Skip to main content
The Binarly Transparency Platform is a subscription-based SaaS platform that is purpose-built to protect manufacturers and enterprises from firmware and supply chain threats. It can be implemented as a critical feed into a well-defined security program (SOC), as part of a continuous integration/ continuous delivery (CI/CD) manufacturing program, OEM, or as a standalone binary visibility and vulnerability management tool for enterprises. The Platform is powered by thoughtful design, proprietary deep code inspection, machine learning, and advanced decision-flow algorithms. Binarly technologies, paired with unprecedented security research and industry expertise, afford customers world-class known and unknown vulnerability detection, visibility, and actionable data outputs previously unavailable. The Binarly Transparency Platform is hosted in the cloud and provisioned for each customer, creating an individual container where all customer data is securely stored. Data is sent to the Platform over an authenticated and encrypted SSL channel.

Authenticating to the Platform

Access your private platform instance by navigating to the URL provided: https://dashboard.MASKED.binarly.cloud/ Where MASKED would be your individual assigned instance name. This is a randomly generated URL to ensure security. We recommend creating a browser bookmark for ease of use. You will be redirected to the authentication provider page, where you can log in using your email. Accounts will be provisioned along with the dashboard instance. These will be the primary points of contact and will be provided to your account team during onboarding. Adding additional accounts to the platform, can be performed by a user defined as an organization admin within the platform. Lost passwords and password resets can be performed by clicking the “Forgot password” link, contacting your organization admin, or simply by opening a ticket with the Binarly support team. By default, Multi-Factor Authentication and strong passwords are enforced. You will be prompted to configure this on your initial login. The platform will work with almost any multi-factor authentication application. Microsoft and Google Authenticator applications are popular choices.
To configure Multi-Factor Authentication (MFA):
  1. Download an authenticator app such as Google Authenticator or Microsoft Authenticator on your mobile device.
  2. Scan the QR code displayed during the initial login.
  3. Enter the generated code to complete the MFA setup.
Note: If you face issues during setup, refer to the authenticator app’s user guide or contact Binarly Support.

Password Policy

The minimum password length for SaaS instances of the Binary Transparency Platform is 32 characters. Passwords must also meet complexity requirements, including at least one capital, alphanumeric, and special character. Due to these complex requirements, we strongly recommend utilizing a password vaulting solution and randomly generated passwords rather than manually entering strong passwords.

Workflows

The Binarly Transparency Platform provides workflows designed specifically for user personas and functional applications of the solution. Common users include supply chain security teams, third-party vendor evaluators, firmware/BIOS developers, OEMs, and ODMs. These users typically utilize one of two primary workflows: project-based or validation (scan)-based. Automation capabilities are extensively employed in software development life cycles (SDLC) and Continuous Integration/Continuous Deployment (CI/CD) pipeline applications of the solution. In a project-based workflow, an OEM or device manufacturer typically incorporates the platform as part of their release validation process. This ensures that final compiled binaries are free of vulnerabilities prior to the release of software packages or updates. With its robust, REST API-based architecture, the Binarly Transparency Platform can seamlessly integrate into existing development or quality assurance workflows, offering flexibility and scalability. In a software supply chain or third-party vendor validation workflow, any third-party binaries can be submitted to the platform for assessment. This process provides deep insights into the contents and vulnerability posture of software at levels typically unattainable without source code access. The platform enables critical visibility into issues within components, dependencies (both static and transitive), cryptographic materials, embedded secrets, and adherence to secure-by-design principles. These capabilities ensure that vulnerabilities in binaries, whether currently deployed or being integrated into enterprise infrastructure, products, or environments, are identified and mitigated effectively.

Platform Components

The Binarly Transparency Platform is organized into logical components that follow a clear and intuitive flow. This design ensures that users—whether analysts, administrators, or executives—can easily access the specific information relevant to their roles and use cases. Key Features of the Platform Components
  1. User-Centric Design:
    • Tailored to different personas, providing role-specific data and insights:
      • Analysts: In-depth vulnerability and threat details.
      • Administrators: Configuration and management tools.
      • Executives: High-level overviews and trend analysis.
  2. Default Dashboard View:
    • Upon login, users are presented with a cumulative dashboard, offering an aggregated overview of all data assessed by the platform.
    • This dashboard acts as a central hub, summarizing key metrics, findings, and trends across the entire environment.
  3. Logical Flow:
    • The platform is structured to guide users seamlessly through workflows, ensuring they can efficiently analyze, prioritize, and act on findings.