Insignary | Clarity

Powerfully Unique

 Insignary Clarity leverages unique fingerprint matching technology that  extracts “fingerprints” from the target binary code to examine and then  compare against the fingerprints collected from open source components  in numerous open source repositories. 

Vulnerability ranking                  

Uses Clarity algorithm to rank and prioritize open source security vulnerabilities in binary code


License Compliance                  

Prevents conflicts with license compliance issues and copyright trolls


Update notification                   

Notifies users of new vulnerabilities in already scanned files


Export Options                   

Able to export security and compliance BoM in Excel, CSV, and JSON formats


Flexible Deployment                  

Available as cloud-based or on-premise solution


Wide-Ranging Support                 

Supports LDAP, RESTful API, and automation servers like Jenkins


 Open source is ubiquitous - more than 90 percent of the software written  these days integrates open source code. Such code is used in IoT  firmware, operating systems, network platforms and applications. This  trend will only continue to grow because, by leveraging open source,  developers can lower assembly costs and quickly add innovations, thereby  saving months or years of originally required development time. Because  of its transparency, open source code also tends be better engineered  than a comparable piece of proprietary code. And thanks to its superior  quality and flexibility, open source code is used more widely than its  "closed code" counterpart. This means that a security vulnerability in a  piece of open-source code is likely to be found across a multitude of  applications and platforms. Consequently, open source vulnerabilities  become an easy and efficient target for hackers.