Xmaze IAST

XmazeIAST Interactivate Application Security Testing Platform

Next-Gen interactive application security testing platform driven by the AI code vaccine tech

Apply for Trial

Add a small xmirror
Answer your questions

Earlier Security Empowerment

The Xmaze IAST gray box security testing platform is the world's first interactive application security testing platform that utilizes code vaccine technology for transparent crowd-sourced security testing. It seamlessly integrates into existing IT workflows,automates security testing before business code deployment,focuses on addressing over 90% of medium-to-high risk vulnerabilities,and prevents applications from deploying with vulnerabilities,thus ensuring secure operations in the development phase of digital supply chains.

The Evolution of AST

The use of DevOps development model has accelerated the development of projects from monthly to weekly, daily, and even hourly frequencies. However, traditional SAST(static application security testing) and DAST (dynamic application security testing), manual penetration testing, manual code inspection, etc. Cannot keep up with the speed and scale of modern software development and deployment.
Today, IAST (interactive security testing) technology, which is selected as one of the top ten information security technologies by Gartner, combines the advantages of SAST and DAST, while ensuring low false alarm rate and high detection rate. The characteristics of gray box testing enable IAST to be effectively applied to the entire process from development to production, allowing security testing to be seamlessly integrated with SDLC.

False Positive Rate Detection Rate Detection Speed Third-party Component Vulnerabilities Language Support Framework Support Vulnerability Verification and Exploitation Risks of Use Cost Vulnerability Details CI/CD Support
DAST Low Middle Depending on the URL and Payload Quantity Depends on Payload and Fingerprint No Language Distinction No Framework Distinction Verifiable Exploitation Dirty Data, Large Traffic Lower Parameters, Request and Response Low
SAST High High With the Amount of Code Static Scanning Support Differentiate between Different Languages Certain Degree of Distinction Difficult to Verify Exploitation None High, Manual Troubleshooting of False Positives Lines of Code, Execution Flow High
IAST Very Low High Rely on Click Traffic for Real-time Detection Operational Scan Differentiate between Different Languages Certain Degree of Distinction Verifiable Exploitation None Low, Basically no False Alarms Request Response, Lines of Code, Data Flow High

Code Vaccine Endogenous Immunity

All in One

Based on the code vaccine technology pioneered by Xmirror Xmaze IAST relies on a single intelligent probe to integrate SCA, RASP, DRA, APM and other capabilities. With only one deployment, it can solve the long-term risks of applications such as security vulnerabilities, data leakage, operation anomalies, 0day attacks, etc., while reducing the pressure of multi-probe operation and maintenance. At the same time, it injects intelligent risk detection and active defense logic into digital applications at runtime, and integrates it with the application carrier like a vaccine, enabling it to self-discover potential risks and self-immunity to unknown threats, realizing the symbiosis of application and security.
IAST
Interactive Application
Security Testing
SCA
Software Composition Analysis
RASP
Runtime Application
Self-protection
DRA
Data Risk Assessment
API Analytics
APM
Application Performance Monitoring
Apply bug
Hotfixes

Comprehensive Vulnerability Detection

As the earliest started, fastest growing, most mature and largest IAST tool in China, Xmaze IAST has unique full-scenario multi-mode vulnerability detection technology that can comprehensively cover vulnerability scenarios and deeply explore security defects and vulnerabilities that are difficult to find with other testing tools from multiple angles; it can judge vulnerabilities based on comprehensive analysis of requests, codes, data flows and control flows, with high accuracy and extremely low false alarm rate; it provides specific positioning information during detection to help developers quickly locate and fix problems, reducing the time and cost of repair.

Multi-source Supply Chain Risk Management in Depth

Xmaze IAST can accurately detect dynamically loaded third-party components and dependencies during the actual operation of the application, identify security vulnerabilities of introduced open source components and open source license risks, and provide reliable suggestions on the difficulty of;
exploiting the vulnerabilities and the compatibility of licenses; supports the import and export of SBOM lists to quickly establish a supply chain asset database;
Connects to XSBOM supply chain security intelligence to realize the process of automated intelligence acquisition-vulnerability detection-vulnerability verification-vulnerability protection.

In-depth Data Security

Xmaze IAST can track the entire life cycle of sensitive data generation-processing-flow-output-storage-destruction between applications, obtain detailed information such as call time, call source, request and response of interfaces containing sensitive information, and associate the results with the API; support flexible definition of sensitive data detection rules, and support classified and graded data security governance, combined with link topology diagrams, to visually display the transmission path of sensitive data and vulnerability risks.

Senseless Process Integration

Xmaze IAST is designed for non-security experts such as R&D, testing, operation and maintenance. Its simple and easy-to-use interface and automated detection capabilities allow anyone to quickly get started and become a security expert. IAST can be integrated into third-party vulnerability management and project management platforms such as Xfuse, Jira、Jenkins. It does not change the original workflow or add additional work content, enabling security novices to obtain security test results while completing functional tests. It helps enterprises improve their security capabilities efficiently and effortlessly, and practice DevSecOps easily.

Clients

The original, patented third-generation DevSecOps digital supply chain security management system, incorporating an "end-to-end digital supply chain security empowerment platform + agile security tool chain + supply chain threat intelligence services," Innovatively empowers users across various industries such as finance, connected vehicles, telecommunications, energy, government, smart manufacturing, and the broader Internet sector. This system builds a symbiotic and proactive defense framework that adapts to business elasticity, supports agile business delivery, and guides future architectural evolution, continuously safeguarding the security of china's digital supply chain.

        Partners

        Together with our partners, we are exploring a billion-dollar blue ocean market, jointly driving the implementation of DevSecOps digital supply chain security practices for enterprises, and fostering a symbiotic relationship between business growth and security.

        Comments

        Awards

        • China Top 50 Technology Companies

        • Forrester

          SCA、SAST Evaluated Vendors

        • International Data Corporation

          China DevSecOps Innovators

        • Gartner

          SCA Evaluated Vendors

        • CDM Group

          Next-Gen in Open-Source Security

        • Business Intelligence Group

          BIG Innovation Award

        • Internet Security Conference

          The Top 10 Innovators of the Year

        • China Academy of Information and Communications Technology

          Software Supply Chain Famous Achievement Cases

        Certifications

        • National high-tech enterprise

        • CNNVD compatibility certification

        • CAPPVD vulnerability library support unit

        • Intellectual Property Management System Certification

          ddd

        • Beijing Intellectual Property Pilot Unit

        • International Quality Management System Certification

          ISO9001

        • International Information Technology Service Management System

          ISO20000

        • International Information Security Management System

          ISO27001

        Threat governance from the application source, building a new generation of Digital Supply Chain Security system

        顾问小镜

        悬镜安全

        在线咨询

        CHAT WITH US