'Insights' evaluates the device’s SBOM to identify vulnerabilities in third-party and open-source components. This includes analysing outdated libraries, dependencies, and potential software supply chain risks. By identifying these risks, manufacturers can proactively address weaknesses that attackers may exploit.
Using the same lightweight agent technology as in Periphery's Detect module, 'Insights' evaluates real-time device telemetry, identifying misconfigurations, weak credentials, and exploitable attack surfaces.
Incorporates simulated attacks, leveraging data from Periphery's honeypots and threat intelligence, to test device resilience against real-world adversarial techniques.
Paves the way for integrating real-time monitoring (via Detect) post-deployment, creating a seamless transition from assessment to ongoing security.
The product is being built to provide tailored reports that demonstrate compliance with frameworks such as the EU Cyber Resilience Act, and other sector-specific regulations and frameworks. 'Insights' offers customers a competitive edge by evidencing robust security practices.