Insignary Clarity leverages unique fingerprint matching technology that extracts “fingerprints” from the target binary code to examine and then compare against the fingerprints collected from open source components in numerous open source repositories.
Vulnerability ranking
Uses Clarity algorithm to rank and prioritize open source security vulnerabilities in binary code
License Compliance
Prevents conflicts with license compliance issues and copyright trolls
Update notification
Notifies users of new vulnerabilities in already scanned files
Export Options
Able to export security and compliance BoM in Excel, CSV, and JSON formats
Flexible Deployment
Available as cloud-based or on-premise solution
Wide-Ranging Support
Supports LDAP, RESTful API, and automation servers like Jenkins
Open source is ubiquitous - more than 90 percent of the software written these days integrates open source code. Such code is used in IoT firmware, operating systems, network platforms and applications. This trend will only continue to grow because, by leveraging open source, developers can lower assembly costs and quickly add innovations, thereby saving months or years of originally required development time. Because of its transparency, open source code also tends be better engineered than a comparable piece of proprietary code. And thanks to its superior quality and flexibility, open source code is used more widely than its "closed code" counterpart. This means that a security vulnerability in a piece of open-source code is likely to be found across a multitude of applications and platforms. Consequently, open source vulnerabilities become an easy and efficient target for hackers.
Copyright © 2019 Warrenton Global Solutions, LLC - All Rights Reserved.