Services & Products

Our offers in overview

>> We help your teams to set up a process landscape with suitable open source or commercial tools!

Who are our offers aimed at?

User companies

To corporate customers who use third-party software (users) and want to prevent attackers from exploiting security vulnerabilities in the software they use.

Developer companies

To development companies - companies or developers who develop software that, when shipped to companies or other customers, must ensure that their software does not or will not contain security vulnerabilities.

Our services:

Vulnerability Analysis

Identify vulnerabilities, assess them and identify causes

Modern software contains hundreds to thousands of open source software (OSS) components. It is therefore time-consuming to keep track of whether vulnerabilities to one of the components have been found by the security community.

These vulnerabilities are very interesting for hackers and potential attackers, because many websites or servers can be affected at the same time. There are often published exploits for the vulnerabilities. Malware can specifically and automatically search for vulnerable websites or servers and install backdoors.

License Compliance

List and evaluate all license types used in detail

The use of open source software (OSS) requires strict compliance with conditions defined in the OSS license texts. Often, there is no overview of the restrictions or obligations actually entailed by the use of OSS components.

Nested license constructions, due to interlinked OSS components in your code, lead to unclear situations where some licenses then "fight" against each other. As a result, there are components that are legally incompatible with each other, and may not be used together in a software product.

Consulting & Governance

Establish and implement action plan for improvement

For us, a high level of security and proven legal compliance in the use of open source software belong inseparably together. This requires a holistic approach.

If you don't want to buy fast services to identify your security vulnerabilities and license risks, if your IT landscape is somewhat larger and you don't want to pay for each scan individually, if you don't want to give the source code off-site for confidentiality reasons and you want to take the scans into your own hands, then we can advise you on how to set up your internal services in a secure and legally compliant manner. 

Frequently asked questions:

They are interesting for hackers and potential attackers, since many websites or servers can be affected at the same time. There are often published exploits for the vulnerabilities. Malware can specifically and automatically search for vulnerable websites or servers and install backdoors.

No.
OSS components are often much more stable than self-written ones due to the 1,000-fold use on the web. Furthermore, they are indispensable for software ecunomic reasons alone.

But: It leads, in our opinion, to greater due diligence, which we can support them in with our offerings and tools.

Contact us:

Trial offer

Initial experience and findings - No further obligations
  • Upload source code
  • Have it analysed
  • Receive report of the analysis
POPULAR

Basic offer

Basic findings and recommendations for action
  • Review of the initial situation
  • Have it analysed
  • Receive report of the analysis

Extended offer

Comprehensive findings and recommendations for action
  • Upload source code
  • Have it analysed
  • Receive report of the analysis
  • Compliance info package that makes you legally compliant
  • Be informed proactively for 1 year

Consulting offer

Flexible performance - tailored to your situation
  • Review of the initial situation
  • Have test track created
  • Trainings
  • Take analysis and improvements completely into your own hands
POPULAR

More about WoBeeCon:

Design, illustrations and content © 2024 | WoBeeCon GmbH