Vulnerability assessment

Vulnerability assessment

Detect application security vulnerabilities prior to their installation

Our file-based vulnerability assessment technology detects security holes in applications and files before they are installed. We use our patented technology (U.S. 9749349 B1) to correlate security vulnerabilities in software components, product installers, firmware packages and many other types of binary files that are collected from a huge community of users and corporate customers.

Increase in software security vulnerabilities

As software complexity increases, the number of application security vulnerabilities increases. Each year a new record is set for the number of known security vulnerabilities, including not only operating system and application vulnerabilities, but also binary components, Internet of Things (IoT) firmware and other file-based vulnerabilities.

Software security vulnerabilities are on the rise. Since 2002, the total number of software vulnerabilities has grown by an average of 12 percent per year.

Rapid growth in file-based security vulnerabilities

File-based vulnerabilities are one of the fastest growing categories of vulnerability types in recent years.

Technology demonstration - assessment of application and file-based security vulnerabilities

Millions of users are vulnerable to attacks that exploit security vulnerabilities. Detecting and preventing installers from getting into networks and using them to spread vulnerabilities is one of the best practices in cyber security.

Vulnerabilities associated with specific binary components are difficult to detect using traditional vulnerability detection technology. Our innovative technology has collected and analyzed more than one billion (and growing) sensitive software data points from devices in the wild and uses this data as the basis for assessing security vulnerabilities based on software components.

Security vulnerabilities in IoT software and firmware are gaining attention. IoT devices are usually designed for specific functions and have no precautions. Preventing the deployment of vulnerable firmware on IoT devices is a critical security measure given the rapid growth of IoT devices. Our vulnerability detection technology is able to detect software vulnerabilities before installation and deployment.

Most vulnerability scanning solutions identify vulnerabilities after the application is installed, which creates a detection window that can be exploited. OPSWAT's patented Computer Security File-Based Vulnerability Assessment technology (U.S. 9749349 B1) assesses and identifies security vulnerabilities using binaries that are associated with vulnerable components or specific versions of applications. It gives IT administrators an opportunity:

  • Check certain types of software for known security vulnerabilities before installation
  • Scan systems for known security vulnerabilities when devices are at rest
  • Quickly check running applications and the libraries loaded into them for security vulnerabilities