Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Description

Traditional methods of cybersecurity fall short when it comes to safeguarding modern IT/OT/ICS software and devices. The generation of Software Bill of Materials (SBOM) is primarily focused on identifying only known vulnerabilities in existing software. Moreover, source code analysis alongside static application security testing (SAST) often yields excessive false-positive results, which can hinder timely remediation efforts. Additionally, network scans can be ineffective for devices that are not directly connected to the network. To achieve deeper security insights, consider BinLens™—an all-encompassing solution for advanced binary analysis. Formerly known as the ObjectSecurity OT.AI Platform, BinLens™ takes an integrated approach that merges various techniques to identify potential zero-day vulnerabilities with exceptional accuracy. Its capabilities are enhanced by automated symbolic execution, which is particularly adept at revealing memory-safety violations and other undefined behaviors present in binary programs, leading to a significantly reduced false-positive rate compared to other tools available in the market. Furthermore, BinLens™ simplifies and automates critical manual reverse engineering processes such as static analysis, disassembly, and decompilation, making it an invaluable asset in the realm of cybersecurity.

Description

The YAG Suite is a French-made innovative tool that takes SAST to the next level. YAGAAN is a combination of static analysis and machine-learning. It offers customers more than a sourcecode scanner. It also offers a smart suite to support application security audits and security and privacy through DevSecOps design processes. The YAG-Suite supports developers in understanding the vulnerability causes and consequences. It goes beyond traditional vulnerability detection. Its contextual remediation helps them to quickly fix the problem and improve their secure coding skills. YAG-Suite's unique 'code mining' allows for security investigations of unknown applications. It maps all relevant security mechanisms and provides querying capabilities to search out 0-days and other non-automatically detectable risks. PHP, Java and Python are currently supported. Next languages in roadmap are JS, C and C++.

API Access

Has API

API Access

Has API

Screenshots View All

Screenshots View All

Integrations

Eclipse IDE
GitHub
GitLab
Jenkins
Python
Visual Studio Code

Integrations

Eclipse IDE
GitHub
GitLab
Jenkins
Python
Visual Studio Code

Pricing Details

No price information available.
Free Trial
Free Version

Pricing Details

From €500/token or €150/mo
Free Trial
Free Version

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Vendor Details

Company Name

ObjectSecurity

Founded

2000

Country

United States

Website

objectsecurity.com/otai/

Vendor Details

Company Name

YAGAAN

Founded

2017

Country

France

Website

yagaan.com

Product Features

Vulnerability Scanners

Asset Discovery
Black Box Scanning
Compliance Monitoring
Continuous Monitoring
Defect Tracking
Interactive Scanning
Logging and Reporting
Network Mapping
Perimeter Scanning
Risk Analysis
Threat Intelligence
Web Inspection

Product Features

Static Application Security Testing (SAST)

Application Security
Dashboard
Debugging
Deployment Management
IDE
Multi-Language Scanning
Real-Time Analytics
Source Code Scanning
Vulnerability Scanning

Static Code Analysis

Analytics / Reporting
Code Standardization / Validation
Multiple Programming Language Support
Provides Recommendations
Standard Security/Industry Libraries
Vulnerability Management

Vulnerability Scanners

Asset Discovery
Black Box Scanning
Compliance Monitoring
Continuous Monitoring
Defect Tracking
Interactive Scanning
Logging and Reporting
Network Mapping
Perimeter Scanning
Risk Analysis
Threat Intelligence
Web Inspection

Alternatives

Alternatives

PT Application Inspector Reviews

PT Application Inspector

Positive Technologies
Troy Reviews

Troy

BigBear.ai