AEGIS/Mend/cybellum

Key Features
SBoM(Software bill of materials) detection
- Provides full configuration information necessary to filter the actual impact of vulnerabilities through scanning of all H/W and S/W components (Bill of Materials).
- Detect software components with a multi-stage detection engine that applies context-based collaborative filtering.
Machine learning-based analytics engine
- Identify and analyze software cybersecurity risks by running automated analysis on binary codes of various platforms using a machine learning-based analysis engine.
Analysis Process
- Accurate and detailed security risk detection using only binary code through advanced static and dynamic analysis engine
Public Cloud
- Download method through designation of a person in charge and approval by the designated person in charge
- Prevent indiscriminate outflow of corporate assets
- Provides a protective alternative by tracking approval records
Product Features
Automatic threat exposure of binaries
Detects known vulnerabilities such as attack paths, vulnerability severity, and comprehensive vulnerability database, as well as unknown critical vulnerabilities such as memory corruption, memory reference, network vulnerabilities, and function misuse.
Preemptive threat mitigation
You can support troubleshooting through prioritization and search security policies.
Continuous impact-based assessment
- Automatically updates cyber threat information, performs patches, and performs impact analysis.
- Real-time monitoring is possible, so you can continuously check the impact.
Off-device solutions
- Evaluation and monitoring are possible by simply uploading files through the web UI without the need for a separate agent. (Cloud or On-Premise)
Compliance Support
- In addition to open source inspection, it supports detection of international automotive standards and automotive coding rule standards.
Open source management system
It is a multi-platform binary analysis tool that can detect both known and unknown vulnerabilities and uses machine learning.
Detect real-world security threats and verify threat intelligence with a database built on top of it and proprietary algorithms to enhance the safety of your software.