Binarly Transparency Platform 2.5: Empowering Secure-by-Design at Scale
Binarly's Transparency Platform 2.5 offers advanced binary risk intelligence, going beyond known vulnerabilities to understand how code executes and identify entire classes of defects in software, firmware, and containers. This proactive approach minimizes false positives and ensures comprehensive security.
Key Features
- Proactive Vulnerability Management: Detects known vulnerabilities and undiscovered classes of defects, enforcing consistent build-time mitigations.
- Transitive Dependency Identification: Moves beyond SBOMs to detect all binary dependencies, including transitive ones.
- Malicious Code Detection: Identifies firmware implants and other malicious code through behavioral analysis.
- Rapid Vulnerability Resolution: Provides prescriptive and verified fixes for efficient remediation.
- Release Change Understanding: Instantly highlights differences between software releases.
- Continuous Assessment and Reporting: Integrates with CI/CD for ongoing security and generates reports for compliance demonstrations.
- License Compliance and Cryptographic Security: Detects license violations and insecure cryptographic patterns for proactive issue resolution.
How Binarly Works
Binarly's platform analyzes binaries without needing source code, employing:
- Automated Binary Analysis: Zeroing in on critical security aspects.
- AI-Assisted Vulnerability Management: Surfacing crucial insights from software supply chains.
- Continuous Compliance Monitoring: Ensuring ongoing security and regulatory adherence.
Binarly's Research Background
The Binarly team boasts decades of experience in uncovering advanced malware threats, firmware, and hardware vulnerabilities. Their research has led to the coordinated disclosure of nearly 500 vulnerabilities, including the impactful LogoFAIL vulnerability.
Getting Started with Binarly
Binarly offers customized packages to meet individual needs. Contact their team to discuss your specific requirements.
Recent Developments
- Patent Awarded: Binarly secured a U.S. patent for its innovative CBOM generation process from binary executables.
- Binary Risk Hunt: Released a free vulnerability scanner with SBOM generation capabilities.
- Supermicro BMC IPMI Firmware Vulnerabilities: Disclosed command injection and stored XSS vulnerabilities in Supermicro firmware.
- LogoFAIL and Bootkitty: Connected the LogoFAIL vulnerability to the newly discovered Bootkitty Linux bootkit.
Conclusion
Binarly's Transparency Platform provides a comprehensive and proactive approach to firmware and software supply chain security, empowering organizations to build secure-by-design systems at scale. Its research-driven approach and continuous innovation make it a leader in the field.