Mitigate security risks of third-party suppliers' products
Many integrators are facing a growing need for securing their products. Their third-party suppliers’ products must be monitored for vulnerabilities as well. This might reveal as a challenging task since in most cases the product is provided in the “black box” production mode, making the security audit task much harder.
One way to deal with this issue is to request unencrypted firmware from the product manufacturer, in order to scan it for security flaws. Hardenite audit is capable of scanning firmware as well as virtual machine disks for known vulnerabilities and security flaws. We support various zip formats (e.g. tar.gz) as well as vmdk/ova files.
