SecurityInformed.com
  • Products
    Video Surveillance
    • Surveillance cameras
    • Video Surveillance software
    • IP cameras
    • Digital video recorders (DVRs)
    • Dome cameras
    • Network Video Recorders (NVRs)
    • IP Dome cameras
    • Security camera lenses
    Access Control
    • Access control readers
    • Access control software
    • Access control controllers
    • Access control systems & kits
    • Intercom Systems
    • Electronic lock systems
    • Access control cards/ tags/ fobs
    • Access control accessories
    Intruder Alarms
    • Intruder alarm system control panels & accessories
    • Intruder detectors
    • Intruder alarm warning devices
    • Intruder alarm communicators
    • Intruder alarm accessories
    • Intruder alarm lighting systems
    Enhancing Physical Access Control Using A Self-Service Model
    Enhancing Physical Access Control Using A Self-Service Model
    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

  • Companies
    Companies
    • Manufacturers
    • Distributors
    • Resellers / Dealers / Reps
    • Installers
    • Consultants
    • Systems integrators
    • Events / Training / Services
    • Manned guarding
    Companies by Product area
    • CCTV
    • Access control
    • Intruder alarm
    • IP networking products
    • Biometrics
    • Software
    • Digital video recording
    • Intercom systems
    Enhancing Physical Access Control Using A Self-Service Model
    Enhancing Physical Access Control Using A Self-Service Model
  • News
    News
    • Product news
    • Corporate news
    • Case studies
    • Events news
    Latest
    • Suprema BioStation 3 Sets Sales Record In Security Market
    • A Landmark Gathering Shaping The Future Of Real Estate, Investment, Sustainability & Design
    • IDIS Launches New AI PTZ Cameras With NIR Performance
    • Leuze AI Boosts Optical Distance Sensor Accuracy
    Enhancing Physical Access Control Using A Self-Service Model
    Enhancing Physical Access Control Using A Self-Service Model
  • Insights
    Insights
    • Expert commentary
    • Security beat
    • Round table discussions
    • Round Table Expert Panel
    • eMagazines
    • Year in Review 2023
    • Year in Review 2022
    Featured
    • What Are Emerging Applications For Physical Security In Transportation?
    • What Is the Most Overlooked Factor When Installing Security Systems?
    • Amid Rising Certificate Demands, Stricter Compliance And Quantum Threats, PKIaaS Is A Necessity
    • How Should Security Adapt To The Unique Aspects Of Healthcare?
    Enhancing Physical Access Control Using A Self-Service Model
    Enhancing Physical Access Control Using A Self-Service Model
  • Markets
    Markets
    • Airports & Ports
    • Banking & Finance
    • Education
    • Hotels, Leisure & Entertainment
    • Government & Public Services
    • Healthcare
    • Remote Monitoring
    • Retail
    • Transportation
    • Industrial & Commercial
    Enhancing Physical Access Control Using A Self-Service Model
    Enhancing Physical Access Control Using A Self-Service Model
    Alamo Colleges Boosts Safety With Alcatel-Lucent OmniSwitch Platform

    Alamo Colleges Boosts Safety With Alcatel-Lucent OmniSwitch Platform

    HID Mobile Access Enhances University Of Dundee Campus

    HID Mobile Access Enhances University Of Dundee Campus

    ASSA ABLOY Aperio Wireless Locks At The Camp: Secure & Sustainable

    ASSA ABLOY Aperio Wireless Locks At The Camp: Secure & Sustainable

    SBB Secures Perimeters With Hanwha Vision Cameras

    SBB Secures Perimeters With Hanwha Vision Cameras

  • Events
    Events
    • International security
    • Regional security
    • Vertical market
    • Technology areas
    • Conferences / seminars
    • Company sponsored
    Virtual events
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Security Storage
    • Video Management Systems
    • Integrated Systems
    Enhancing Physical Access Control Using A Self-Service Model
    Enhancing Physical Access Control Using A Self-Service Model
    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Technology Summit International 2025

    Technology Summit International 2025

    G2E Philippines 2025

    G2E Philippines 2025

    IFSEC India 2025

    IFSEC India 2025

  • White papers
    White papers
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Video Compression
    • Security Storage
    White papers by company
    • HID
    • ASSA ABLOY Opening Solutions
    • Milestone Systems
    • Eagle Eye Networks
    • Hanwha Vision America
    Other Resources
    • eMagazines
    • Videos
    One System, One Card

    One System, One Card

    Aligning Physical And Cyber Defence For Total Protection

    Aligning Physical And Cyber Defence For Total Protection

    Understanding AI-Powered Video Analytics

    Understanding AI-Powered Video Analytics

    Modernizing Access Control

    Modernizing Access Control

About us Advertise
  • Self-Service Access Control
  • AI special report
  • Cybersecurity special report
  • 6
Cloud security
  • Home
  • About
  • White papers
  • News
  • Expert commentary
  • Security beat
  • Case studies
  • Round table
  • Products
  • Videos

Check Out Our Special Report On Casino Security

Get it now!

ONEKEY Expands Platform For CVE Management

29 Oct 2025

ONEKEY Expands Platform For CVE Management
Contact company
Contact ONEKEY
icon Add as a preferred source Download PDF version
Quick Read
⌵
Summary is AI-generated, newsdesk-reviewed
  • ONEKEY expands platform for comprehensive CVE management, integrating VEX data for enhanced security testing.
  • New features automate vulnerability risk assessment, streamline workflows, and expedite compliance documentation.
  • Integration aids manufacturers with EU Cyber Resilience Act compliance, offering a competitive advantage.

ONEKEY, a cybersecurity company based in Düsseldorf, has expanded its capabilities from primarily identifying software vulnerabilities to a comprehensive solution for managing Common Vulnerabilities and Exposures (CVEs).

This development supports companies in mapping the entire process of handling CVEs—from initial detection and assessment to documented decision-making—within a single workflow for effective evidence retention.

Rising Vulnerability Reports

In 2024, the total number of newly reported vulnerabilities reached over 40,000 CVEs, marking a 38% increase from the previous year.

This surge is making it increasingly challenging for manufacturers of networked devices, systems, and machinery to determine which of their products are impacted by specific CVE disclosures.

Integration of VEX Data

In an effort to tackle these challenges, ONEKEY has announced the incorporation of VEX (Vulnerability Exploitability eXchange) data into its software security testing platform.

Although this integration might seem technical, it brings practical benefits by reducing team workloads, accelerating compliance, and enhancing transparency throughout digital supply chains.

Streamlining Vulnerability Assessments

The newly introduced feature allows businesses to verify which vulnerabilities are significant threats

The newly introduced feature allows businesses to verify which vulnerabilities are significant threats.

It simplifies the documentation required to evaluate whether a vulnerability is pertinent to a product by incorporating information in standardized formats, either individually or as part of a software bill of materials. 

This functionality enables faster, more accurate tracking and reporting by seamlessly integrating with automated workflows and tools.

Automation Over Manual Reviews

Previously, security teams needed to manually assess each reported CVE and justify potential risks, often leading to misunderstandings and time-consuming inquiries from stakeholders.

The new technology standardizes the vulnerability context, providing essential information on whether vulnerabilities can actually be exploited in specific products. Automated and traceable vulnerability assessments are now possible with ONEKEY's platform integration.

Adapting to Regulatory Changes

The integration aligns timely with regulatory shifts such as the EU Cyber Resilience Act (CRA), which mandates increased documentation and resilience against cyberattacks for networked products by the end of 2027.

This act necessitates significant product improvements over a standard development period of two to three years, making ONEKEY's platform expansion a timely solution for manufacturers in meeting CRA requirements.

Benefits for Companies

  • Reduced inquiries from compliance teams, customers, and partners through the provision of standardized data that immediately clarifies vulnerability statuses.
  • Accelerated product certifications and security approvals due to automated and traceable vulnerability documentation.
  • Enhanced competitive positioning by meeting growing demands for digital supply chain transparency.

Jan Wendenburg, CEO of ONEKEY, stated, “We want to give our customers the opportunity not only to find vulnerabilities, but also to prove that their products are secure. With the new integration, we are automating the risk assessment process and helping our customers use their time for strategic rather than administrative tasks.”

Enhancing Platform Capabilities

ONEKEY's expansion is a strategic move to extend the platform's functionality

ONEKEY's expansion is a strategic move to extend the platform's functionality beyond just spotting software vulnerabilities, to encompass comprehensive CVE management options, including prioritization and risk documentation.

"Structured and automated vulnerability management is one of the most important issues for manufacturers of digital products," Wendenburg elaborated, drawing from numerous customer consultations.

Demand for Sophisticated Functions

With the daily emergence of over 100 CVEs, product ranges face significant uncertainty intensified by strict compliance requirements, resulting in considerable pressure on firms.

Wendenburg highlighted their fall focus on addressing increased functionality demands to aid digital product manufacturers in tackling cybersecurity challenges.

Pioneering In Product Cybersecurity and Compliance

As a key player in the sector, ONEKEY is within PricewaterhouseCoopers Germany's investment framework, combining its automated Product Cybersecurity & Compliance Platform (OCP) with expert services for a swift, detailed approach to enhancing product cybersecurity from inception to end-of-life.

Advanced Technological Features

Critical vulnerabilities and compliance violations can rapidly be detected in firmware through AI-based technology, eliminating the need for source codes or devices.

The use of automated Software Bills of Materials (SBOMs) allows companies to audit their software supply chains proactively. Additionally, 24/7 cybersecurity monitoring is enabled by "Digital Cyber Twins," and the ONEKEY Compliance Wizard, covering regulations such as the EU CRA and several others, ensures robust compliance management.

Product Security Incident Response

ONEKEY aids Product Security Incident Response Teams by automatically prioritizing vulnerabilities, hence significantly shortening remediation timelines. Many international firms in Asia, Europe, and the Americas already benefit from the platform, leveraging both ONEKEY's cybersecurity expertise and its compliance solutions.

Discover how AI, biometrics, and analytics are transforming casino security

Show full press release

Düsseldorf-based cybersecurity company ONEKEY has expanded its platform from a major solution for detecting software vulnerabilities to a fully-fledged environment for vulnerability management.

This enables companies to map the entire process of dealing with so-called “Common Vulnerabilities and Exposures” (CVEs) – from detection and assessment to documented decision-making – in a single workflow that can serve as evidence.

Background: In 2024, the number of newly reported vulnerabilities peaked at over 40,000 CVEs, a 38 percent increase on the previous year. Such a high volume makes it increasingly difficult for manufacturers of networked devices, machines, and systems to keep track of which of their products are specifically affected by a CVE report.

Integration of VEX data

To address this issue, ONEKEY has announced the integration of VEX (Vulnerability Exploitability eXchange) data into its device software security testing platform as part of its management platform alignment.

Although this step may appear technical at first, it is significant: it reduces team workload, accelerates compliance, and improves transparency across the digital supply chain.

New feature

The new feature enables companies to prove that not every vulnerability poses a risk. Not only does it document whether a vulnerability is relevant to the product in question, it also justifies this in a standard format, either individually or embedded in a software bill of materials.

These documents can easily be integrated into automated workflows and tools. This makes tracking and reporting vulnerabilities faster, easier, and more accurate

Automation instead of manual review

Until now, security teams had to manually evaluate each reported CVE vulnerability and justify why it might not pose a risk to the product in question. This often resulted in misunderstandings and time-consuming queries from customers, regulators, and partners.

The new technology solves this problem by standardizing the context of a vulnerability. It provides the crucial information on whether a known vulnerability in a specific product can actually be exploited. Through integration into the ONEKEY platform, these vulnerability decisions can now be automated and made traceable.

Competitive advantage

The new integration arrives just in time: The EU Cyber Resilience Act (CRA) stipulates that, in future, manufacturers of networked devices, machines, and systems must significantly increase and document the resilience of their products against cyberattacks.

Adopted in 2024, the CRA will come into full effect at the end of 2027, at which point all connected products offered on the EU market must meet CRA requirements. Given that product development takes two to three years on average, the current expansion of the ONEKEY platform will be of great benefit to manufacturers.

The advantages for companies at a glance:

  • Fewer queries from compliance, customers, and partners: Standardized data provides immediate clarity on the status of vulnerabilities and reduces manual communication processes.
  • Faster certifications and security approvals: Automated and traceable documentation of vulnerabilities allows products to be certified and approved more quickly.
  • Competitive advantage: With this integration, ONEKEY offers customers a solution that meets the growing demand for transparency in the supply chain.

“We want to give our customers the opportunity not only to find vulnerabilities, but also to prove that their products are secure,” explained Jan Wendenburg, CEO of ONEKEY. “With the new integration, we are automating the risk assessment process and helping our customers use their time for strategic rather than administrative tasks.”

ONEKEY strategy

The new integration is part of ONEKEY's corporate strategy to expand the functionality of its security platform beyond simply identifying software vulnerabilities to include additional options for comprehensive CVE management.

This includes prioritization and documentation to demonstrate whether a vulnerability has been resolved or is irrelevant in the given environment.

“Structured and automated vulnerability management is one of the most important issues for manufacturers of digital products,” said Jan Wendenburg, based on numerous customer discussions.

Growing demand for appropriate functions

With more than 100 new CVEs emerging daily, the implications for product ranges remain unclear. Combined with increasingly strict legal compliance requirements, this has led to considerable uncertainty and, in some cases, excessive demands.

“That's why this fall we are focusing on meeting the growing demand for appropriate functions, to help manufacturers of digital products address the issue of cybersecurity,” said Jan Wendenburg, explaining the ONEKEY strategy. “This marks the transition from pure vulnerability detection to an environment for complete management.”

Product cybersecurity & compliance management

ONEKEY is the major European specialist in product cybersecurity & compliance management and part of the investment portfolio of PricewaterhouseCoopers Germany (PwC).

The unique combination of the automated ONEKEY Product Cybersecurity & Compliance Platform (OCP) with expert knowledge and consulting services provides fast and comprehensive analysis, support, and management to improve product cybersecurity and compliance from product purchasing, design, development, production to end-of-life.

Critical vulnerabilities and compliance violations

Critical vulnerabilities and compliance violations in device firmware are automatically identified in binary code by AI-based technology in minutes – without source code, device, or network access.

Proactively audit software supply chains with integrated Software Bills of Materials (SBOMs) generation. "Digital Cyber Twins" enable automated 24/7 post-release cybersecurity monitoring throughout the product lifecycle.

The patent-pending, integrated ONEKEY Compliance Wizard already covers the EU Cyber Resilience Act (CRA) and requirements according to IEC 62443-4-2, ETSI EN 303 645, UNECE R 155 and many others.

Product Security Incident Response Team

The Product Security Incident Response Team (PSIRT) is effectively supported by the integrated automatic prioritisation of vulnerabilities, significantly reducing the time to remediation.

Major international companies in Asia, Europe and the Americas already benefit from the ONEKEY Product Cybersecurity & Compliance Platform (OCP) and ONEKEY Cybersecurity Experts.

Download PDF version Download PDF version
Google logo Add as a preferred source on Google
  • Network / IP
  • Biometrics
  • Cyber security
  • Cloud security
  • Related links
  • Dual Technology Detectors Intruder detectors
  • Biometric Access control software
  • Quad Technology Detectors Intruder detectors
  • Control Software Video Surveillance software
  • Detection Software Video Surveillance software
  • IP Surveillance Software Video Surveillance software
  • Proximity Access control software
  • Smart Card Access control software
  • Centrally managed access solution Access control software
  • Combined online/offline solution Access control software
  • Related categories
  • Video Surveillance software
  • Access control software
  • Intruder detectors
Related white papers
Milestone Cloud Deployment Guide

Milestone Cloud Deployment Guide

Download
Maximizing Enterprise Security Systems In The Cloud

Maximizing Enterprise Security Systems In The Cloud

Download
Using Artificial Intelligence (AI) To Automate Physical Security Systems

Using Artificial Intelligence (AI) To Automate Physical Security Systems

Download
Related articles
Abnormal AI Leads 2025 Gartner Magic Quadrant For Security

Abnormal AI Leads 2025 Gartner Magic Quadrant For Security

DigiCert's 2026 Security Predictions: AI & Quantum

DigiCert's 2026 Security Predictions: AI & Quantum

Zimperium's ClayRat Spyware: New Android Threats

Zimperium's ClayRat Spyware: New Android Threats

Follow us

Sections Products Video Surveillance Access Control Intruder Alarms Companies News Insights Case studies Markets Events White papers Videos AI special report Cybersecurity special report RSS
Topics Artificial intelligence (AI) Mobile access Healthcare security Cyber security Counter terror Robotics Thermal imaging Intrusion detection Body worn video cameras
About us Advertise About us 10 guiding principles of editorial content FAQs eNewsletters Sitemap Terms & conditions Privacy policy and cookie policy Californian Residents (CCPA)
  1. Home
  2. Topics
  3. Cloud security
  4. News
  5. Product news
About this page

ONEKEY expands its platform to streamline CVE management, integrating VEX data to automate risk assessments and enhance product cybersecurity, compliance, and transparency for companies dealing with Common Vulnerabilities and Exposures.

Subscribe to our Newsletter

Stay updated with the latest trends and technologies in the security industry
Sign Up

DMA

SecurityInformed.com - Making The World A Safer Place
Copyright © Notting Hill Media Inc. 2000 - 2025, all rights reserved

Our other sites:
SourceSecurity.com | TheBigRedGuide.com | HVACinformed.com | MaritimeInformed.com | ElectricalsInformed.com

Subscribe to our Newsletter


You might also like
Security And Surveillance Technologies For The Casino Market
Security And Surveillance Technologies For The Casino Market
Modernizing Access Control
Modernizing Access Control
Addressing Cybersecurity Vulnerabilities In The Physical World
Addressing Cybersecurity Vulnerabilities In The Physical World
Enhancing Physical Access Control Using A Self-Service Model
Enhancing Physical Access Control Using A Self-Service Model
Sign up now for full access to SecurityInformed.com content
Download Datasheet
Download PDF Version
Download SecurityInformed.com product tech spec