top of page

AEGIS/Mend/cybellum

cybellum

Key Features

SBoM(Software bill of materials) detection

- Provides full configuration information necessary to filter the actual impact of vulnerabilities through scanning of all H/W and S/W components (Bill of Materials).

- Detect software components with a multi-stage detection engine that applies context-based collaborative filtering.

Machine learning-based analytics engine

- Identify and analyze software cybersecurity risks by running automated analysis on binary codes of various platforms using a machine learning-based analysis engine.

Analysis Process

- Accurate and detailed security risk detection using only binary code through advanced static and dynamic analysis engine

Public Cloud

- Download method through designation of a person in charge and approval by the designated person in charge

- Prevent indiscriminate outflow of corporate assets

- Provides a protective alternative by tracking approval records

Product Features

Automatic threat exposure of binaries

Detects known vulnerabilities such as attack paths, vulnerability severity, and comprehensive vulnerability database, as well as unknown critical vulnerabilities such as memory corruption, memory reference, network vulnerabilities, and function misuse.

Preemptive threat mitigation

You can support troubleshooting through prioritization and search security policies.

Continuous impact-based assessment

- Automatically updates cyber threat information, performs patches, and performs impact analysis.

- Real-time monitoring is possible, so you can continuously check the impact.

Off-device solutions

- Evaluation and monitoring are possible by simply uploading files through the web UI without the need for a separate agent. (Cloud or On-Premise)

Compliance Support

- In addition to open source inspection, it supports detection of international automotive standards and automotive coding rule standards.

Open source management system

It is a multi-platform binary analysis tool that can detect both known and unknown vulnerabilities and uses machine learning.

Detect real-world security threats and verify threat intelligence with a database built on top of it and proprietary algorithms to enhance the safety of your software.

Contact US

Thanks for submitting!

Keystone Security Co., Ltd.

© 2020 by Keystone security

Addr. 10, Seonyu-ro 9-gil, Yeongdeungpo-gu, Seoul 1105 | Tel. 02) 706-1003 | Fax. 02) 2167-1261

bottom of page