image1

Insignary | Clarity

Powerfully Unique

 Insignary Clarity leverages unique fingerprint matching technology that  extracts “fingerprints” from the target binary code to examine and then  compare against the fingerprints collected from open source components  in numerous open source repositories. 


Vulnerability ranking                  

Uses Clarity algorithm to rank and prioritize open source security vulnerabilities in binary code

                               

License Compliance                  

Prevents conflicts with license compliance issues and copyright trolls

                               

Update notification                   

Notifies users of new vulnerabilities in already scanned files

                                     

Export Options                   

Able to export security and compliance BoM in Excel, CSV, and JSON formats

                               

Flexible Deployment                  

Available as cloud-based or on-premise solution

                               

Wide-Ranging Support                 

Supports LDAP, RESTful API, and automation servers like Jenkins

KNOW YOUR OPEN SOURCE SOFTWARE

 Open source is ubiquitous - more than 90 percent of the software written  these days integrates open source code. Such code is used in IoT  firmware, operating systems, network platforms and applications. This  trend will only continue to grow because, by leveraging open source,  developers can lower assembly costs and quickly add innovations, thereby  saving months or years of originally required development time. Because  of its transparency, open source code also tends be better engineered  than a comparable piece of proprietary code. And thanks to its superior  quality and flexibility, open source code is used more widely than its  "closed code" counterpart. This means that a security vulnerability in a  piece of open-source code is likely to be found across a multitude of  applications and platforms. Consequently, open source vulnerabilities  become an easy and efficient target for hackers.