Security Startup Says Mu to Bugs
The Mu-4000 security analyzer is an appliance that uses a systematic and repeatable process to identify vulnerabilities in any IP-based system, application, or network device. This process, called Protocol Spidering, emulates the vulnerability discovery techniques that hackers use, then warns the user of potential system flaws and characterizes their severity.
"What we're doing is essentially the reverse of what a protocol analyzer does," says Ajit Sancheti, co-founder and CEO of the venture-backed startup. "A protocol analyzer examines the network for behavior or code that's out of line with standards or thresholds. Our security analyzer actually creates paths that are out of line with the protocols to identify vulnerabilities that may not have been detected yet."
Initially, the appliance will likely be used by network equipment vendors and service providers that want to identify potential vulnerabilities before bringing a product or service to market. Enterprises may also use the appliance to find vulnerabilities before the vendor does, says Chris Christiansen, vice president of security products and services at IDC.
Get the story in full at Byte and Switch.
— Tim Wilson, Contributing Editor, Byte and Switch