Palamida Launches Code Vulnerability Reporting Tool

The VRS package enhances CTOs' control over their companies' software by pinpointing known security risks in open-source code, Palamida says.

SAN FRANCISCO - Software intellectual-property management services provider Palamida on April 27 introduced a new service that works to identify vulnerabilities in an enterprise's open-source code.

The announcement was made at the annual Gartner Symposium/ITxpo: Emerging Trends at the Moscone Center here.

Palamida's Vulnerability Reporting Solution works as a plug-in to the company's code audit compliance solution, IP Amplifier, to "identify, prioritize and spotlight the location of known vulnerabilities" in open-source code, a Palamida spokesperson said.

Palamida's library contains more than 3 terabytes' worth of content, including 140,000 OSS projects, 780,000 versions, 7 billion source code snippets, 10 million Java namespaces, 500 million binary file IDs, and Java, C/C++, Perl, Python, PHP, C# and VB signatures, the spokesperson said.

The VRS uses data from the National Vulnerability Database, a comprehensive cyber-security database sponsored by the Department of Homeland Security and run by the National Institute of Standards and Technology and MITRE.

The National Vulnerability Database integrates all publicly available U.S. government vulnerability resources and provides references to industry resources for the purpose of assisting with remediation efforts. It currently contains over 23,700 known vulnerabilities, 89 US-CERT issued alerts and 1,900 US-CERT vulnerability notes, and has a publication rate of approximately 18 new vulnerabilities per day.

Readily available code resources, the increase of geographically distributed development teams and ever-increasing time-to-market pressures have resulted in the blending of homegrown, third-party and open-source components, the spokesperson said.

The sheer size of a code base coupled with the number of contributing developers makes it difficult for companies to get an accurate assessment of their software assets.

"Successful IT Governance requires risk mitigation at the code level. Customers should be utilizing vulnerability analysis solutions to identify and remediate application risks," Palamida CEO Mark Tolliver said. "The VRS works together with vulnerability analysis solutions to bridge the gap between proprietary code analysis and complete code analysis."

Most companies operate without any knowledge of exactly what their software is made of and whether or not it contains security risks. The root cause of many application security vulnerabilities resides in the code base - an area that traditional security software cannot protect, Tolliver said.

Existing vulnerability analysis solutions scan customers' proprietary code to identify potential vulnerability holes such as buffer overrides and network and intrusion detection gaps. They also highlight violations in secure coding practices.

The VRS, on the other hand, augments the IT governance process by scanning the customer's code base and pinpointing the existence of open-source content, highlighting any known vulnerabilities and delivering a prioritized report to assist with remediation efforts, the spokesperson said.

Michael Cote, an analyst with RedMonk, told eWEEK that the important thing in this release is that it builds on the code auditing that's already in the Palamida platform.

"It's true that there are a handful of vendors that work in the same space, but Palamida is approaching the sector in their own way technologically: building up the database of open-source projects, and then layering on more software auditing and 'health checks,' " Cote said.

"What I like about the code auditing and code-health approach that companies in this problem space do is that it lets developers work at the fast pace they'd like to without being slowed down by manual auditing processes," Cote said. "Adding in things like venerability checking adds more value to these platforms in that the platform is further automating previously manual processes."

San Francisco-based Palamida and Black Duck Software, headquartered in Waltham, Mass., are the primary companies working in this space today, although other entrants are likely to emerge, Forrester Senior Analyst Michael Goulde told eWEEK.

"Their products and services address two of the leading concerns many companies have about software in general, not just open-source software: security and intellectual property rights," Goulde said.

The two companies have taken somewhat different directions in terms of the markets they address and their go-to-market approaches, Goulde said.

"What they're doing is more than code searching," Goulde said. "They need to identify and flag specific issues by using a wealth of data they've collected from a variety of sources. It isn't good enough to know that a particular piece of code is being used, because in one context that can be perfectly OK and in another, there can be serious licensing or IP issues. So putting all the pieces together to present a complete picture is what both companies are trying to do for their customers."

Copyright 2007 by Ziff Davis Media, Distributed by United Press International

Citation: Palamida Launches Code Vulnerability Reporting Tool (2007, April 28) retrieved 26 April 2024 from https://phys.org/news/2007-04-palamida-code-vulnerability-tool.html
This document is subject to copyright. Apart from any fair dealing for the purpose of private study or research, no part may be reproduced without the written permission. The content is provided for information purposes only.

Explore further

New report outlines opportunities to remove CO2 at the gigaton scale

0 shares

Feedback to editors