Plateform

Analyze and Improve Your Software Cybersecurity, Without Access to Source Code

Measure your cybersecurity posture and close gaps with security best practices

Discover a revolutionary technology that assesses the robustness of your software cybersecurity, even without access to the source code. Benefit from advanced analysis to align your protection with the state of the art in security, and implement proven strategies to strengthen your digital defenses.

Reports

Executive and engineering reports for visibility and action items for remediation.

Based on its 8 cybersecurity metrics and criteria, the MOABI platform offers two levels of reporting:

  • Summary reports: to assess the cybersecurity posture of a software product and compare it with an earlier version or a competitor.

  • Detailed reports: identifying weaknesses, bugs, and vulnerabilities, with an analysis of deviations from best practices and security standards, enabling corrective action to be taken with internal and external suppliers.

Composition - SBOM nomenclature

Detailed software component analysis and inventory (SCA)

MOABI provides a complete list of all software components:

  • Open source software
  • Third-party components
  • Proprietary binaries

Each component is accompanied by its CPE (Common Platform Enumeration), a standardized identifier including software name, supplier, and version number.

 

Product security policy

Define KPIs for product security

Create KPIs based on MOABI 8 metrics and configuration policies to identify software and components below target.

With MOABI, CISOs, and risk and compliance managers can easily define cybersecurity targets and thresholds to improve security and reduce product risks.

Cover
eight metrics
to preserve the security
of your supply chain

An overall product security score calculated from 8 cybersecurity metrics.

This overall score is the aggregate of the different unit scores for each metric.

Cryptography

Detection of cryptographic ciphers used in applications. It identifies and evaluates the strengths and weaknesses of encryption algorithms and the use of faulty cryptography.

Configuration

Detection of unencrypted authentication information (SSH keys, back-end server tokens).

Legacy

Legacy relating to the tool chain (compiler, linkeur) and architecture: compatibility with modern OS and hardware platforms to ensure longevity. Also detected are obsolete tool chains, builds for legacy architectures, obsolete file formats and unmaintained frameworks.

Hardening

Implementation of defense-in-depth mechanisms to deter generic attack vectors. It assesses the resilience and strengths of mitigation features generated and used by the toolchain (compiler) against vulnerabilities, e.g. ASLR and stack cookies.

Malware

Detection of well-known malware or the likelihood of malware being hidden in the analyzed software. This detection acts as a first step in preventing supply chain attacks.

Compliance

Compliance with industry standards and best practices. It identifies API/function calls to shared libraries and assesses their compliance with security standards and best practices such as MSDN / Microsoft CERT / ISO secure codebooks and language-specific standards.

Vulnerabilities

Detection of known vulnerabilities with their CVE identifier and severity. CVEs, CVSS scores and details are updated daily and retrieved from the public NVD and MITRE databases.

0-Days

Detection of unknown vulnerability classes using MOABI's proprietary symbolic execution engine. Implementation errors (violation of coding standards) leading to undefined states, exploitable conditions and software compromise.
Our Offers

SaaS - Private cloud - Appliance

SaaS

Fast Start
  • Annual license
  • Unlimited scanning
  • Unlimited users
  • Limited upload size
  • Maintenance and support
  • Updates (auto)

SaaS POD

Dedicated Resource on Cloud
  • Annual license
  • Unlimited scanning
  • Unlimited users
  • Limited upload size
  • Maintenance and support
  • Updates (auto)

Private Cloud

Customer Cloud
  • Annual license
  • Unlimited scanning
  • Unlimited users
  • Limited upload size
  • Maintenance and support
  • Updates (auto)

On premise

Full Ownership
  • Annual license
  • Unlimited scanning
  • Unlimited users
  • Unlimited upload size
  • Maintenance and support
  • Updates (auto)

Air Gapped
Military/Defense

  • Annual license
  • Unlimited scanning
  • Unlimited users
  • Unlimited upload size
  • Maintenance and support
  • Updates (manual)