Company:ObjectSecurity

From HandWiki
ObjectSecurity
TypePrivate
IndustryInformation Security
FoundedUK (2000 (2000)), California since 2009, Germany since 2017
FounderUlrich Lang, Rudolf Schreiner
HeadquartersSan Diego, USA and Berlin, Germany
Area served
Worldwide
Key people
Ulrich Lang (CEO, ObjectSecurity LLC)
Rudolf Schreiner (CEO ObjectSecurity OSA GmbH)
Karel Gardas (Chief Software Engineer)
Holmes Chuang (Principal Software Scientist)
Reza Fatahi (Principal Research Scientist)
Susan Farrell (Head of R&D Commercialization)[1]

ObjectSecurity is an information technology company focusing on information security (model-driven security, fine-grained access control, middleware security), supply chain risk analysis, data analytics, and artificial intelligence. The company pioneered the development of model-driven security,[2] which was mostly an academic concept prior to the company's developments. The company is best known for their OpenPMF (Open Policy Management Framework) model-driven security product,[3] security policy automation product for which the company received a "Cool Vendor" award from Gartner in 2008.[4] In recent years, ObjectSecurity diversified into supply-chain risk-analysis automation for which the company was selected "Finalist" by AFWERX in 2019,[5] and vulnerability assessment & pentesting automation.[citation needed]

History

ObjectSecurity was founded in 2000 by information security experts, Ulrich Lang and Rudolf Schreiner.[6] At that time, Lang was a researcher at the University of Cambridge Computer Laboratory, working on "Access Policies for Middleware", and both were working as independent information security consultants.[7]

Initially, ObjectSecurity was mainly working on customer projects around middleware security, esp. CORBA, but they quickly remarked that it was not possible to author and maintain security configurations for interconnected, distributed application environments. In an attempt to solve this challenges, the team built a full OMG CORBA Security SL3 & SSLIOP open source implementation based on MICO CORBA.[8]

Security Policy Automation

To solve various challenges around implementing secure distributed systems, ObjectSecurity released OpenPMF version 1,[9] at that time one of the first Attribute Based Access Control (ABAC) products in the market. It allowed the central authoring of access rules, and the automatic enforcement across all middleware nodes using local decision/enforcement points. Thanks to the support of several EU funded research projects, ObjectSecurity found that a central ABAC approach alone was not a manageable way to implement security policies.[10][11]

ObjectSecurity released OpenPMF version 2. It is based on a concept called model-driven security which allows the intuitive, business-centric specification of security requirements and the automatic generation of enforceable securities policies.[2][12] OpenPMF version 2 was designed to bridge the semantic gap between the policies that users manage, and the policies that are technically implemented. At the time of the release of OpenPMF version 2, model-driven security was tied together with a model-driven development process for applications, especially for agile service oriented architecture (SOA).[12]

After years of publishing and presenting the scientific and technical approach, some analyst firms, such as Gartner took note of the scientific approach.[13] Several other awards and recognition followed.[14][15] OpenPMF version 3 was released in 2010, supporting advanced policies, Eclipse, cloud, BPMN,[16] SOA, XACML, pub-sub/DDS, and numerous additional enforcement points.[17] ObjectSecurity also extended their model-driven security approach to include automatic compliance/accreditation analysis and evidence generation[18]

In 2009, ObjectSecurity set up an independent legal entity in California , United States to be closer to their US-based customers.[19]

In recent years, ObjectSecurity has extended OpenPMF to support automatic system detection, automated formal testing,[20] virtual reality support, API server etc., enabling security policy automation without the need to install local agents, and allowing the use of model-driven security without the need for a model-driven development. OpenPMF's support for advanced access control models including proximity-based access control, PBAC was also further extended.[21]

Products

OpenPMF 4.0

In 2017, ObjectSecurity released OpenPMF version 4.0, which includes a new browser-based user interface, cloud support, and numerous other features.[22]

Supply Chain Risk Analysis Automation

In 2019, ObjectSecurity released a beta version of a United States Navy SBIR funded[23] Supply Chain Risk Analysis Management Solution (SCRAMS),[24] which analyzes procurement information from SAP and other sources for anomalies indicating supply chain risks.

Vulnerability Assessment & Pen-Testing Automation (VAPT)

In 2019, ObjectSecurity released an alpha version of a U.S. United States Navy SBIR funded[25] VAPT automation tools,[26] which automatically analyze both IP systems/networks and embedded devices (via non-IP ports) for software vulnerabilities.

OT.AI Platform

In 2022, ObjectSecurity released OT.AI Platform,[27] an Operational Technology / Industrial control system firmware security-assessment platform, aimed to detect Common Vulnerabilities and Exposures at the firmware level for many industrial devices, including PLCs, HMIs, SCADA Systems, etc.

References

  1. "Comapny - ObjectSecurity". https://objectsecurity.com/otai/company/. Retrieved 5 January 2024. 
  2. 2.0 2.1 Atif Memon (editor). Advances in Computers Volume 93. Academic Press (Elseviwer), 2014, ISBN 978-0-12-800162-2, page 113. March 2014. ISBN 9780128003268. https://books.google.com/books?id=OMtUAgAAQBAJ&q=lang+%26+schreiner&pg=PA103. 
  3. "OpenPMF Website". http://www.openpmf.com. 
  4. "Cool Vendors in Application Security and Authentication, 2008". https://www.gartner.com/doc/639714/cool-vendors-application-security-authentication. 
  5. "Finalist at AFWERX Microelectronics Provenance Challenge, 2019". https://objectsecurity.com/afwerx. 
  6. "ObjectSecurity Team Website". http://www.objectsecurity.com/en-contact-team.html. 
  7. "Dr. Lang, Access Policies for Middleware, PhD Thesis". http://www.cl.cam.ac.uk/techreports/UCAM-CL-TR-564.pdf. 
  8. "Ulrich Lang, Rudolf Schreiner. Developing Secure Distributed Systems with CORBA. Artech House Publisher, 2002, ISBN 1-58053-295-0". http://www.artechhouse.com/Main/Books/Developing-Secure-Distributed-Systems-with-CORBA-749.aspx. 
  9. "Gerald Lorang. New Coach platform improves development of distributed applications. Primeur Magazine, 2004". http://www.hoise.com/primeur/04/articles/monthly/AE-PR-09-04-61.html. 
  10. "AD4EU FP6 Project Website". http://ec.europa.eu/research/transport/projects/items/ad4_en.htm. 
  11. "COACH project flyer". http://objectsecurity.com/doc/coachprojectflyer.pdf. 
  12. 12.0 12.1 "The newsletter of LTN's Information & Communications Technologies Special Interest Group 2008, p.4 (PDF hosted by ObjectSecurity, LTN is not operating anymore )". http://objectsecurity.com/doc/LTnetwork-ICT-SIG-newsletter-April-2008-cached.pdf. 
  13. "ObjectSecurity Publications Website". http://www.objectsecurity.com/en-home-resources.html. 
  14. "TeleTrusT Awards". http://www.objectsecurity.com/doc/ISSE%202009-10-07_TeleTrusT%20Innovation%20Award_090930-EN.pdf. 
  15. "University of Cambridge Computer Lab Ring Awards". 23 January 2018. https://www.cl.cam.ac.uk/ring/awards.html. 
  16. "Best of Open Source Software Awards 2009 (mentions the OpenPMF 2.0 integration into the open source Intalio BPMS". 31 August 2009. http://www.infoworld.com/article/2631386/open-source-software/open-source-software-best-of-open-source-software-awards-2009.html?page=2. 
  17. "ObjectSecurity OpenPMF v3 Release". http://www.objectsecurity.com/doc/20100222_openpmf30.pdf. 
  18. "Rudolf Schreiner and Ulrich Lang, "Model Driven Security Accreditation (MDSA) For Agile, Interconnected IT Landscapes", WISG Conference Proceedings 2009". http://csis.gmu.edu/wisg2009/. 
  19. "ObjectSecurity in Palo Alto aims to make security automatic, Silicon Valley Business Journal, 2009". http://www.bizjournals.com/sanjose/stories/2009/07/20/smallb3.html?page=all/. 
  20. "Beta Release Of Access Control Policy Tool, retrieved 2018". 24 May 2016. https://csrc.nist.gov/Projects/Access-Control-Policy-Tool/Beta-Release-Of-Access-Control-Policy-Tool. 
  21. "Proximity Based Access Control SBIR Award Notice, 2013". https://www.sbir.gov/sbirsearch/detail/415285. 
  22. "Launch OpenPMF 4.0 Security Policy Automation and Management Platform." (in en-US). https://objectsecurity.com/blog/2017/02/13/news-release/. 
  23. "Direct to Phase II – Supply Chain Risk Analysis Management Solution (SCRAMS), 2016". https://www.sbir.gov/sbirsearch/detail/1188723. 
  24. "Supply Chain Risk Analysis Management Solution (SCRAMS) website, 2019". https://objectsecurity.com/scrams. 
  25. "Red Team in a Box for Embedded and Non-IP Devices, 2018". https://www.navysbir.com/n18_2/N182-131.htm. 
  26. "WhizRT - VAPTBOX website, 2019". https://objectsecurity.com/vaptbox. 
  27. "OT.AI Platform, 2022". https://objectsecurity.com/otai/.