Customer Story

Global Energy Leader: Securing Third-Party Software at Scale with ReversingLabs

A global energy leader managing thousands of third-party software packages faced a critical blind spot: they were forced to trust vendor assurances for software they couldn’t inspect. Legacy tools couldn’t handle multi-gigabyte COTS packages, diverse file formats, or the 90+ TB “digital junk drawer” of previously approved software stored across network file shares. At the same time, non-technical onboarding teams needed clear go/no-go decisions, not complex findings requiring expert interpretation.

The ReversingLabs Solution

The organization deployed the full ReversingLabs Spectra portfolio in a unified workflow to deliver end-to-end software assurance:

  • Spectra Assure® enables secure software onboarding, delivering policy-driven pass/fail verdicts that create a reliable procurement stage-gate. Mandatory version diffing detects newly introduced files, tampering, and unresolved risks across software releases.
  • Spectra Detect scans legacy software repositories directly from network file shares at scale, identifying malicious and suspicious artifacts across terabytes of previously uninspected software.
  • Spectra Analyze enables deep inspection when risks are flagged, allowing analysts to quickly validate threats and escalate to ReversingLabs experts for definitive verdicts when needed.

This workflow combining advanced detection technologies with human confirmation delivers a managed outcome across the full software estate. Continuous monitoring of legacy repositories surfaces high-risk artifacts for investigation, while human-vetted verdicts provide confidence that security policy is consistency applied across both newly acquired and long-standing assets.

Key Outcomes

  • Binary-level inspection without source code
  • Policy-driven approvals embedded in procurement
  • Scalable coverage over 90+ TB of software repositories
  • Expert validation augmenting non-technical teams
  • Continuous assurance through version diffing

Why It Matters - Assumed Trust to Verified Assurance

Our customer’s strategy reflects a broader shift across large enterprises: moving away from assumed trust in commercial software toward evidence-based assurance.

Achieving that shift requires a platform built to address the full scope of the problem. By inspecting thousands of software packages across terabytes of historical files stored in distributed network directories spanning diverse file types, ReversingLabs helps organizations manage supply chain risk, protect critical environments, and gain confidence that software is safe to use. Ultimately, as emphasized in JPMorgan Chase’s recent discussion on software trust debt, supply chain risk is a shared responsibility. Enterprises are no longer passive consumers of software. They must actively collaborate with vendors to validate, remediate, and continuously improve security outcomes.

For the full story, download the PDF here.

Schedule a DemoContact Sales

  • Global Energy Leader
  • North America
  • 50,000+
  • Energy
FacebookFacebookXX / TwitterLinkedInLinkedIn

Expert Insights

blueskyBluesky
Email Us
Download Story

Challenges

  • Limited visibility into COTS software
  • Existing tools fail on large binaries
  • Inconsistent security checks
  • Reliance on vendor trust


Solution

  • Binary analysis delivers pass/fail verdicts, enabling fast, policy-driven approval of third-party software at enterprise scale


Results

  • Verified COTS software without source code
  • Faster, policy-driven approval decisions
  • Verified trust in legacy software at enterprise scale
  • Reduced false positives with expert validation

All RL Solutions

  • Spectra Assure
  • Spectra Analyze
  • Spectra Detect

Want to Learn More

Schedule a DemoContact Sales

Container
ReversingLabs: The More Powerful, Cost-Effective Alternative to VirusTotalSee Why

Spectra Assure Free Trial

Get your 14-day free trial of Spectra Assure for Software Supply Chain Security

Get Free TrialMore about Spectra Assure Free Trial
Blog
Events
About Us
Webinars
In the News
Careers
Demo Videos
Cybersecurity Glossary
Contact Us
reversinglabsReversingLabs: Home
Privacy PolicyCookiesImpressum
All rights reserved ReversingLabs © 2026
XX / Twitter
LinkedInLinkedIn
FacebookFacebook
InstagramInstagram
YouTubeYouTube
blueskyBluesky
RSSRSS
Back to Top
Skip to main content
Contact UsSupportLoginBlogCommunity
reversinglabsReversingLabs: Home
Solutions
Secure Software OnboardingSecure Build & ReleaseProtect Virtual MachinesIntegrate Safe Open SourceGo Beyond the SBOM
Increase Email Threat ResilienceDetect Malware in File Shares & StorageAdvanced Malware Analysis SuiteICAP Enabled Solutions
Scalable File AnalysisHigh-Fidelity Threat IntelligenceCurated Ransomware FeedAutomate Malware Analysis Workflows
Products & Technology
Spectra Assure®Software Supply Chain SecuritySpectra DetectHigh-Speed, High-Volume, Large File AnalysisSpectra AnalyzeIn-Depth Malware Analysis & Hunting for the SOCSpectra IntelligenceAuthoritative Reputation Data & Intelligence
Spectra CoreIntegrations
Industry
Energy & UtilitiesFinanceHealthcareHigh TechPublic Sector
Partners
Become a PartnerValue-Added PartnersTechnology PartnersMarketplacesOEM Partners
Alliances
Resources
BlogContent LibraryCybersecurity GlossaryConversingLabs PodcastEvents & WebinarsLearning with ReversingLabsWeekly Insights Newsletter
Customer StoriesDemo VideosDocumentationOpenSource YARA Rules
Company
About UsLeadershipCareersSeries B Investment
EventsRL at RSAC
Press ReleasesIn the News
Pricing
Software Supply Chain SecurityMalware Analysis and Threat Hunting
Menu
Request a demo
Gartner CISO LP Featured Image

The CISO’s Playbook for Commercial Software Supply Chain Security

Binary analysis is a must-have control for securing third-party software, before installation.

Learn More about The CISO’s Playbook for Commercial Software Supply Chain Security
The CISO’s Playbook for Commercial Software Supply Chain Security
Software trust debt

How JPMC tackles software ‘trust debt’

JPMorgan Chase CISO Patrick Opet discussed his letter on third-party software risk — and how that has played out.

Learn More about How JPMC tackles software ‘trust debt’
How JPMC tackles software ‘trust debt’
SSCS-Report-2026

Software Supply Chain Report 2026: Security Risks, AI, & What’s Next

How sophisticated malware, AI, and broken trust are reshaping software security.

Learn More about Software Supply Chain Report 2026: Security Risks, AI, & What’s Next
Software Supply Chain Report 2026: Security Risks, AI, & What’s Next