo_transform_mobile":"","ocean_menu_typo_line_height":0,"ocean_menu_typo_line_height_tablet":0,"ocean_menu_typo_line_height_mobile":0,"ocean_menu_typo_line_height_unit":"","ocean_menu_typo_spacing":0,"ocean_menu_typo_spacing_tablet":0,"ocean_menu_typo_spacing_mobile":0,"ocean_menu_typo_spacing_unit":"","ocean_menu_link_color":"","ocean_menu_link_color_hover":"","ocean_menu_link_color_active":"","ocean_menu_link_background":"","ocean_menu_link_hover_background":"","ocean_menu_link_active_background":"","ocean_menu_social_links_bg":"","ocean_menu_social_hover_links_bg":"","ocean_menu_social_links_color":"","ocean_menu_social_hover_links_color":"","ocean_disable_title":"default","ocean_disable_heading":"default","ocean_post_title":"","ocean_post_subheading":"","ocean_post_title_style":"","ocean_post_title_background_color":"","ocean_post_title_background":0,"ocean_post_title_bg_image_position":"","ocean_post_title_bg_image_attachment":"","ocean_post_title_bg_image_repeat":"","ocean_post_title_bg_image_size":"","ocean_post_title_height":0,"ocean_post_title_bg_overlay":0.5,"ocean_post_title_bg_overlay_color":"","ocean_disable_breadcrumbs":"default","ocean_breadcrumbs_color":"","ocean_breadcrumbs_separator_color":"","ocean_breadcrumbs_links_color":"","ocean_breadcrumbs_links_hover_color":"","ocean_display_footer_widgets":"default","ocean_display_footer_bottom":"default","ocean_custom_footer_template":"0","iawp_total_views":460,"footnotes":""},"class_list":["post-34855","page","type-page","status-publish","hentry","entry","owp-thumbs-layout-horizontal","owp-btn-normal","owp-tabs-layout-horizontal","has-no-thumbnails","has-product-nav"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/hongtronics.com\/en\/wp-json\/wp\/v2\/pages\/34855","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/hongtronics.com\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/hongtronics.com\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/hongtronics.com\/en\/wp-json\/wp\/v2\/users\/34"}],"replies":[{"embeddable":true,"href":"https:\/\/hongtronics.com\/en\/wp-json\/wp\/v2\/comments?post=34855"}],"version-history":[{"count":11,"href":"https:\/\/hongtronics.com\/en\/wp-json\/wp\/v2\/pages\/34855\/revisions"}],"predecessor-version":[{"id":73985,"href":"https:\/\/hongtronics.com\/en\/wp-json\/wp\/v2\/pages\/34855\/revisions\/73985"}],"wp:attachment":[{"href":"https:\/\/hongtronics.com\/en\/wp-json\/wp\/v2\/media?parent=34855"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}