見逃せないアップデート:Office 2016 および Office 2019 のサポート終了

今すぐ読む
サイト翻訳には人工知能を利用しており、正確性を追求しておりますが、必ずしも100%正確とは限りません。ご了承ください。

OPSWAT SBOM

Stay secure and compliant in the software supply chain. With OPSWAT SBOM (Software Bill of Materials), developers can identify known vulnerabilities, validate licenses, and generate component inventory for OSS (open-source software), third-party dependencies, and containers.

  • Supply Chain 透明性
  • SBOM in CycloneDX & SPDX
  • Vulnerability Insights

OPSWAT 信頼

0
世界中のお客様
0
テクノロジー・パートナー
0
Endpoint 認証メンバー

Automated
SBOM Creation 

CycloneDX & SPDX Formats 

7M+

Third-Party Open-Source
Software Components

CI/CD Pipeline
Integration

License Information 

Vulnerability Awareness

Hidden Dependencies Put Your Software at Risk  

Lack of Software Component Visibility

Development teams rely on open-source repositories and third-party components. Without a centralized SBOM, organizations cannot see what software is embedded in applications or containers.

コンプライアンスと規制要件

Regulations like EU CRA, NIS2 Directive, EO 14028 and NIST frameworks require organizations to disclose software composition and risk. Manual SBOM creation is slow, inconsistent, and difficult to maintain across fast-moving development pipelines.

Unknown and Unpatched Vulnerabilities 

When new CVEs emerge, teams without automated SBOMs can’t quickly identify affected dependencies. This delays incident response, extends exposure windows, and increases breach risk across the software supply chain.

  • Component Blind Spots

    Lack of Software Component Visibility

    Development teams rely on open-source repositories and third-party components. Without a centralized SBOM, organizations cannot see what software is embedded in applications or containers.

  • 規制圧力

    コンプライアンスと規制要件

    Regulations like EU CRA, NIS2 Directive, EO 14028 and NIST frameworks require organizations to disclose software composition and risk. Manual SBOM creation is slow, inconsistent, and difficult to maintain across fast-moving development pipelines.

  • Hidden Vulnerabilities

    Unknown and Unpatched Vulnerabilities 

    When new CVEs emerge, teams without automated SBOMs can’t quickly identify affected dependencies. This delays incident response, extends exposure windows, and increases breach risk across the software supply chain.

分析、検出、生成

「原産国」エンジンは、ファイルのフィンガープリントとメタデータを分析して地理的な発信元を特定し、ポリシーに基づいたアクションを実行します。

ステップ1

Analyze Source Code and Containers 

ステップ1

Analyze Source Code and Containers 

Scan artifacts binaries, and container image layers to identify embedded software components throughout the development lifecycle, before unknown risks reach production.

ステップ2

Detect Components & Vulnerabilities

ステップ2

Detect Components & Vulnerabilities

Automatically identify open-source and third-party components and map them to known vulnerabilities, giving security teams clear insight into exposure and remediation priorities.

ステップ3

Export SBOM to Standardized Formats 

ステップ3

Export SBOM to Standardized Formats 

Generate machine-readable SBOMs in SPDX or CycloneDX formats to support regulatory compliance, streamline vendor audits, and integrate with security and GRC workflows.

  • ステップ1

    Analyze Source Code and Containers 

    Scan artifacts binaries, and container image layers to identify embedded software components throughout the development lifecycle, before unknown risks reach production.

  • ステップ2

    Detect Components & Vulnerabilities

    Automatically identify open-source and third-party components and map them to known vulnerabilities, giving security teams clear insight into exposure and remediation priorities.

  • ステップ3

    Export SBOM to Standardized Formats 

    Generate machine-readable SBOMs in SPDX or CycloneDX formats to support regulatory compliance, streamline vendor audits, and integrate with security and GRC workflows.

You Develop Solutions. We Manage Risks.

Identify & Track Open-
Source Software

Automatically identify open-source components and monitor critical software updates and vulnerability patches from 5 million libraries.

Standardized SBOM
Structure for Tool
Interoperability 

Support SBOM standardization with SPDX and CycloneDX formats for easier generation, sharing, and consumption.

Detect Vulnerabilities in
Software & Containers

Identify and reduce risk exposure across source code and containers by cross-referencing software components against trusted vulnerability databases like GHSA, CVE, and EUVD.

Stop Threats Infiltrating
Your Software Supply
Chain

Combine with Metascan™ Multiscanning and Proactive DLP™ to proactively detect over 99% of known malware and prevent secret exploits.

Flexible, Automated
Scanning

Constantly assess regulatory and internal security guidelines through real-time reports tailored for security engineers and GRC (Governance, Risk, and Compliance) teams.

Avoid Non-
Compliant Licenses

Validate and use approved licenses for OSS and third-party dependencies. Identify high-risk licenses like GPL, AGPL, MIT, and more.

Software保護する統合ソリューション

Scan your code and containers, identifying dependencies and vulnerabilities in open-source dependencies all at once from
a unified developer security platform.

Sofware Bill of Materials  

Provides visibility into all software components and vulnerabilities identified during the scan.

Licenses & Versions

Shows the license type associated with each package alongside its detected version and available upgrade versions.

Packages with Vulnerabilities 

Highlights packages containing known vulnerabilities, with a detailed CVE breakdown by severity to help teams prioritize remediation.

Export SBOM Reports 

Allows export of scan results in multiple report and SBOM formats, including CycloneDX and SPDX.

SBOM Validation & CVE Enrichment

Import an existing SBOM report to verify its accuracy and automatically surface missing CVEs against up-to-date threat intelligence.

File Upload Scanning 

Upload any individual file for instant SBOM generation and vulnerability analysis — no repository integration required.

  • Sofware Bill of Materials  

    Provides visibility into all software components and vulnerabilities identified during the scan.

  • Licenses & Versions

    Shows the license type associated with each package alongside its detected version and available upgrade versions.

  • Packages with Vulnerabilities 

    Highlights packages containing known vulnerabilities, with a detailed CVE breakdown by severity to help teams prioritize remediation.

  • Export SBOM Reports 

    Allows export of scan results in multiple report and SBOM formats, including CycloneDX and SPDX.

  • SBOM Validation & CVE Enrichment

    Import an existing SBOM report to verify its accuracy and automatically surface missing CVEs against up-to-date threat intelligence.

  • File Upload Scanning 

    Upload any individual file for instant SBOM generation and vulnerability analysis — no repository integration required.

Integrations & Supported Languages

活用例

コード用のSBOM

開発者がオープンソースの依存関係のセキュリティ脆弱性とライセンス上の懸念を特定し、優先順位を付け、対処できるようにします。

コンテナ用のSBOM

コンテナイメージを分析し、パッケージ名、バージョン情報、潜在的な脆弱性の SBOM を生成します。

サプライチェーンセキュリティ向けのSBOM

単一のプラットフォームからソフトウェア サプライ チェーンを保護して、セキュリティを強化し、リスクを軽減し、安全なソフトウェアを提供します。

Secure Every Dependency.
Reduce Risk. Ship Safely.

フォームに必要事項をご記入ください。
世界中の2,000社以上の企業から信頼されています。