04/23/2024
This release brings enhanced clarity and transparency to the software supply chain ecosystem through the lens of Binary Risk Intelligence. It enables enterprise security teams and empowers product security organizations to implement a secure-by-design approach at scale.
Features
- Ensure post-build compliance by continuously monitoring and validating for security-related changes.
- Gain insights into the security posture of IoT and XIoT devices, enabling a deeper understanding of their vulnerabilities and dependencies.
- Identify malicious behavior and hidden backdoors within binaries based on their behavior.
- Detect insecure coding practices and coverage of build-time mitigations within each binary.
- Gain insights into what software is truly made of, enabling production and validation of SBOMs for a deeper understanding of corresponding risks.
- Detect license obligations buried within the binaries you depend on to avoid legal issues down the road.
- Detect embedded keys, if they are being used, and insecure cryptographic usage patterns to help catch key leaks and correct cryptographic usage before shipping.
- Empower security leadership to make informed decisions with a curated dashboard.