OX Security Features
Administration (2)
API / Integrations
Application Programming Interface Specification for how the application communicates with other software. APIs typically enable integration of data, logic, objects, etc. with other software applications.
Extensibility
Provides the ability to extend the platform to include additional features and functionalities
Analysis (4)
Reporting and Analytics
Tools to visualize and analyze data.
Issue Tracking
Track issues as vulnerabilities are discovered. Documents activity throughout the resolution process.
Static Code Analysis
Examines application source code for security flaws without executing it.
Code Analysis
Scans application source code for security flaws without executing it.
Testing (7)
Command-Line Tools
Allows users to access a terminal host system and input command sequences.
Manual Testing
Allows users to perfrom hands-on live simulations and penetration tests.
Test Automation
Runs pre-scripted security tests without requiring manual work.
Compliance Testing
Allows users to test applications for specific compliance requirements.
Black-Box Scanning
Scans functional applications externally for vulnerabilities like SQL injection or XSS.
Detection Rate
The rate at which scans accurately detect all vulnerabilities associated with the target.
False Positives
The rate at which scans falsely indicate detection of a vulnerability when no vulnerabilitiy legitimately exists.
Functionality - Software Composition Analysis (3)
Language Support
Supports a useful and wide variety of programming languages.
Integration
Integrates seamlessly with the build environment and development tools like repositories, package managers, etc.
Transparency
Grants comprehensive user-friendly insight into all open source components.
Effectiveness - Software Composition Analysis (3)
Remediation Suggestions
Provides relevant and helpful suggestions for vulnerability remediation upon detection.
Continuous Monitoring
Monitors open source components proactively and continuously.
Thorough Detection
Comprehensively identifies all open source version updates, vulnerabilities, and compliance issues.
Documentation (3)
Feedback
Provides thorough, actionable feedback regarding security vulnerabilities, or allows collaborators to do the same.
Prioritization
Prioritizes detected vulnerabilities by potential risk, or allows collaborators to do the same.
Remediation Suggestions
Provides suggestions for remediating vulnerable code, or allows collaborators to do the same.
Security (7)
False Positives
Does not falsely indicate vulnerable code when no vulnerabilitiy legitimately exists.
Custom Compliance
Allows users to set custom code standards to meet specific compliances.
Agility
Detects vulnerabilities at a rate suitable to maintain security, or allows collaborators to do the same.
Tampering
Ability to detect any attempts to tamper with the software during the development or deployment stages
Malicious Code
Scans for malicious code
Verification
Verifies authenticity of third-party components
Security Risks
Tracks potential security risks
Tracking (3)
Bill of Materials
Offers a software bill of materials to keep track of components
Audit Trails
Tracks audit trails
Monitoring
Provides automated and continuous monitoring of various components
Risk management - Application Security Posture Management (ASPM) (4)
Vulnerability Management
Identifies, tracks, and remediates vulnerabilities
Risk Assessment and Prioritization
Assesses and prioritizes risks based on application context
Compliance Management
Ensures compliance with industry standards and regulations
Policy Enforcement
Ensures mechanisms are in place for enforcing security policies across applications
Integration and efficiency - Application Security Posture Management (ASPM) (2)
Integration with Development Tools
Integrates with existing development and DevOps tools
Automation and Efficiency
Automates security tasks to improve efficiency
Reporting and Analytics - Application Security Posture Management (ASPM) (3)
Trend Analysis
Includes tools for analyzing trends in security incidents and vulnerabilities over time
Risk Scoring
Assigns scores to vulnerabilities based on their potential impact, helping prioritize remediation efforts
Customizable Dashboards
Provides customizable dashboards that present real-time data on vulnerabilities, risks, and compliance status
Functionality - Software Bill of Materials (SBOM) (3)
Format Support
Supports relevant SBOM formats such as cycloneDX and SPDX.
Annotations
Provides robust, industry standard SBOM annotation functionality.
Attestation
Generates thorough evidence of compliance including component relationships, licenses, and more.
Management - Software Bill of Materials (SBOM) (3)
Monitoring
Automatically and continuously monitors components to alert users of noncompliant elements.
Dashboards
Presents a transparent and easy to use dashboard for performing SBOM management.
User Provisioning
Includes controls for role-based access permissions.
Agentic AI - Static Application Security Testing (SAST) (1)
Autonomous Task Execution
Capability to perform complex tasks without constant human input
Agentic AI - Application Security Posture Management (ASPM) (2)
Autonomous Task Execution
Capability to perform complex tasks without constant human input
Multi-step Planning
Ability to break down and plan multi-step processes



