Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Analytics

7/19/2010
02:41 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Protecode Launches System 4 For Identifying Open Source Content

Scanning solution matches source code against a list of 450,000 open-source software projects

Ottawa, ON – July 19, 2010 – Protecode, Inc., a solution provider for managing open source software licenses, today announced Protecode System 4TM, the latest refinement of a suite of capabilities that enables all sizes of enterprise businesses – small, medium and large – to efficiently and cost-effectively identify open source content in their source code and determine their licensing obligations. System 4 installs as a simple overlay on existing design, development and testing environments without changing any existing workflows.

The core of System 4 is the Protecode open source reference database that matches source code against a comprehensive list of 450,000 open source software projects. Using a modular architecture to enable a wide variety of deployment possibilities, System 4 comprises a set of lightweight clients installed throughout an organization with minimal overhead on IT infrastructure and technical staff. System 4 can be easily customized for individual company divisions, product lines, or geographic offices with this architecture, including centralized or project-level user group, role, permission and license policy administration.

"Despite the increased use of open source and other third-party software, Protecode is among only a few vendors capable of analyzing code through its use of source code signature databases," said Jay Lyman, enterprise software analyst with The 451 Group. "Software such as Protecode's System 4 can enable enterprises to adopt and use open source software more effectively and safely."

“In the last year some big names have been involved in legal cases because they overlooked their open source license obligations. We developed Protecode System 4 to prevent that sort of problem,” said Mahshad Koohgoli, CEO, Protecode. “Now organizations can scan all incoming source code and outgoing software products to make sure their licensing view is up-to-date and their legal obligations are being managed.”

Protecode System 4 delivers substantial improvements in three key areas: scalability, a new user interface and improved data relevance. Enterprise users can now instantiate multiple virtual instances of Protecode System 4 enabling different groups within an organization to set up their own open source management systems with specific roles and intellectual property policies. System 4 offers a completely revised web UI that delivers streamlined download, installation, and configuration as well as substantially improved navigation of software components and corresponding license obligations for greater ease of use and efficiency.

Additionally, Protecode System 4 provides multiple dimensions of analysis targeted to business, technology and legal domains. Aside from generating a comprehensive software inventory report, the system fully cross-references all licensing and copyright attributes to illuminate the full set of licensing obligations the enterprise is legally responsible for and includes significant algorithm advances to ensure highly accurate identification of open source code.

Protecode System 4 is available now.

About Protecode

Protecode provides a comprehensive solution for managing open source software licenses. Protecode System 4™ uses lightening fast code scanning that works behind the scenes in real-time with code libraries, build processes and desktops to detect and report open source licenses relative to company-defined policies. Built for ease-of-use and minimal intrusion into existing development processes, Protecode cost-effectively manages the lifecycle of open source licensing obligations. Protecode is a Gartner 2010 Cool Vendor headquartered in Ottawa, Canada with partners worldwide. www.protecode.com.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Manchester United Suffers Cyberattack
Dark Reading Staff 11/23/2020
As 'Anywhere Work' Evolves, Security Will Be Key Challenge
Robert Lemos, Contributing Writer,  11/23/2020
Cloud Security Startup Lightspin Emerges From Stealth
Kelly Sheridan, Staff Editor, Dark Reading,  11/24/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-27218
PUBLISHED: 2020-11-28
In Eclipse Jetty version 9.4.0.RC0 to 9.4.34.v20201102, 10.0.0.alpha0 to 10.0.0.beta2, and 11.0.0.alpha0 to 11.0.0.beta2, if GZIP request body inflation is enabled and requests from different clients are multiplexed onto a single connection, and if an attacker can send a request with a body that is ...
CVE-2020-29367
PUBLISHED: 2020-11-27
blosc2.c in Blosc C-Blosc2 through 2.0.0.beta.5 has a heap-based buffer overflow when there is a lack of space to write compressed data.
CVE-2020-26245
PUBLISHED: 2020-11-27
npm package systeminformation before version 4.30.5 is vulnerable to Prototype Pollution leading to Command Injection. The issue was fixed with a rewrite of shell sanitations to avoid prototyper pollution problems. The issue is fixed in version 4.30.5. If you cannot upgrade, be sure to check or sani...
CVE-2017-15682
PUBLISHED: 2020-11-27
In Crafter CMS Crafter Studio 3.0.1 an unauthenticated attacker is able to inject malicious JavaScript code resulting in a stored/blind XSS in the admin panel.
CVE-2017-15683
PUBLISHED: 2020-11-27
In Crafter CMS Crafter Studio 3.0.1 an unauthenticated attacker is able to create a site with specially crafted XML that allows the retrieval of OS files out-of-band.