Summary is AI-generated, newsdesk-reviewed
  • ONEKEY expands platform for comprehensive CVE management, integrating VEX data for enhanced security testing.
  • New features automate vulnerability risk assessment, streamline workflows, and expedite compliance documentation.
  • Integration aids manufacturers with EU Cyber Resilience Act compliance, offering a competitive advantage.

ONEKEY, a cybersecurity company based in Düsseldorf, has expanded its capabilities from primarily identifying software vulnerabilities to a comprehensive solution for managing Common Vulnerabilities and Exposures (CVEs).

This development supports companies in mapping the entire process of handling CVEs—from initial detection and assessment to documented decision-making—within a single workflow for effective evidence retention.

Rising Vulnerability Reports

In 2024, the total number of newly reported vulnerabilities reached over 40,000 CVEs, marking a 38% increase from the previous year.

This surge is making it increasingly challenging for manufacturers of networked devices, systems, and machinery to determine which of their products are impacted by specific CVE disclosures.

Integration of VEX Data

In an effort to tackle these challenges, ONEKEY has announced the incorporation of VEX (Vulnerability Exploitability eXchange) data into its software security testing platform.

Although this integration might seem technical, it brings practical benefits by reducing team workloads, accelerating compliance, and enhancing transparency throughout digital supply chains.

Streamlining Vulnerability Assessments

The newly introduced feature allows businesses to verify which vulnerabilities are significant threats

The newly introduced feature allows businesses to verify which vulnerabilities are significant threats.

It simplifies the documentation required to evaluate whether a vulnerability is pertinent to a product by incorporating information in standardized formats, either individually or as part of a software bill of materials. 

This functionality enables faster, more accurate tracking and reporting by seamlessly integrating with automated workflows and tools.

Automation Over Manual Reviews

Previously, security teams needed to manually assess each reported CVE and justify potential risks, often leading to misunderstandings and time-consuming inquiries from stakeholders.

The new technology standardizes the vulnerability context, providing essential information on whether vulnerabilities can actually be exploited in specific products. Automated and traceable vulnerability assessments are now possible with ONEKEY's platform integration.

Adapting to Regulatory Changes

The integration aligns timely with regulatory shifts such as the EU Cyber Resilience Act (CRA), which mandates increased documentation and resilience against cyberattacks for networked products by the end of 2027.

This act necessitates significant product improvements over a standard development period of two to three years, making ONEKEY's platform expansion a timely solution for manufacturers in meeting CRA requirements.

Benefits for Companies

  • Reduced inquiries from compliance teams, customers, and partners through the provision of standardized data that immediately clarifies vulnerability statuses.
  • Accelerated product certifications and security approvals due to automated and traceable vulnerability documentation.
  • Enhanced competitive positioning by meeting growing demands for digital supply chain transparency.

Jan Wendenburg, CEO of ONEKEY, stated, “We want to give our customers the opportunity not only to find vulnerabilities, but also to prove that their products are secure. With the new integration, we are automating the risk assessment process and helping our customers use their time for strategic rather than administrative tasks.”

Enhancing Platform Capabilities

ONEKEY's expansion is a strategic move to extend the platform's functionality

ONEKEY's expansion is a strategic move to extend the platform's functionality beyond just spotting software vulnerabilities, to encompass comprehensive CVE management options, including prioritization and risk documentation.

"Structured and automated vulnerability management is one of the most important issues for manufacturers of digital products," Wendenburg elaborated, drawing from numerous customer consultations.

Demand for Sophisticated Functions

With the daily emergence of over 100 CVEs, product ranges face significant uncertainty intensified by strict compliance requirements, resulting in considerable pressure on firms.

Wendenburg highlighted their fall focus on addressing increased functionality demands to aid digital product manufacturers in tackling cybersecurity challenges.

Pioneering In Product Cybersecurity and Compliance

As a key player in the sector, ONEKEY is within PricewaterhouseCoopers Germany's investment framework, combining its automated Product Cybersecurity & Compliance Platform (OCP) with expert services for a swift, detailed approach to enhancing product cybersecurity from inception to end-of-life.

Advanced Technological Features

Critical vulnerabilities and compliance violations can rapidly be detected in firmware through AI-based technology, eliminating the need for source codes or devices.

The use of automated Software Bills of Materials (SBOMs) allows companies to audit their software supply chains proactively. Additionally, 24/7 cybersecurity monitoring is enabled by "Digital Cyber Twins," and the ONEKEY Compliance Wizard, covering regulations such as the EU CRA and several others, ensures robust compliance management.

Product Security Incident Response

ONEKEY aids Product Security Incident Response Teams by automatically prioritizing vulnerabilities, hence significantly shortening remediation timelines. Many international firms in Asia, Europe, and the Americas already benefit from the platform, leveraging both ONEKEY's cybersecurity expertise and its compliance solutions.

Discover how AI, biometrics, and analytics are transforming casino security

In case you missed it

What Are Emerging Applications For Physical Security In Transportation?
What Are Emerging Applications For Physical Security In Transportation?

Transportation systems need robust physical security to protect human life, to ensure economic stability, and to maintain national security. Because transportation involves moving...

Gallagher's Perimeter Solutions With Fortified Partnership
Gallagher's Perimeter Solutions With Fortified Partnership

Global security manufacturer Gallagher Security is proud to announce a strategic partnership with Fortified Security, a pioneering perimeter systems integrator with over 30 years o...

Genetec's Role In Data Sovereignty For Security
Genetec's Role In Data Sovereignty For Security

Genetec Inc., the global pioneer in enterprise physical security software, highlights why data sovereignty has become a central concern for physical security leaders as more survei...