aDolus Technology Inc., a global authority on software intelligence for critical infrastructure, and Exiger, the market-leading supply chain and third-party risk AI company, have announced a strategic partnership to provide broad and deep visibility into risks in the software supply chain.
Cyber threats to operational technology (OT) systems in critical infrastructure are escalating. High profile attacks and the regulatory responses that follow are driving an urgent need for software supply chain visibility. Exiger supports its customers in critical industries and the U.S. Federal Government to respond to these challenges, providing sweeping visibility into supplier and third-party ecosystems to help manage risk, reduce costs, and ensure resilience.
Exiger has integrated aDolus into its best-in-class supply chain platform to analyze firmware and industrial control software for vulnerabilities and provenance, contributing to Exiger’s cutting-edge AI models for operational, product and foreign ownership, control, and influence (FOCI) risk.
“aDolus offers depth and granular visibility into the very bits of the hundreds of thousands of files in OT systems,” said Exiger President Carrie Wibben. “Exiger has integrated this data to expose hidden risks in operational technology, even if the firmware files have been misattributed or rebranded. They’re a strong complement to Ion Channel’s Software Bill of Material analysis capability and 1Exiger’s larger supply chain risk assessment. Through this partnership, we have demonstrated to our U.S. Federal Government and corporate customers a level of visibility and attribution they didn’t know was possible.”
“The breadth and depth of Exiger’s relationships with government agencies and regulated customers introduces our capabilities into a market that’s huge but hard to crack,” said Eric Byres, CEO, aDolus. “Our team has decades of experience analyzing OT systems across manufacturing, oil and gas, and other critical industries. We can support Exiger in tackling new markets and in combining OT and IT security in an unprecedented manner for end-to-end supply chain visibility.”
SOURCE : PRNewswire