
BinaryFOSSA
FOSSA Binary Composition Analysis: Automated tool for identifying vulnerabilities and license compliance issues in binary files.
Vendor
FOSSA
Company Website
Product details
Complete Binary Composition Analysis
Decompose and analyze binary files, including firmware. Manage associated SBOMs, vulnerabilities, and open source license compliance.
Features
- **Actionable Results and Real Risk Management: **FOSSA Binary Composition Analysis does more than just decompose binary files. Prioritize vulnerabilities with proprietary remediation efficiency metrics and frameworks like EPSS and CVSS. Enforce license compliance policies to avoid costly GPL violations. Produce SBOMs and VEX statements.
- **Superior Supplier and Supply Chain Risk Management: **FOSSA Binary Composition Analysis capabilities — coupled with our marketing-leading SBOM ingestion features — form a powerful combination for manufacturers looking to understand and mitigate risk in the software they acquire. This includes the ability to verify and enhance supplier SBOMs by comparing them to binary scanning results.
- **Complete Coverage: **You don't have to choose between a platform that only offers advanced software composition analysis (SCA) or binary composition analysis. FOSSA supports a broad range of binaries, programming languages, and ecosystems: it's open source license compliance, security, and SBOM management for all file types.
- **Supports Binary Consumption and Production: **Teams and organizations can use FOSSA Binary Composition Analysis to decompose, analyze, and manage risk for both consumption and production use cases. This includes validating binaries for internal or application development purposes — and ensuring production-ready software meets standards for regulatory compliance, security, and software licensing.
- **Flexible Deployment Options: **FOSSA is one of a small number of binary composition analysis tools that can be deployed on-premises. We also offer a private cloud option. (Additionally, we can work with organizations that require an air-gapped deployment.