Mehr erfahren
keysight:dtx/solutions/facets/industry/aerospace-and-defense,keysight:dtx/solutions/facets/industry/automotive,keysight:dtx/solutions/facets/development-area/security,keysight:dtx/solutions/facets/workflow-stage/qa,segmentation:campaign/Network_Security,segmentation:product-category/Network_Security_Operations,segmentation:business-unit/CSG,segmentation:funnel/bofu,keysight:dtx/solutions/facets/design-and-test-product/network-emulator,keysight:product-lines/ns,segmentation:product-category/Network_Security_Traffic_Emulators/Application_Layer_4_7_Simulatorskeysight:dtx/solutions/facets/industry/aerospace-and-defense,keysight:dtx/solutions/facets/industry/automotive,keysight:dtx/solutions/facets/development-area/security,keysight:dtx/solutions/facets/workflow-stage/qa,segmentation:campaign/Network_Security,segmentation:product-category/Network_Security_Operations,segmentation:business-unit/CSG,segmentation:funnel/bofu,keysight:dtx/solutions/facets/design-and-test-product/network-emulator,keysight:product-lines/ns,segmentation:product-category/Network_Security_Traffic_Emulators/Application_Layer_4_7_Simulatorskeysight:dtx/solutions/facets/industry/aerospace-and-defense,keysight:dtx/solutions/facets/industry/automotive,keysight:dtx/solutions/facets/development-area/security,keysight:dtx/solutions/facets/workflow-stage/qa,segmentation:campaign/Network_Security,segmentation:product-category/Network_Security_Operations,segmentation:business-unit/CSG,segmentation:funnel/bofu,keysight:dtx/solutions/facets/design-and-test-product/network-emulator,keysight:product-lines/ns,segmentation:product-category/Network_Security_Traffic_Emulators/Application_Layer_4_7_Simulatorskeysight:dtx/solutions/facets/industry/aerospace-and-defense,keysight:dtx/solutions/facets/industry/automotive,keysight:dtx/solutions/facets/development-area/security,keysight:dtx/solutions/facets/workflow-stage/qa,segmentation:campaign/Network_Security,segmentation:product-category/Network_Security_Operations,segmentation:business-unit/CSG,segmentation:funnel/bofu,keysight:dtx/solutions/facets/design-and-test-product/network-emulator,keysight:product-lines/ns,segmentation:product-category/Network_Security_Traffic_Emulators/Application_Layer_4_7_Simulatorskeysight:dtx/solutions/facets/industry/aerospace-and-defense,keysight:dtx/solutions/facets/industry/automotive,keysight:dtx/solutions/facets/development-area/security,keysight:dtx/solutions/facets/workflow-stage/qa,segmentation:campaign/Network_Security,segmentation:product-category/Network_Security_Operations,segmentation:business-unit/CSG,segmentation:funnel/bofu,keysight:dtx/solutions/facets/design-and-test-product/network-emulator,keysight:product-lines/ns,segmentation:product-category/Network_Security_Traffic_Emulators/Application_Layer_4_7_Simulatorskeysight:dtx/solutions/facets/industry/aerospace-and-defense,keysight:dtx/solutions/facets/industry/automotive,keysight:dtx/solutions/facets/development-area/security,keysight:dtx/solutions/facets/workflow-stage/qa,segmentation:campaign/Network_Security,segmentation:product-category/Network_Security_Operations,segmentation:business-unit/CSG,segmentation:funnel/bofu,keysight:dtx/solutions/facets/design-and-test-product/network-emulator,keysight:product-lines/ns,segmentation:product-category/Network_Security_Traffic_Emulators/Application_Layer_4_7_Simulatorskeysight:dtx/solutions/facets/industry/aerospace-and-defense,keysight:dtx/solutions/facets/industry/automotive,keysight:dtx/solutions/facets/development-area/security,keysight:dtx/solutions/facets/workflow-stage/qa,segmentation:campaign/Network_Security,segmentation:product-category/Network_Security_Operations,segmentation:business-unit/CSG,segmentation:funnel/bofu,keysight:dtx/solutions/facets/design-and-test-product/network-emulator,keysight:product-lines/ns,segmentation:product-category/Network_Security_Traffic_Emulators/Application_Layer_4_7_Simulatorskeysight:dtx/solutions/facets/industry/aerospace-and-defense,keysight:dtx/solutions/facets/industry/automotive,keysight:dtx/solutions/facets/development-area/security,keysight:dtx/solutions/facets/workflow-stage/qa,segmentation:campaign/Network_Security,segmentation:product-category/Network_Security_Operations,segmentation:business-unit/CSG,segmentation:funnel/bofu,keysight:dtx/solutions/facets/design-and-test-product/network-emulator,keysight:product-lines/ns,segmentation:product-category/Network_Security_Traffic_Emulators/Application_Layer_4_7_Simulatorskeysight:dtx/solutions/facets/industry/aerospace-and-defense,keysight:dtx/solutions/facets/industry/automotive,keysight:dtx/solutions/facets/development-area/security,keysight:dtx/solutions/facets/workflow-stage/qa,segmentation:campaign/Network_Security,segmentation:product-category/Network_Security_Operations,segmentation:business-unit/CSG,segmentation:funnel/bofu,keysight:dtx/solutions/facets/design-and-test-product/network-emulator,keysight:product-lines/ns,segmentation:product-category/Network_Security_Traffic_Emulators/Application_Layer_4_7_Simulatorskeysight:dtx/solutions/facets/industry/aerospace-and-defense,keysight:dtx/solutions/facets/industry/automotive,keysight:dtx/solutions/facets/development-area/security,keysight:dtx/solutions/facets/workflow-stage/qa,segmentation:campaign/Network_Security,segmentation:product-category/Network_Security_Operations,segmentation:business-unit/CSG,segmentation:funnel/bofu,keysight:dtx/solutions/facets/design-and-test-product/network-emulator,keysight:product-lines/ns,segmentation:product-category/Network_Security_Traffic_Emulators/Application_Layer_4_7_Simulatorskeysight:dtx/solutions/facets/industry/aerospace-and-defense,keysight:dtx/solutions/facets/industry/automotive,keysight:dtx/solutions/facets/development-area/security,keysight:dtx/solutions/facets/workflow-stage/qa,segmentation:campaign/Network_Security,segmentation:product-category/Network_Security_Operations,segmentation:business-unit/CSG,segmentation:funnel/bofu,keysight:dtx/solutions/facets/design-and-test-product/network-emulator,keysight:product-lines/ns,segmentation:product-category/Network_Security_Traffic_Emulators/Application_Layer_4_7_Simulators
Wie man genaue SBOMs generiert und validiert
Eine präzise und umfassende Software-Stückliste (SBOM) ist für Unternehmen, die moderne softwarebasierte Produkte entwickeln oder verwalten, unerlässlich. Da Software zunehmend auf komplexen Mischungen aus Open-Source-, Drittanbieter- und proprietären Komponenten basiert – viele davon in kompilierten Binärdateien verborgen –, erzeugen herkömmliche Tools oft unvollständige SBOMs, die nicht dem tatsächlichen Lieferumfang entsprechen. Angesichts von Vorschriften wie dem EU Cyber Resilience Act und den Cybersicherheitsrichtlinien der US-amerikanischen FDA, die auditfähige SBOMs fordern, müssen Unternehmen der Genauigkeit, Validierung und Vollständigkeit ihrer SBOMs höchste Priorität einräumen. Eine qualitativ hochwertige SBOM ermöglicht eine schnellere Erkennung von Schwachstellen, eine verbesserte Lieferantenrisikobewertung und effektivere Reaktionen auf neu auftretende Schwachstellen und Sicherheitslücken (CVEs). Eine mangelhafte SBOM-Qualität hingegen kann die Einhaltung von Vorschriften verzögern und das Lieferkettenrisiko erhöhen. Um Compliance und Sicherheit zu gewährleisten, benötigen Unternehmen automatisierte, skalierbare SBOM-Lösungen, die präzise SBOMs generieren, Lieferantendaten validieren und die SBOM-Qualität kontinuierlich über alle Produkte und Versionen hinweg überwachen.
Mehr erfahren