Monday, November 18, 2024

Binarly Launches Next-Generation Transparency Platform to Strengthen Software Supply Chain Security

Binarly, provider of the best AI-powered firmware and software supply chain security platform, announces the release of Binarly Transparency Platform v2.0 with features for continuous post-build compliance, visibility into the security posture of IoT and XIoT devices, and the ability to identify malicious behavior and backdoors hidden in binaries based on their behavior.

Based on proprietary Binary Risk Intelligence technology, the new innovations demonstrate Binarly’s commitment to developing solutions that improve transparency and security across firmware and software ecosystems.

Founded in 2021 with the goal of increasing software supply chain transparency through deep program analysis, Binarly’s flagship platform has automated the discovery of hundreds of new vulnerabilities, enabling our customers to attack security breaches even before they become significant.

Also Read: Alibaba.com Unveils Affordable, Customizable Logistics Solutions for U.S. SMEs

Binarly‘s patented approach, powered by modern AI, has been able to proactively neutralize known – and previously unknown – threats and help enterprise defenders reduce the time between vulnerability discovery and enforcement. implement corrective measures.

“ Most current software composition analysis (SCA) and software supply chain solutions rely on basic, outdated methods. Our approach with AI-driven Binary Risk Intelligence technology allows us to proactively identify and mitigate known and unknown risks ,” said Alex Matrosov, Founder and CEO of Binarly.

“ This release brings greater clarity and transparency to the software supply chain ecosystem and enables enterprise security teams and product security organizations to apply a knowledge- based approach at scale. design safety , ” added Mr. Matrosov.

Better features and capabilities

The Binarly v2.0 transparency platform integrates several key features to strengthen security:

  • Continuous Monitoring : Ensures compliance after construction by continuously validating safety-related changes.
  • Detailed insights : Improves understanding of the security posture of IoT and XIoT devices, revealing vulnerabilities and dependencies.
  • Behavior Analysis : Identifies malicious behaviors and hidden backdoors in binaries based on their actions.
  • Secure Coding Practices : Detects insecure coding and evaluates mitigations at the time of building each binary.
  • SBOM production : Enables the production and validation of software bills of material (SBOM) for an overview of risks.
  • Legal Compliance : Detects license requirements and embedded keys to avoid legal issues and ensure secure cryptographic use.

SOURCE: Businesswire

Subscribe Now

    Hot Topics