top of page

U.S. Government Military Agency Evaluates Assured

AssuredScanDKV® Case Study

Graphic-DKV-Computer.png

Client Name:

Confidential.

​

Industry:

Government Research Laboratory

​

 

“AssuredScanDKV® was easy to use, operated without defects or bugs and empowered [the Agency] to eliminate known software vulnerabilities within [its] software.

- SR. Officer | Client Agency

 

 

 

“AssuredScanDKV® is a lightweight application scanner that requires minimal training and expertise to use. The product performed consistent with Assured’s representations and operated without defects or bugs. I have never seen such impressive results.”

 

- Supervising Engineer, Client Agency

​

Overview:

​

The U.S. agency client develops mission critical software for the U.S. military. As with any software developed for national security purposes, it is imperative to minimize the risk of this software getting hacked by cyber adversaries. Given that most cyber-attacks on software target known vulnerabilities—especially within open source and third-party applications and libraries, as well as bundled executables—these vulnerabilities represent the primary means through which a cyber adversary will seek to compromise an organization’s data and systems.

​

Over time, most software will be infiltrated by known vulnerabilities. The Agency knew they had to minimize the possibility of cyber adversaries attacking mission critical systems through software vulnerabilities.They contracted with Assured Enterprises for a detailed evaluation of AssuredScanDKV®, deep software scanning tool. 

Challenges:​

Discover Vulnerabilities 
Measure the effectiveness of AssuredScanDKV®
Mission Critical Assessment
Determine if AssuredScanDKV® should become part of the agencies tool-set used to detect and eliminate vulnerabilities 
Healthy Skeptisism
Evaluate Assured’s claims for performance, ease of use and other factors

Assured Delivers:

​

  • Assured delivered a three-hour training program provided the knowledge to run, scan and analyze results. We showcased how easily installation, and launch could be set up in a few minutes with minimal impact on processing resources.

​

  • Scans of custom-built Windows applications detected vulnerabilities in each software package examined, despite the laboratory’s proper use of other scanning tools.

​

  • Scans of each software application were completed in two to five minutes without requiring access to sensitive source code or to any data created using the software

​

  • AssuredScanDKV® also identified known vulnerabilities in third-party libraries.

I want to uncover hiddent vulnerabilities in my software
bottom of page