Nexus on the Ascent

Heading into this year, JFrog questioned the future of the Nexus Platform following news of Sonatype being acquired by Vista – sensing “tremors” on the horizon. The “tremors” were simply fabrications from a competitor and the reality is that Nexus is stronger and more forward-thinking than ever. The continued ascent of the Nexus Platform is exemplified by our elevated investment in engineering and advanced roadmap to deliver even more customer value. But, don’t just take our word for it. The ascent is no more visible than when looking at developer adoption:

  • Nexus Repository continues to be preferred 2:1 over Artifactory. 
  • Nexus Repository continues to be ranked as the #1 repo manager on IT Central Station
  • 10 million developers trust Nexus to help them manage OSS dependencies, containers, and other build artifacts

We help developers build their best software. Another testament to the diversity of the community we serve: Nexus deployments are visible in 148 countries. It’s this community that keeps us motivated to build the best repository manager and dependency management platform in the market.

Whether it’s serving billions of open source components to developers annually, accelerating DevOps pipelines with our repository manager, enhancing dependency management, or improving security for high performance development teams – developers will continue to be at the core of our innovations, and so will the Nexus Platform.

Rapidly Rising Tides

It’s been awesome to witness the simultaneous rising tides of component-based software development, DevOps practices, software development as a differentiator, and application security investments in the wake of increasing cybercrime. The market interest in these tides continues to fuel our growth, accelerates continued consolidation in the industry, and leads companies to successful exits (whether by acquisition or IPO…we certainly applaud JFrog on their recent NASDAQ debut).

Nexus Knows Developers 

Developers are using more (Read more...)

*** This is a Security Bloggers Network syndicated blog from Sonatype Blog authored by Brent Kostak. Read the original post at: