CIO Influence
CIO Influence News Security

Binarly Unveils Next-Gen Firmware Protection Transparency Platform, Revolutionizing Device Supply Chain Security

Binarly Unveils Next-Gen Firmware Protection Transparency Platform, Revolutionizing Device Supply Chain Security

Binarly announced the general release of the Binarly Transparency Platform, delivering unprecedented transparency for device supply chains enabling device manufacturers and endpoint protection products to comprehensively analyze both firmware and hardware to identify vulnerabilities, misconfigurations, and malicious code implantation.

The Binarly Transparency Platform is designed to identify vulnerabilities and malicious threats in code, seamlessly integrating as a security component of an SDLC or CI-CD pipeline or further down the supply chain. The platform takes security to the next level by adding dangerous misconfiguration checking at the device level, ensuring that organizations can effectively monitor and mitigate risks throughout the entire lifecycle of their devices.

At the core of the Transparency Platform is a Vulnerability Analysis engine that leverages deep code inspection to detect vulnerabilities within analyzed firmware images. This powerful tool provides organizations with crucial insight into the existence of known vulnerabilities, allowing them to address potential threats before they can be exploited.

CIO INFLUENCE: PlainID Launches The PlainID Technology Network to Enable Identity Aware Security for Advanced Access Control

Binarly Transparency Platform capabilities:

Firmware Similarity Analysis — Enables developers and security analysts to perform binary-level comparisons of firmware images, swiftly detecting any modifications, deletions, or potential threats caused by either unintentional errors or deliberate attacks.

Deep Vulnerability Analysis — Uses deep code analysis and AI/ML to uncover previously unknown vulnerabilities within known classes. Identifies vulnerable code patterns in firmware binaries, exposing coding errors and improper service usage. Binarly Transparency Platform pinpoints firmware-specific vulnerabilities, offering risk scoring to help security teams prioritize and expedite security updates.

SBOM and Dependency Analysis — The Binarly Transparency Platform takes a Zero Trust approach to SBOMs by thoroughly examining firmware images to reveal all components within the code. This allows the platform to construct a dependency graph and identify third-party dependencies, not solely relying on hashes but reconstructing the truth from the binary code.

“The capabilities built into the Binarly Transparency Platform are already helping customers reduce the number of security risks coming from threats below the operating system. Our technology is designed to proactively detect new threats and identify vulnerabilities and more importantly, make these discoveries actionable for defenders,” said Binarly Chief Executive Officer Alex Matrosov.

Over the past year, we have been working closely with our development partners and customers, who have already started to experience significant benefits from the platform’s capabilities:

CIO INFLUENCE: Ascend.io Launches Solution in Partnership with Snowflake, Enabling Cost Savings for Data Teams

Feedback from customers and users:

“Binarly has a unique approach to securing firmware, built by some of the most innovative minds in the space. They have decades of experience in understanding and researching the problem from the hardware on up, paired with a modern and scalable approach to bringing the value of securing firmware to any organization. The visibility and control they offer is second to none.”
Ryan Permeh – Partner, Syn Ventures

“We value the work that Binarly is doing to help make firmware more secure and appreciate their professionalism while working with us to report these issues in a timely manner. Their AI-powered approach to identifying threats is proving to be a valuable tool to help provide stronger firmware security.”
Tim Lewis – CTO, Insyde

“Binarly’s binary code analysis is extremely effective in finding vulnerabilities in upstream libraries, where source access may not be possible. When Binarly found unknown vulnerabilities in our BIOS, they provided detailed information including where the vulnerability was and the impact associated with it. They then worked directly with our BIOS vendor to fix the vulnerabilities upstream.”
Kieran Levin – Lead System Architect, Framework Computer

“At AMI, we take firmware security seriously, which is why we’re excited to collaborate with Binarly on securing the supply chain. By working together, AMI is best positioned to ensure that our clients’ firmware is protected from potential threats, giving them peace of mind and the ability to focus on what they do best – creating innovative solutions that drive their business forward.”
Brian Mullen – Senior Manager of Software Security, AMI

CIO INFLUENCE: Anglicare Leverages Ribbon and Switch Connect for Voice Consolidation and Path for Microsoft Teams Deployment

[To share your insights with us, please write to sghosh@martechseries.com]

Related posts

Pure Storage Redefines AI-Ready Infrastructure, Speeds Time to Insights with AIRI//S Built on NVIDIA DGX Systems

CIO Influence News Desk

Roots Automation Unveils Revolutionary New Autonomous Workforce Platform

PR Newswire

SentinelOne to Expand Cloud Security Capabilities with Acquisition of PingSafe