Skip navigation

Beyond Security Announces beSTORM 2.0

Beyond Security Announces beSTORM 2.0

Beyond Security announced the latest version of its security analysis solution, beSTORM 2.0. This version introduces the 80/20 rule for smart blackbox testing, which enables faster testing by focusing first on known vulnerability patterns before searching for unknown problems. More precisely, the 80/20 rule allows for beSTORM to first test a small group of known scenarios that trigger the majority of the security holes in products.

 Targeting software engineers and developers of IP-based devices and embedded systems, the 80/20 rule enables these individuals to leverage the value of fuzzing by making it more practical to expedite testing for security holes. The 80/20 feature opens fuzzing to legions of developers who would otherwise forgo such testing because prolonged test periods are not practical due to time-to-market and cost considerations.

 The new 80/20 methodology enables quicker time to market through faster security certification testing. The key is in the ability to test in stages. Stage one is focused on known attack vectors and is typically completed in a matter of hours. Certification testing is based on stage one testing and indicates whether or not a product meets security standards based on all known security issues that exist at that time. Stage two is an exhaustive test that expands the scope to unknown problems, or less likely attack vectors. Exhaustive testing can be completed for all products, but beSTORM provides developers the flexibility to manage the process by conducting mission critical testing before launching into full testing.

  beSTORM 2.0 employs a client/server architecture and runs on Windows, UNIX, and Linux. Beyond Security is offering a free version, beSTORM Lite, to open source developers. Contact mailto:[email protected] for more details. In addition, Beyond Security is offering a trial version of beSTORM. The fully functional 30-day trial version is limited to the FTP, HTTP 1.0, and SIP (a Voice over IP Protocol) protocols; visit http://www.beyondsecurity.com/cgi-bin/bestorm/bestorm-trialdl.cgi.

 

Beyond Security

Price: Contact Beyond Security

Web Site: http://www.beyondsecurity.com

 

Hide comments

Comments

  • Allowed HTML tags: <em> <strong> <blockquote> <br> <p>

Plain text

  • No HTML tags allowed.
  • Web page addresses and e-mail addresses turn into links automatically.
  • Lines and paragraphs break automatically.
Publish