Software supply chain security vendor claims to have discovered that true, non-agent-based runtime vulnerability analysis is possible by harnessing cloud APIs. Credit: Roman Samborskyi / Shutterstock Software supply chain security vendor Rezilion has announced the release of a new agentless solution for vulnerability management. It enables security teams to monitor exploitable software attack surfaces in runtime without using an agent, reducing the time and overhead required for traditional runtime-based software vulnerability analysis, according to the firm. Rezilion’s new solution covers all versions of Windows and Linux across 12 code languages, it said.Effective prioritization and remediation of software vulnerabilities can be a significant challenge for organizations, with attackers increasingly targeting software supply chains to exploit weaknesses. The State of Vulnerability Management in DevSecOps report revealed that organizations are losing thousands of hours in time and productivity dealing with backlogs of vulnerabilities that they have neither the time or resources to tackle effectively. More than half of 634 IT and IT security practitioners said their backlog consists of more than 100,000 vulnerabilities and the average number of vulnerabilities in backlogs overall is 1.1 million, according to the data.Meanwhile, the 2023 Unit 42 Network Threat Trends Research Report revealed a 55% increase in the exploitation of vulnerabilities in 2022 compared to 2021. Recently, a software vulnerability in MOVEit Transfer, a managed file transfer service, caused shockwaves after it was widely exploited by hackers to target organizations across the globe. Non-agent-based runtime analysis possible by harnessing cloud APIsAlthough the software vulnerability risks and management challenges companies face are significant, many vulnerabilities are not actually exploitable in runtime, Rezilion said in a press release. Vulnerability prioritization using runtime data can reveal which vulnerabilities are exploitable depending on a user’s unique environment, helping to reduce vulnerability management “noise” by detecting which specific components need patching, and which don’t. However, an agent has always been needed to get this visibility into the runtime, which can represent operational risks and overheads, according to Rezilion. Its introduction of an agentless solution that can see into the runtime execution of software and determine which components are vulnerable/exploitable in the runtime context – which the vendor claims is a first – allows customers to ensure software security in production and continuous integration from the convenience of a single platform without interfering with product performance, additional code, or agent execution, Rezilion said.It took Rezilion years of research to discover that true, non-agent-based runtime analysis is possible by using cloud APIs’ indirect access to instances to reconstruct the execution of code along the lifecycle of hosts and containers, said Shlomi Boutnaru, co-founder and CTO at Rezilion. “This means we can now look at a snapshot of a host or a container and use proprietary forensic methods to reverse-engineer from it the entire code loading and execution history – without actually needing to be there with an agent as it happened.” Related content feature Whitelisting explained: How it works and where it fits in a security program Whitelisting locks down computers so only approved applications can run. Is the security worth the administrative hassle? By Josh Fruhlinger and CSO Staff Jun 07, 2024 10 mins Email Security Application Security Data and Information Security interview How Amazon CISO Amy Herzog responds to cybersecurity challenges Amazon CISO for devices and advertising products and services describes how her team works with product and devops teams to ensure products are cybersecure. By David Strom Jun 07, 2024 5 mins Security Practices Vulnerabilities Security news FBI offers to share 7,000 LockBit ransomware decryption keys with CISOs It’s not clear how many of the decryption keys are still viable, but it’s likely to be a boon for many enterprise victims who did not pay the ransom. By Evan Schuman Jun 06, 2024 4 mins Ransomware how-to Download our password managers enterprise buyer’s guide While it may seem counterintuitive to entrust security to a single password manager app accessed by a single password, using a password manager is in fact a very good idea. Here’s what you need to know to choose a password manager for your busi By Josh Fruhlinger and Tim Ferrill Jun 06, 2024 1 min Password Managers Enterprise Buyer’s Guides PODCASTS VIDEOS RESOURCES EVENTS SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe