ObjectSecurity explained

ObjectSecurity
Industry:Information Security
Type:Private
Foundation:UK, California since 2009, Germany since 2017
Founder:Ulrich Lang, Rudolf Schreiner
Location:San Diego, USA and Berlin, Germany
Area Served:Worldwide
Key People:Ulrich Lang (CEO, ObjectSecurity LLC)
Rudolf Schreiner (CEO ObjectSecurity OSA GmbH)
Karel Gardas (Chief Software Engineer)
Holmes Chuang (Principal Software Scientist)
Reza Fatahi (Principal Research Scientist)
Susan Farrell (Head of R&D Commercialization)[1]

ObjectSecurity is an information technology company focusing on information security (model-driven security, fine-grained access control, middleware security), supply chain risk analysis, data analytics, and artificial intelligence. The company pioneered the development of model-driven security,[2] which was mostly an academic concept prior to the company's developments. The company is best known for their OpenPMF (Open Policy Management Framework) model-driven security product,[3] security policy automation product for which the company received a "Cool Vendor" award from Gartner in 2008.[4] In recent years, ObjectSecurity diversified into supply-chain risk-analysis automation for which the company was selected "Finalist" by AFWERX in 2019,[5] and vulnerability assessment & pentesting automation.

History

ObjectSecurity was founded in 2000 by information security experts, Ulrich Lang and Rudolf Schreiner.[6] At that time, Lang was a researcher at the University of Cambridge Computer Laboratory, working on "Access Policies for Middleware", and both were working as independent information security consultants.[7]

Initially, ObjectSecurity was mainly working on customer projects around middleware security, esp. CORBA, but they quickly remarked that it was not possible to author and maintain security configurations for interconnected, distributed application environments. In an attempt to solve this challenges, the team built a full OMG CORBA Security SL3 & SSLIOP open source implementation based on MICO CORBA.[8]

Security Policy Automation

To solve various challenges around implementing secure distributed systems, ObjectSecurity released OpenPMF version 1,[9] at that time one of the first Attribute Based Access Control (ABAC) products in the market. It allowed the central authoring of access rules, and the automatic enforcement across all middleware nodes using local decision/enforcement points. Thanks to the support of several EU funded research projects, ObjectSecurity found that a central ABAC approach alone was not a manageable way to implement security policies.[10] [11]

ObjectSecurity released OpenPMF version 2. It is based on a concept called model-driven security which allows the intuitive, business-centric specification of security requirements and the automatic generation of enforceable securities policies.[12] OpenPMF version 2 was designed to bridge the semantic gap between the policies that users manage, and the policies that are technically implemented. At the time of the release of OpenPMF version 2, model-driven security was tied together with a model-driven development process for applications, especially for agile service oriented architecture (SOA).

After years of publishing and presenting the scientific and technical approach, some analyst firms, such as Gartner took note of the scientific approach.[13] Several other awards and recognition followed.[14] [15] OpenPMF version 3 was released in 2010, supporting advanced policies, Eclipse, cloud, BPMN,[16] SOA, XACML, pub-sub/DDS, and numerous additional enforcement points.[17] ObjectSecurity also extended their model-driven security approach to include automatic compliance/accreditation analysis and evidence generation[18]

In 2009, ObjectSecurity set up an independent legal entity in California, United States to be closer to their US-based customers.[19]

In recent years, ObjectSecurity has extended OpenPMF to support automatic system detection, automated formal testing,[20] virtual reality support, API server etc., enabling security policy automation without the need to install local agents, and allowing the use of model-driven security without the need for a model-driven development. OpenPMF's support for advanced access control models including proximity-based access control, PBAC was also further extended.[21]

Products

OpenPMF 4.0

In 2017, ObjectSecurity released OpenPMF version 4.0, which includes a new browser-based user interface, cloud support, and numerous other features.[22]

Supply Chain Risk Analysis Automation

In 2019, ObjectSecurity released a beta version of a United States Navy SBIR funded[23] Supply Chain Risk Analysis Management Solution (SCRAMS),[24] which analyzes procurement information from SAP and other sources for anomalies indicating supply chain risks.

Vulnerability Assessment & Pen-Testing Automation (VAPT)

In 2019, ObjectSecurity released an alpha version of a U.S. United States Navy SBIR funded[25] VAPT automation tools,[26] which automatically analyze both IP systems/networks and embedded devices (via non-IP ports) for software vulnerabilities.

OT.AI Platform

In 2022, ObjectSecurity released OT.AI Platform,[27] an Operational Technology / Industrial control system firmware security-assessment platform, aimed to detect Common Vulnerabilities and Exposures at the firmware level for many industrial devices, including PLCs, HMIs, SCADA Systems, etc.

Notes and References

  1. Web site: Company - ObjectSecurity. 5 January 2024.
  2. Book: Advances in Computers Volume 93 . 26 February 2014 . Academic Press (Elsevier) . 978-0-12-800162-2 . Memon . Atif M. . 113.
  3. Web site: OpenPMF Website . Object Security.
  4. Web site: Cool Vendors in Application Security and Authentication, 2008 . https://web.archive.org/web/20160304201523/https://www.gartner.com/doc/639714/cool-vendors-application-security-authentication . dead . March 4, 2016 .
  5. Web site: 2019-11-12 . AFMEP: Air Fore Supply Chain Challenge Finalist & ITC 2019 expo . Object Security.
  6. Web site: About Object Security . Object Security.
  7. Web site: Lang . Ulrich . May 2003 . Technical Report (Number 564): Access Policies for Middleware, PhD Thesis . 2024-03-18 . University of Cambridge Computer Laboratory.
  8. Book: Lang . Ulrich . Developing Secure Distributed Systems with COBRA . Schreiner . Rudolf . 1 February 2002 . Artech House Publishers . 9781580532952 . English.
  9. Web site: Lorang . Gerald . 2004 . New Coach platform improves development of distributed applications. in Primeur Magazine . www.hoise.com.
  10. Web site: AD4EU FP6 Project Website .
  11. Web site: COACH project flyer .
  12. Web site: The newsletter of LTN's Information & Communications Technologies Special Interest Group 2008, p.4 (PDF hosted by ObjectSecurity, LTN is not operating anymore).
  13. Web site: ObjectSecurity Publications Website .
  14. Web site: TeleTrusT Awards .
  15. Web site: University of Cambridge Computer Lab Ring Awards . 23 January 2018 .
  16. Web site: Best of Open Source Software Awards 2009 (mentions the OpenPMF 2.0 integration into the open source Intalio BPMS . 31 August 2009 .
  17. Web site: ObjectSecurity OpenPMF v3 Release .
  18. Web site: Rudolf Schreiner and Ulrich Lang, "Model Driven Security Accreditation (MDSA) For Agile, Interconnected IT Landscapes", WISG Conference Proceedings 2009 .
  19. Web site: ObjectSecurity in Palo Alto aims to make security automatic, Silicon Valley Business Journal, 2009 .
  20. Web site: Beta Release Of Access Control Policy Tool, retrieved 2018 . 24 May 2016 .
  21. Web site: Proximity Based Access Control SBIR Award Notice, 2013 .
  22. Web site: Launch OpenPMF 4.0 Security Policy Automation and Management Platform. . 2023-08-25 . ObjectSecurity . en-US.
  23. Web site: Direct to Phase II – Supply Chain Risk Analysis Management Solution (SCRAMS), 2016 .
  24. Web site: Supply Chain Risk Analysis Management Solution (SCRAMS) website, 2019 .
  25. Web site: Red Team in a Box for Embedded and Non-IP Devices, 2018.
  26. Web site: WhizRT - VAPTBOX website, 2019 .
  27. Web site: OT.AI Platform, 2022 .