Binarly Unveils Next-Gen Firmware Protection Transparency Platform, Revolutionizing Device Supply Chain Security
Binarly announced the general release of the Binarly Transparency Platform, delivering unprecedented transparency for device supply chains enabling device manufacturers and endpoint protection products to comprehensively analyze both firmware and hardware to identify vulnerabilities, misconfigurations, and malicious code implantation.
The Binarly Transparency Platform is designed to identify vulnerabilities and malicious threats in code, seamlessly integrating as a security component of an SDLC or CI-CD pipeline or further down the supply chain. The platform takes security to the next level by adding dangerous misconfiguration checking at the device level, ensuring that organizations can effectively monitor and mitigate risks throughout the entire lifecycle of their devices.
At the core of the Transparency Platform is a Vulnerability Analysis engine that leverages deep code inspection to detect vulnerabilities within analyzed firmware images. This powerful tool provides organizations with crucial insight into the existence of known vulnerabilities, allowing them to address potential threats before they can be exploited.
AiThority: The Use of AI in Hollywood
Binarly Transparency Platform capabilities:
Firmware Similarity Analysis — Enables developers and security analysts to perform binary-level comparisons of firmware images, swiftly detecting any modifications, deletions, or potential threats caused by either unintentional errors or deliberate attacks.
Deep Vulnerability Analysis — Uses deep code analysis and AI/ML to uncover previously unknown vulnerabilities within known classes. Identifies vulnerable code patterns in firmware binaries, exposing coding errors and improper service usage. Binarly Transparency Platform pinpoints firmware-specific vulnerabilities, offering risk scoring to help security teams prioritize and expedite security updates.
SBOM and Dependency Analysis — The Binarly Transparency Platform takes a Zero Trust approach to SBOMs by thoroughly examining firmware images to reveal all components within the code. This allows the platform to construct a dependency graph and identify third-party dependencies, not solely relying on hashes but reconstructing the truth from the binary code.
“The capabilities built into the Binarly Transparency Platform are already helping customers reduce the number of security risks coming from threats below the operating system. Our technology is designed to proactively detect new threats and identify vulnerabilities and more importantly, make these discoveries actionable for defenders,” said Binarly Chief Executive Officer Alex Matrosov.
Over the past year, we have been working closely with our development partners and customers, who have already started to experience significant benefits from the platform’s capabilities:
Read More: ChatGPT Won’t Replace Your Marketing Job, But it’s Critical to Leverage for Success
Feedback from customers and users:
“Binarly has a unique approach to securing firmware, built by some of the most innovative minds in the space. They have decades of experience in understanding and researching the problem from the hardware on up, paired with a modern and scalable approach to bringing the value of securing firmware to any organization. The visibility and control they offer is second to none.”
Ryan Permeh – Partner, Syn Ventures
“We value the work that Binarly is doing to help make firmware more secure and appreciate their professionalism while working with us to report these issues in a timely manner. Their AI-powered approach to identifying threats is proving to be a valuable tool to help provide stronger firmware security.”
Tim Lewis – CTO, Insyde
“Binarly’s binary code analysis is extremely effective in finding vulnerabilities in upstream libraries, where source access may not be possible. When Binarly found unknown vulnerabilities in our BIOS, they provided detailed information including where the vulnerability was and the impact associated with it. They then worked directly with our BIOS vendor to fix the vulnerabilities upstream.”
Kieran Levin – Lead System Architect, Framework Computer
“At AMI, we take firmware security seriously, which is why we’re excited to collaborate with Binarly on securing the supply chain. By working together, AMI is best positioned to ensure that our clients’ firmware is protected from potential threats, giving them peace of mind and the ability to focus on what they do best – creating innovative solutions that drive their business forward.”
Brian Mullen – Senior Manager of Software Security, AMI
The Binarly Transparency Platform incorporates decades of experience from the Binarly Research team, which using the pre-release of this platform has consistently exposed repeatable failures in various types of UEFI firmware. In one year, the team disclosed 228 high-impact vulnerabilities and collaborated with multiple parties to assist the industry in mitigating risk from the vast amount of firmware vulnerabilities.
Latest Insights: Is Customer Experience Strategy Making or Breaking Your ‘Shopping Festival’ Sales?
[To share your insights with us, please write to sghosh@martechseries.com]
Comments are closed.