Vendors certified by aDolus generate SBOMs of their legitimate software and firmware via our automated agent within the secure perimeter of their software development process. FACT is a powerful platform for correlating information from many sources about IT, ICS, IIoT, and IoT software supply chains. It provides unprecedented visibility — right down into the very bits of the software — to prevent the installation of unsafe software in critical systems. FACT offers versatility, security, and powerful, AI-driven analysis:. Companies that use these products can query FACT to validate new software, patches, and upgrades before installing them in critical equipment. We then provide a report to the vendor, allowing them to understand how their customers will experience their software and what security improvements might be advisable. Prior to installing the firmware/software, the staff use the aDolus web client (or a local tool such as a file analyzer or network traffic analyzer) to generate their own digital fingerprint of the unverified firmware/software. It then provides a confidence and security rating of the unverified firmware/software and all its subcomponents.
Nanaimo, Canada
Founded in 2017
11-50 Employees
Working industry
IT, Software and Services
Type of company
Manufacturer
Ownership structure
Privately Held
Locations
1 Headquarter
Number of products
16 Products
Specialised areas
Cyber Security, Industrial Automation, Internet of Things, Software
aDolus Technology Inc. offers a wide range of products and services
Product
Procurement Managers | aDolus
Go to product >
Product
Operational Insights | aDolus
Go to product >
Product
Risk Management | aDolus
Go to product >
Product
Software Validation Solutions for Supply Chain Security | aDolus
Go to product >
Product
Software Bill of Materials (SBOM) Creation | aDolus
Go to product >
Product
Certificate Validation | aDolus
Go to product >
Product
Security Partners & Providers | aDolus
Go to product >
Product
Vulnerability Management | aDolus
Go to product >
An estimation about the ESG values based on digital data and signals. Important: The ESG scores are only based on information about the country, not the actual company itself
Country:
Canada
Overall risk estimation:
Very low
The ESG Data of countries are based on public sources
Environment
A
Grade (A-E)
View details
Social
A
Grade (A-E)
View details
Governance
A
Grade (A-E)
View details
aDolus Technology Inc. operates in 1 country around the world
Get an overview of the locations of aDolus Technology Inc.
Location
Country
State
City
Headquarter
Canada
British Columbia
Nanaimo
Some frequent questions that have been asked about aDolus Technology Inc.
Where is aDolus Technology Inc. located?
The company headquarter of aDolus Technology Inc. is located in Nanaimo, British Columbia, Canada. It's worth noting, that the company may have more locations
How many employees does aDolus Technology Inc. approximately have?
As of the latest available information aDolus Technology Inc. has around 11-50 employees worldwide.
When was aDolus Technology Inc. founded?
aDolus Technology Inc. was founded in 2017
In which industries does aDolus Technology Inc. mainly work?
The company aDolus Technology Inc. has it's main focus in the industries of IT, Software and Services
Check out some interesting alternative companies to aDolus Technology Inc.
Finite State
Columbus, United States
11-50 Employees
2017
Gain visibility into critical findings with intelligence on product components and security issues from vendors and third party components with world-class binary software composition analysis combined with our ability to import security findings from over 150 tools for added context and correlation. Shift right and scale your efforts to ensure that your products and systems are secure by design. The Finite State Next Gen Platform works quickly to provide you with full context risk analysis. Simply upload firmware images and get comprehensive product security results—along with actionable remediation guidance—often in less than one business day. Our robust scoring methodology effectively conveys risk levels with connected products, broader product portfolios and software assets with an intuitive, numerical scale, backed by sophisticated risk prioritization. In an era where supply chain threats are evolving rapidly, the maturity of your product security program is essential to protect your business. Take a quick, easy-to-understand quiz and we'll help you evaluate your current state of product security readiness. With our Product Security Maturity Assessment, you'll be able to:.
ComputableFacts
Paris, France
1-10 Employees
2018
ComputableFacts is rooted in building secure data-driven intelligent applications for complex, high-value commercial use cases. Focus on your customers' needs, we take care of everything else! Towerify makes it easy to distribute your own applications and leverage what others have built. In partnership with the French Cyber Security company HDW Sec, we built AdversaryMeter to help us manage our attack surface and uncover cyber threats before they arise. You will be the first to know about ComputableFacts' news.
Firmalyzer
Brussels, Belgium
1-10 Employees
2018
Firmalyzer is a leading provider of IoT vulnerability management and firmware analysis solutions to IoT vendors and enterprises. Firmalyzer enables IoT device manufacturers and their customers to discover and prioritize such risks in an automate, accurate and proactive way by performing global-scale security analysis of OT and IoT device firmware files. Firmalyzer’s founding team members expertise in security assessment and vulnerability research of OT/IoT devices and communication protocols lays the foundation of our solutions and services. We provide tailored IoT security solutions to solve challenges faced by IoT device manufacturers and their consumers in managing OT/IoT devices risk. Accurate identification of device manufacturer, model name, device type, firmware version and firmware release date. Check the security posture of the devices manufactured or consumed by your organization. Automate device security assessment on-scale and focus on mitigating risks. Augment your cyber security solutions with connected device risk analysis via Firmalyzer risk API.
Firmalyzer
Brussels, Belgium
1-10 Employees
2018
Firmalyzer is a leading provider of IoT vulnerability management and firmware analysis solutions to IoT vendors and enterprises. Firmalyzer enables IoT device manufacturers and their customers to discover and prioritize such risks in an automate, accurate and proactive way by performing global-scale security analysis of OT and IoT device firmware files. Firmalyzer’s founding team members expertise in security assessment and vulnerability research of OT/IoT devices and communication protocols lays the foundation of our solutions and services. We provide tailored IoT security solutions to solve challenges faced by IoT device manufacturers and their consumers in managing OT/IoT devices risk. Accurate identification of device manufacturer, model name, device type, firmware version and firmware release date. Check the security posture of the devices manufactured or consumed by your organization. Automate device security assessment on-scale and focus on mitigating risks. Augment your cyber security solutions with connected device risk analysis via Firmalyzer risk API.
DeepFactor
San Jose, United States
11-50 Employees
2019
Sign up for Deepfactor SaaS early access— purchase Deepfactor by 8/31/23 and get 50% off first year subscription price! Deepfactor is a new approach to AppSec that combines SBOM, SCA, and Runtime Security into a powerful integrated platform. Automatically generate SBOMs to comply with executive order 14028 and other supply chain security regulations. Prioritize software composition analysis (SCA) findings based on correlation with runtime usage behavior to reduce alert fatigue. Find insecure runtime behaviors such as file, network, and memory behavior in dev, test, and production.
Software Transparency Foundation
Madrid, Spain
11-50 Employees
2021
Our goal is to provide a complete set of Open Source Software Composition Analysis (SCA) tools, which otherwise are out of reach for small and mid-sized organizations. Our goal is to allow public validation of SBOMs by comparing their cryptographic checksums published in the blockchain, along with their date stamps and relationships to preceding SBOMs in the supply chain. Our goal is not only to develop and maintain the decentralized SBOM ledger, but also to provide easy access to our sponsors by eliminating the need of cryptocurrencies to cover transaction fees. We are committed to providing our sponsors with free access to the SBOM ledger in the blockchain. A complete, formally structured list of components, libraries, and modules that are required to build a given piece of software and the supply chain relationships between them. There are machine-readable, standard formats for SBOMs, like SPDX and CycloneDX. Perhaps the biggest single challenge to supply-chain transparency and the SBOM model is the abundance of open ‘standards’ intended to reduce redundant work in the supply-chain by providing common processes and formats for organizations and communities to share important data, thereby streamlining and improving compliance, security, and dependability. This will ease Software Supply Chain traceability, drastically improving cybersecurity and license compliance.