ReversingLabs Software Supply Chain Security
Software supply chain security analysis for end-to-end software development workflows, containers and release packages
TitaniumScale helps enterprises assess millions of files from web traffic, email, file transfers, endpoints or storage. The solution uses unique ReversingLabs File Decomposition Technology to extract detailed metadata, add global reputation context and classify threats. It automatically acquires files by integrating with email gateways, intrusion detection systems, firewalls and other devices. Results feed into SIEM, SOAR, and analytics platforms to provide visibility and enriched data for remediation and advanced hunting.
TitaniumScale helps enterprises form a comprehensive assessment of millions of files from web traffic, email, file transfers, endpoints or storage. The solution uses unique ReversingLabs File Decomposition Technology to extract detailed metadata, add global reputation context and classify threats. TitaniumScale automatically acquires files by integrating with solutions installed in the enterprise security infrastructure, including: email gateways, intrusion detection systems, firewalls and other devices. The results feed into industry leading SIEM, orchestration and analytics platforms to provide visibility, provide data to analytics tools, support advance hunting strategies and enable advanced policy enforcement.
TitaniumScale uses a flexible cluster architecture that scales incrementally to support distributed or centralized file processing across physical and cloud environments. The cluster incrementally scales file processing capacity from 100K to 100M files per day by adding Worker Nodes to the cluster. TitaniumScale consists of:
Recursive unpacking and extraction of 3000 indicators per file
Files checked against the industry’s most comprehensive database of goodware and malware - TitaniumCloud
Files classified by advanced rules engine that supports customer supplied YARA rules
Real-time alerts to SIEM, SOAR or analytics platforms when malware is identified or a customer-defined YARA rule is triggered.