You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
@@ -68,7 +68,7 @@ The Ortelius Community, managed by the [Continuous Delivery Foundation](https://
68
68
69
69
{{< blocks/section color=black >}}
70
70
<divclass="col-12">
71
-
<h1class="text-center">Ortelius Integrations</h1>
71
+
<h1class="text-center">Ortelius Ecosystem</h1>
72
72
73
73
</div>
74
74
@@ -117,7 +117,7 @@ The Ortelius Community, managed by the [Continuous Delivery Foundation](https://
117
117
118
118
<divstyle="margin-top:80px;margin-left:100px">
119
119
120
-
## Sign-up and Get Started Managing Vulnerabilities
120
+
## Sign-up and Get Started Patching Vulnerabilities
121
121
122
122
From discovering where open-source packages are being used, to federating OpenSSF Scorecard and [Application Security Posture Management](https://www.deployhub.com/application-security-posture-management/) data, Ortelius serves as a central hub for managing, evaluating, and responding to vulnerabilities, and understanding the risk associated to consuming open-source packages from code to cloud.
Copy file name to clipboardexpand all lines: content/en/catalog/_index.md
+15-12
Original file line number
Diff line number
Diff line change
@@ -1,6 +1,6 @@
1
1
---
2
-
title: Share and Aggregate SBOMs in Decoupled Architecture
3
-
description: Consume and Use SBOM Data
2
+
title: Strengthen Your OS Supply Chain
3
+
description: Battle-ready Your Supply Chain
4
4
summary: Use the Security Evidence You Already Collect
5
5
type: contributor
6
6
---
@@ -11,7 +11,7 @@ type: contributor
11
11
</div>
12
12
13
13
<divclass="col-12">
14
-
<h1class="text-center">Create Application Level SBOMS and View Real-time Vulnerabilities</h1>
14
+
<h1class="text-center">Battle-ready Your Supply Chain</h1>
15
15
<hr>
16
16
</div>
17
17
{{< blocks/feature_dual >}}
@@ -29,13 +29,16 @@ type: contributor
29
29
30
30
<divstyle="margin-top:80px;margin-left:10px">
31
31
32
-
## Logical Application SBOMs
32
+
## Full-spectrum OS Package Visibility
33
33
34
-
Ortelius aggregates Software Bill of Materials (SBOM) data across decoupled architectures to ensure comprehensive visibility, security, and compliance in modern software ecosystems. In decoupled systems, where services, applications, and components operate independently, each part may have its own dependencies, vulnerabilities, and licensing requirements.
34
+
The fragmented structure of decoupled cloud-native architectures creates operational blind spots, often weakening IT teams' ability to counter threats swiftly and decisively. Unlike monolithic applications, cloud-native systems may generate hundreds of Software Bill of Materials (SBOM) reports scattered across numerous source code repositories, complicating threat detection and response.
35
35
36
-
Aggregating SBOM data allows for a unified view of all software components and their supply chains. Ortleius helps organizations identify potential risks, manage vulnerabilities proactively, and maintain regulatory compliance. The Ortelius centralized oversight is essential for enhancing security posture, reducing blind spots, and ensuring that the entire architecture remains resilient and up-to-date despite its distributed nature.
36
+
Ortelius acts as a force multiplier, aggregating SBOM data across these decentralized architectures to deliver full-spectrum visibility, security, and compliance in modern software operations. In distributed systems where services, applications, and components function independently, each element brings its own dependencies, vulnerabilities, and licensing challenges.
37
+
38
+
By consolidating SBOM data, Ortelius provides a unified operational picture of all software components and their supply chains. It empowers organizations to detect risks early, neutralize vulnerabilities proactively, and maintain mission-critical regulatory compliance. This centralized command and control capability enhances your security posture, eliminates blind spots, and ensures your entire architecture remains fortified and mission-ready, even in the face of distributed complexities.
39
+
40
+
The Ortelius aggregated SBOM is a vital asset for achieving compliance with [Executive Order 14028 - Improving the Nation's Cybersecurity](https://www.gsa.gov/technology/it-contract-vehicles-and-purchasing-programs/information-technology-category/it-security/executive-order-14028).
37
41
38
-
The Ortelius aggregated SBOM is critical for meeting [Executive Order 14028 - Improving the Nation's Cybersecurity](https://www.gsa.gov/technology/it-contract-vehicles-and-purchasing-programs/information-technology-category/it-security/executive-order-14028).
@@ -57,11 +60,11 @@ The Ortelius aggregated SBOM is critical for meeting [Executive Order 14028 - Im
57
60
58
61
<divstyle="margin-top:80px;margin-left:10px">
59
62
60
-
## Continuous Vulnerability Updates
63
+
## A Battle-ready Software Supply Chain
61
64
62
-
Using the stored SBOM data, Ortelius continuously scans for new vulnerabilities found long after the container was created. Continuous vulnerability scanning is essential because software systems are constantly evolving, and new security threats emerge regularly. As developers release updates, introduce new code, or integrate third-party components, new vulnerabilities may be inadvertently introduced.
65
+
Leveraging its stored SBOM data, Ortelius conducts ongoing surveillance for new vulnerabilities that may surface long after a container has been deployed. This continuous vulnerability scanning is a critical defense measure, as software systems are dynamic and constantly evolving, with new threats emerging regularly. As developers roll out updates, introduce fresh code, or incorporate third-party components, unforeseen vulnerabilities can infiltrate the system.
63
66
64
-
By scanning for vulnerabilities continuously, Ortelius helps organizations detect potential weaknesses as soon as they arise, enabling faster remediation and reducing the window of opportunity for cyberattacks. Continuous scanning ensures that security measures remain up-to-date, minimizing the risk of breaches and ensuring compliance with security standards in an ever-changing threat landscape.
67
+
By maintaining persistent scanning operations of OSV.dev, Ortelius enables organizations to detect potential weaknesses immediately upon discovery, allowing for rapid countermeasures and minimizing the hacker’s window of opportunity. Continuous scanning for new vulnerabilities ensures your defenses remain current, fortifying against breaches and maintaining compliance with security protocols in an ever-shifting threat environment. This proactive approach secures your operational landscape, keeping your software supply chain resilient and battle-ready.
65
68
66
69
</div>
67
70
@@ -97,9 +100,9 @@ By scanning for vulnerabilities continuously, Ortelius helps organizations detec
97
100
98
101
<divstyle="margin-top:80px;margin-left:10px">
99
102
100
-
## Conclusion and Get Started
103
+
## Get Started
101
104
102
-
From discovering where open-source packages are being used, to federating OpenSSF Scorecard and Application Security Posture Management data, Ortelius serves as a central hub for managing, evaluating, and responding to vulnerabilities, and understanding the risk associated to consuming open-source packages from code to cloud.
105
+
Ortelius serves as a centralized command center, delivering full-spectrum visibility and control over open-source software and supply chain security. By aggregating SBOM data and enabling continuous scanning for vulnerabilities, it empowers organizations to assess risks, respond proactively, and maintain resilience across dynamic, distributed architectures. Start securing your software supply chain today with Ortelius' free SaaS version and experience its capabilities firsthand.
103
106
104
107
Get started with Ortelius using the free SaaS version. Take a quick tutorial and see it in action.
Copy file name to clipboardexpand all lines: content/en/microservicemapping/index.md
+21-18
Original file line number
Diff line number
Diff line change
@@ -1,25 +1,27 @@
1
1
---
2
-
title: Locate Open-Source Packages
3
-
description: Find Open-Source Package Versions for Quick CVE Response
2
+
title: Control Threats in Your Supply Chain
3
+
description: Identify and Neutralize Threats
4
4
summary: Ortelius Maps CVEs to Endpoints
5
5
type: contributor
6
6
---
7
7
8
8
{{< blocks/section color=primary >}}
9
9
<divclass="col-12">
10
-
<h1class="text-center">Locate and Remediate Open-Source Packages</h1>
10
+
<h1class="text-center">Identify and Neutralize Threats</h1>
11
11
<hr>
12
12
</div>
13
13
14
14
{{< blocks/feature_dual_left_sm >}}
15
15
16
16
<divstyle="margin-top:80px;margin-left:10px">
17
17
18
-
## Control Open-Source Vulnerabilities
18
+
## Control Threats Across Your Supply Chain
19
19
20
-
Take control of your [open-source software security](https://www.deployhub.com/open-source-software-security/) with the Ortelius vulnerability evidence store. Ortelius ensures you maintain a secure and up-to-date inventory of all the open-source components within your software supply chain. It empowers you to make fast, informed decisions about open-source usage across your entire infrastructure, from code to cloud.
20
+
Take command of potential threats emerging from your [open-source software security](https://www.deployhub.com/open-source-software-security/) gaps with Ortelius. Ortelius guarantees you maintain an ironclad, up-to-date inventory of all open-source components within your software supply chain, enabling rapid, tactical decisions regarding open-source deployment across your entire operational theater, from code to cloud.
21
+
22
+
Ortelius delivers swift visibility on the deployment of open-source package versions across your infrastructure. A quick search on any package and version reveals a comprehensive inventory of its presence and usage.
23
+
This capability provides your teams with the critical intel required to evaluate the operational impact of CVEs and swiftly deploy resources to neutralize vulnerabilities, pinpointing exactly where CVE patches are urgently needed.
21
24
22
-
Ortelius can quickly show you where an open-source package version is running across your infrastructure. A simple search on a package and version will provide you with a full inventory of where the package is running, and who is consuming it. This search provides teams a quick way to determine the impact of a CVE, and where it needs to be addressed.
23
25
</div>
24
26
25
27
{{< /blocks/feature_dual_left_sm >}}
@@ -56,18 +58,19 @@ Ortelius can quickly show you where an open-source package version is running ac
56
58
57
59
## Evaluate OS Package OpenSSF Scorecard
58
60
59
-
OpenSSF Scorecard is a security tool developed by the Open Source Security Foundation (OpenSSF) designed to automatically assess the security posture of open-source projects. By providing a set of automated checks to evaluate how well a project follows security best practices, it helps developers and organizations understand the security risks associated with the open-source software they rely on.
61
+
[OpenSSF Scorecard](https://scorecard.dev/) is a tactical security tool developed by the [Open Source Security Foundation](https://www.openssf.org) (OpenSSF) to conduct automatic assessments of the security posture of open-source projects. By executing a series of automated checks, it evaluates how closely a project adheres to security best practices, empowering developers and organizations to understand and mitigate the security risks tied to the open-source software in their arsenal.
62
+
63
+
The Scorecard evaluates critical mission areas, such as:
60
64
61
-
The Scorecard evaluates various aspects of a project, such as:
65
+
- Code review practices: Ensures all code changes undergo thorough review before integration.
66
+
- Branch protection: Confirms that critical branches are safeguarded.
67
+
- Dependency management: Assesses how effectively the project manages and updates external dependencies.
68
+
- Security policy: Verifies the presence of a defined and actionable security policy.
69
+
- Vulnerability reporting: Ensures processes are in place for promptly reporting and addressing security vulnerabilities.
62
70
63
-
- Code review practices: Ensures changes are reviewed before being merged.
64
-
- Branch protection: Verifies that protected branches are used.
65
-
- Dependency management: Assesses how well the project manages and updates dependencies.
66
-
- Security policy: Checks whether the project has a defined security policy.
67
-
- Vulnerability reporting: Looks for processes in place for reporting and addressing security vulnerabilities.
68
-
- Each project receives a score, allowing users to compare the security health of different open-source projects. This tool is especially useful for organizations looking to manage the risks associated with open-source software in their supply chains.
71
+
Each project is assigned a security score, allowing for direct comparison of the security readiness of various open-source projects. This tool is essential for organizations aiming to maintain operational security and mitigate risks across their open-source software supply chain.
69
72
70
-
Ortelius integrates with OpenSSF Scorecard giving you a centralized view of the results based on each individual component in your software supply chain.
73
+
Ortelius integrates seamlessly with OpenSSF Scorecard, providing a centralized command view of security assessments for every component within your software supply chain.
71
74
72
75
</div>
73
76
@@ -86,7 +89,7 @@ Ortelius integrates with OpenSSF Scorecard giving you a centralized view of the
Ortelius seamlessly integrates with popular security tools used in open-source projects, such as Sonatype and Veracode, consolidating results into a unified dashboard, giving teams a clear, comprehensive view of the security status of Components based on all logical Application versions.
92
+
Ortelius operates in lockstep with leading security tools used in open-source projects, such as Sonatype and Veracode, centralizing results into a unified command dashboard. This integration delivers teams a clear, consolidated overview of the security status of components, reflecting the security posture across all relevant application versions within your operational domain.
90
93
</div>
91
94
92
95
{{< /blocks/feature_dual_left_sm >}}
@@ -124,9 +127,9 @@ Ortelius seamlessly integrates with popular security tools used in open-source p
124
127
125
128
<divstyle="margin-top:80px;margin-left:100px">
126
129
127
-
## Conclusion and Get Started Managing Vulnerabilities
130
+
## Get Started Patching Vulnerabilities
128
131
129
-
From discovering where open-source packages are being used, to federating OpenSSF Scorecard and Application Security Posture Management data, Ortelius serves as a central hub for managing, evaluating, and responding to vulnerabilities, and understanding the risk associated to consuming open-source packages from code to cloud.
132
+
From pinpointing the deployment of open-source packages to integrating OpenSSF Scorecard and Application Security Posture Management data, Ortelius functions as a centralized command hub. It empowers teams to manage, assess, and patch vulnerabilities while providing a comprehensive understanding of the risks associated with consuming open-source packages across your entire infrastructure, from code to cloud.
130
133
131
134
Get started with Ortelius using the free SaaS version. Take a quick tutorial and see it in action.
0 commit comments