SBOM Central

NIS2, Cyber Resilience Act (CRA), and the President’s Executive Order on Improving the Nation’s Cybersecurity.

The significance of cybersecurity lies in the fact that cyberattacks have the capacity to cause extensive and pervasive damage. To address this issue, the EU and US governments are creating new laws and regulations that will affect many organizations and businesses. These regulations mandate essential entities to take necessary steps to manage cybersecurity risks and prevent or reduce the impact of incidents on their services and customers.

These new regulations include guidelines for ensuring supply chain security, as well as ensuring security in the acquisition, development, and maintenance of network and information systems. This encompasses the proper handling and disclosure of vulnerabilities to ensure the safety and security of these systems throughout their entire lifecycle.

SBOM Central is a service that provides vulnerability detection, monitoring, and management for SBOMs. It is designed to enhance the security of your software supply chain.


MAIA adds Efficiency and Security to your Software Supply Chain

An automated Continuous Integration/Continuous Delivery (CI/CD) pipeline creates loads of data. Add MAIA Software to your pipeline to create a common understanding by managing tools-, people-, and process data together.

MAIA Software:

  • Creates a unified and instant understanding of the activities and status of your development pipelines.
  • Keeps the full and aggregated history of code changes, builds, deliveries, tests, tasks, bugs, and other activities.
  • Detects vulnerabilities and exploits in former and planned software releases.
  • Has powerful tools to compare deliveries, builds, and tests.
  • Has intuitive and automated tools managing open-source licensing, vulnerabilities, and the health of dependencies.
  • Visualizes activities in real-time, storing data for future use and analytics.

Cross-tool traceability

In modern software development, there are constant changes to multiple parts of a product at the same time. With cross-tool traceability you can keep track of them all. Link builds to code changes, feature tickets, bug reports, SBOMS, associated tests.

Security and Compliance

Automate the creation of software bill of materials (SBOM), and then run checks on the list of components and open source dependencies to identify vulnerabilities and exploits, monitor versions, open-source project health, and licensing.

Quality and Speed

Enhance software quality by visualizing your automated testing in real-time and make your data accessible for all. Promote commitment and a sense of responsibility. Maximize value by storing and organizing new and past test data, and use it for analysis and reporting.

Secplatform/VirtuOSe is centralizing cybersecurity features into a hidden software middle layer

A minimal footprint middle layer platform lessens the risk of security issues. By separating security features from the user environment it can be centrally managed for many environments by a few experts keeping the cybersecurity updated and on a high level.

Secplatform/VirtuOSe can provide:

  • Secure and redundant boot.
  • Encrypted storage.
  • Network filtration and encryption.
  • Mass configuration, fault and performance management.
  • Virtualization with emulation of architectures and CPUs.
  • Ability to passthrough common enumerated buses like USB and PCI.

For embedded and IoT

Protect infrastructure by securing IoT devices and systems that control the power grid, water supply, communications networks, traffic management, and more.

For client computers

Protect client computers where users constantly add features and capabilities, interacting with servers worldwide. Have a common security plan for client systems regardless of operating system.