Technology
Why get an Insights assessment? 
Accelerated Market Entry
By uncovering and addressing vulnerabilities early in the product lifecycle, manufacturers can avoid delays related to regulatory compliance or customer security concerns.
Proof of Assurance
Offers tangible evidence of due diligence and security validation, enabling manufacturers to build trust with their customers and partners.
Enhanced Collaboration
Provides a shared language between technical teams and business stakeholders, simplifying the process of prioritising and addressing risks.
Foundation for Continuous Monitoring
Paves the way for integrating real-time monitoring (via Detect) post-deployment, creating a seamless transition from assessment to ongoing security.
Increased Product Value
By incorporating SBOM analysis, Secure Assess directly contributes to the perceived and real value of the manufacturer’s product. Customers purchasing these devices gain confidence in their security, which allows manufacturers to justify premium pricing and attract security-conscious clients.
SBOM Assurance 
As regulators and customers increasingly demand transparency into the software components of connected devices, SBOM risk analysis is becoming critical. 

'Insights' looks to not only identify risks within the SBOM but also provide actionable recommendations, helping manufacturers address supply chain vulnerabilities before they become liabilities.
Regulatory Compliance
Manufacturers operating in critical infrastructure or defence face mounting pressure to meet cybersecurity regulations.

'Insights' simplifies this process by providing detailed evidence of device security and risk mitigation.
Customer Confidence
Customers demand security assurances when adopting connected devices.

By demonstrating robust assessments, manufacturers can instill trust, strengthen relationships, and position their products as reliable and secure choices.
What it does
SBOM Risk Analysis
'Insights' evaluates the device’s SBOM to identify vulnerabilities in third-party and open-source components. This includes analysing outdated libraries, dependencies, and potential software supply chain risks. By identifying these risks, manufacturers can proactively address weaknesses that attackers may exploit.
Agent-Based Vulnerability Assessment
Using the same lightweight agent technology as in Periphery's Detect module, 'Insights' evaluates real-time device telemetry, identifying misconfigurations, weak credentials, and exploitable attack surfaces.
Penetration Testing
Incorporates simulated attacks, leveraging data from Periphery's honeypots and threat intelligence, to test device resilience against real-world adversarial techniques.
Foundation for Continuous Monitoring
Paves the way for integrating real-time monitoring (via Detect) post-deployment, creating a seamless transition from assessment to ongoing security.
Regulatory and Competitive Reporting
The product is being built to provide tailored reports that demonstrate compliance with frameworks such as the EU Cyber Resilience Act, and other sector-specific regulations and frameworks. 'Insights' offers customers a competitive edge by evidencing robust security practices.