Complete SBOM solution for DevSecOps

Increase your cyber security posture with an optimized SBOM workflow for security, developer and compliance teams.

Screenshot - Environments

Frictionless DevSecOps

Complete SBOM Management Solution

SBOM Observer provides a comprehensive SBOM workflow to help you manage your software supply chain. Leverage the powerful combination of the Policy Engine and Operational Model to guarantee the security and compliance of your software.

Software Composition Analysis

Integrate with your existing CI/CD pipeline and gain insights and control of your software supply chain - throughout the full application lifecycle.

Learn more

Policy Compliance

Define and enforce policies for vulnerabilities, deployments, data flow and ownership to ensure your software supply chain is secure and compliant.

Learn more

SBOM Workflow

Collect, manage, and share SBOMs across your organization. Analyze and monitor your inventory for vulnerabilities and compliance issues.

Learn more

Software Bill of Materials (SBOM)

A “software bill of materials” (SBOM) is a nested inventory, a list of ingredients that make up software components such as applications, services, containers and operating systems. SBOMs have emerged as key building blocks in software security and software supply chain risk management.

The “Minimum Elements” defined under Executive Order 14028 are available on the NTIA SBOM Publications page.

An SBOM-related concept is the Vulnerability Exploitability eXchange (VEX). A VEX document is an attestation, a form of a security advisory that indicates whether a product is affected by a known vulnerability.

SBOM Management

An Attestation Workflow

Collect, analyze, and share SBOM, SLSA and other attestations types across your organization.

Attestation Inbox
Effortlessly receive SBOMs from your suppliers and partners through a variety of channels, including email. With a single, unified inbox, you can efficiently verify and automate these imports.
Not only SBOMs
With native support for SLSA, and in-toto attestations, you can monitor and enforce provenance and other claims (code reviews, SAST scans etc) for your software.
Share with your customers
Share aggregated SBOMs, Vulnerability Disclosure Reports (VDR) and Vulnerability Exploitability eXchange (VEX) documents with your customers.
Product screenshot

Software Composition Analysis

Open Source Inventory

Automatically identify the open source components in your software and any associated vulnerabilities or risks.

Integrated with your CI/CD
Smoothly integrate your CI/CD pipeline and automate the process of generating and importing up-to-date SBOMs for each build and release.
Open Source Risk Management
Open Source components make up 85-90% of the codebase in many modern applications and provide a significant threat surface.
Product screenshot

Operational Model

Organize Your Inventory

Connect how you actually view services, applications and teams with your inventory of components. Remove noise by prioritizing vulnerabilities and policy violations in applications that are actually running in production.

Automatically discover deployed applications
Automatically discover and import your deployed applications and services using integrations for Kubernetes, Amazon AWS and Docker.
Delegate to the right team
Delegate the responsibility of securing applications and services. Alerts for vulnerabilities and policy violations will automatically be sent to the right team.
Track services and sensitive data
With native support for SaaSBOMs you can track how sensitive (PII, PIFI, PHI) data is being used by your applications and services. Implement targeted policies to ensure your operations remain in full compliance with GDPR and HIPAA cyber security obligations.
Product screenshot

Vulnerability Management

Continuous Vulnerability Scanning

Your inventory of application, services and containers are continuously scanned for vulnerabilities. Integrations with OVS, GitHub Advisories, NVD and other sources ensure a comprehensive coverage of new vulnerabilities.

Resolve issues in production first
Leverage the operational model to prioritize vulnerabilities and policy violations in production environments first.
Vulnerability Exploitability eXchange (VEX)
Keep track of exploitability risk assessments for vulnerabilities using VEX documents. Create, import and share CISA VEX compliant documents with your customers and vendors.
Vulnerability Disclosure Reports (VDR)
Create and share Vulnerability Disclosure Reports (VDR) compliant with NIST SP 800-161 and ISO/IEC 29147:2018 with your customers.
Product screenshot

Compliance

Automated Policies

SecOps and compliance professionals can leverage the powerful policy engine to monitor and enforce policies throughout the SDLC, including services deployed in production environments.

Cover the Entire Operational Model
Policies cover the entire operational model including vulnerability remediation, build quality controls (e.g. SAST results), ownership and GDPR obligations.
Policy as Code
The policy engine is integrated with Open Policy Engine (OPA) and SecDevOps engineers can, in addition to our visual policy builder, leverage existing skill sets and implement policies directly in Rego.
License Compliance
Automatically track license compliance issues and restrict problematic or unlicensed packages.
Product screenshot

A Full Stack SBOM Platform

SBOM Management
Create, Import, Share and Manage SBOMs throughout the software development lifecycle. Full support for standards such as CycloneDX, SPDX, SWID, VEX, SaasBOM.
SLSA Support
While SBOMs provide you with an inventory, SLSA (Supply-chain Levels for Software Artifacts) enables you to track artifact integrity, that the source code you’re relying on is the code you’re actually using, across your software supply chain.
Vulnerability Detection
Detect known vulnerabilities in your inventory of applications, components and containers across wide selection of ecosystems. We integrate many of the standard advisory databases, including GitHub, OSV and NVD.
Exploitability Analysis (VEX)
Triage and add vulnerability explotability analysis ('Is this exploitable in this particular application?') to detected vulnerabilities, and share findings with your customers.
Policy Engine
Codify your security and quality policies and enforce them across your entire SDLC with a powerful policy engine based on Open Policy Engine (OPA).
Policy as Code
In addition to our visual policy builder, DevSecOps professionals can leverage their existing skill set and drop down to Rego when implementing policies.
Operational Model
Connect your organizations internal view of teams, services, applications, containers and deployments with the inventory provided by SBOMs and other tools.
Track Releases
Track deployments of releases to production environments in the operational model and leverage that information in policies - reducing the noise and helping prioritization of vulnerabilities and violations.
CI/CD
Easily integrate your CI/CD pipeline using popular tools and our broad support for SBOM standards and ready made solutions (e.g. GitHub Actions)
Automatic Discovery of Applications
Automatically synchronize your operational model integrations for Kubernetes and AWS ECS, making sure you have an up to date picture of what is running in production.
Share SBOMs
Share SBOM, Vulnerability Disclosures (VDR) and Vulnerability Exploitability eXchange (VEX) documents with customers and partners using secure links and automations.
Sigstore Support
Our Sigstore integration automatically validates the integrity of signed attestations.
Exploit Prediction Scoring
Use the Exploit Prediction Scoring System (EPSS) in combination with the Operational Model and other threat signals to prioritize remediation of detected vulnerabilities.
Track PII
The Operational Model allows you to track dataflows of sensitive data between services, Track Personal Identifying Information (PII), Personally Identifiable Financial Information (PIFI) and patient health information making sure you fulfill GDPR, HIPAA and other regulatory cyber security obligations.
NIST Vulnerability Disclosure Reports
Create NIST SP 800-161 compliant Vulnerability Disclosure Reports to communicate known and unknown vulnerabilities affecting components and services to partners and customers.
CISA VEX
Create and share CISA compliant Vulnerability Exploitability eXchange advisories to communicate the exploitability of vulnerable components in the context of the product in which they're used.
CycloneDX BOM Repository Server
Our API is compatible with the CycloneDX BOM Repository Server for distributing CycloneDX BOMs.
API + Webhooks
With a well documented API and Webhooks support you can easily create you own integrations and automate workflows.

Pricing

Pricing plans for teams of all sizes

Choose a plan that matches your team size, support and capacity needs.

Professional

The essentials for small teams.

TBD/month

  • Full stack SBOM management
  • 1 namespace
  • 1 environment
  • 3 users included
  • 24-hour support response time

Business

For DevSecOps and compliance teams.

TBD/month

  • Full stack SBOM management
  • 1 namespace
  • 3 environments
  • 3 users included
  • Additional users available
  • Prioritized support within business hours

Enterprise

Dedicated support and infrastructure for multiple teams.

TBD/month

  • Full stack SBOM management
  • Unlimited namespaces
  • Unlimited environments
  • 100 users included
  • SAML integration
  • Role Based Access Controls (RBAC)
  • Audit Logs
  • Service Level Agreement

Frequently asked questions

Can’t find the answer you’re looking for? Reach out to our customer support team.

What is a 'Namespace'?
Namespaces are isolated data containers for all data managed by SBOM Observer, including SBOMs, environments, policies and access controls. Namespaces can be used to separate the data for different organizational units, data for testing purposes etc. Users can have different roles in different namespaces.
What is an 'Environment'?
Environments are used to model deployed applications, services, containers and endpoints (VMs, bare metal machines, k8s clusters etc.). Environments are often scoped to production (and testing, QA etc.), but can also be used to model customer deployed systems and more.
Is SBOM Observer Open Source?
Currently no. We will reevaluate a possible Open Source version once the product is no longer in beta.
Can we deploy SBOM Observer On Premise?
Yes! Contact our customer success team for more information.