Average Ratings 0 Ratings
Average Ratings 0 Ratings
Description
Modsurfer offers operational and development teams a pioneering application that serves as both a system of record and a diagnostics tool for searching, browsing, validating, auditing, and investigating WebAssembly binaries. Users can quickly gain insights into various aspects of WebAssembly module data, including code size, complexity, and import/export details. The platform allows for detailed searches concerning modules, including hashes, IDs, function names, strings, namespaces, and errors. It simplifies the auditing and tracking of WebAssembly code across your entire stack, enabling users to debug and address issues that are typically challenging to identify due to the opaque nature of WebAssembly formats. Moreover, users can create or generate a "check file" to monitor binary requirements effectively. In the event a module does not pass validation, a comprehensive report is generated to assist in rectifying the issue. The validation process checks for the existence of imports and exports, function signatures, security compliance, runtime complexity, and other critical factors. With the Command Line Interface (CLI), all Modsurfer data is readily accessible, making it the most user-friendly way to engage with either the Modsurfer desktop application or the enterprise server. This streamlined approach significantly enhances the overall efficiency of managing WebAssembly code.
Description
The core of TecSec’s Constructive Key Management® (CKM®) system has undergone a rebranding! In a rapidly evolving market that is increasingly aware of security solutions, standards, and products, TecSec has decided to rename its foundational technology to prevent any potential confusion between the CKM standard and CKM® the product. The CKM® Runtime Environment (RTE) is now officially recognized as OpaqueVEIL®, which serves as the foundation for the VEIL® suite of products. Similar to its predecessor, the VEIL® suite utilizes patented and standards-compliant cryptographic key management technology, ensuring robust information security and access control through advanced cryptography. OpaqueVEIL®, which is integral to all CKM Enabled® products, consists of a set of software components necessary for implementing CKM technology effectively. By obscuring the intricate details of cryptography and key management, OpaqueVEIL® enables users to achieve straightforward and programmer-friendly results, thereby enhancing usability in security applications. This change aims to clarify the distinction between the product and the standard, reinforcing TecSec’s commitment to innovation and clarity in the ever-competitive security landscape.
API Access
Has API
API Access
Has API
Integrations
GitHub
PostgreSQL
WebAssembly
Pricing Details
Free
Free Trial
Free Version
Pricing Details
No price information available.
Free Trial
Free Version
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Vendor Details
Company Name
Dylibso
Country
United States
Website
dylibso.com/products/modsurfer/
Vendor Details
Company Name
TecSec
Country
United States
Website
www.tecsec.com
Product Features
Application Development
Access Controls/Permissions
Code Assistance
Code Refactoring
Collaboration Tools
Compatibility Testing
Data Modeling
Debugging
Deployment Management
Graphical User Interface
Mobile Development
No-Code
Reporting/Analytics
Software Development
Source Control
Testing Management
Version Control
Web App Development
Product Features
Computer Security
Anti Spam
Antivirus
Audit Trail
Compliance Management
Database Security Audit
File Access Control
Financial Data Protection
Maintenance Scheduling
Real Time Monitoring
Security Event Log
Virus Definition Update
Vulnerability Protection