FACT for Asset Owners

Continuous assurance of your software supply chain

Computer monitor showing a screenshot of the FACT Portal

Do you know the security profile of your software suppliers? Do they provide SBOMs?

The software supply chain problem

If you work in a high tech market — such as Energy, Oil & Gas, Manufacturing, Medical, or Aerospace — your company probably has hundreds of “smart" systems that provide vital control or data collection functions every minute of every day.

Each of these systems contains hundreds of "smart" devices. And each of these devices contains multiple software, firmware, and configuration files.

So you probably have thousands of different files — sourced from hundreds of different vendors, consultants, and staff — that all must be valid and secure to run your factory (or patient care system or aircraft) safely. These complex dependencies are your software supply chain.

If cybercriminals or hostile governments can trick your staff into installing a modified version of just one of these files, then your company secrets, your operations, and your team are all at risk.

Managing firmware and software in “smart” devices is complicated. Most companies use products from a variety of different suppliers, each offering a different way of delivering and installing updates. Upgrade workflows involve numerous staff roles dependent on location and function. And traditional IT controls, such as code signing, are rarely an option — especially on legacy devices.

Secure your software supply chain from cyberattacks

FACT simplifies software upgrade processes and makes them more secure and reliable.

When your team receives a file from any source — the web, a USB drive, a contractor — they can use FACT to ensure the file is identical to the original. We also assign the file an easy-to-use trust score. The trust score will let you know if we've detected any security issues like vulnerabilities, malware, or improperly signed certificates, and you can drill down to find more details.

aDolus works directly with equipment vendors to collect "fingerprints" of original files before they are released to the market. We also dig deep into each file's structure to determine if any subcomponents contain known vulnerabilities or malware issues.

Finally, FACT's role management and reporting features give you full visibility into the software and firmware being deployed on your most critical systems. Trust scores help you make and enforce policies regarding which files should not be installed on critical systems.

You decide exactly what software, firmware, or configurations meet your company's requirements.

Computer monitor showing a screenshot of the FACT Portal

Are your upgrade and patching processes secure and reliable?

aDolus FACT Supply Chain Assurance

FACT Keeps Your
System Safe

Are your upgrade and patching processes secure and reliable?

Manage Development & Deployment Risk

FACT gives you visibility and control over firmware and software deployment on critical systems with enriched SBOMs.

Manage Support Ops & Distribution Chain Risk

FACT provides independent validations that the software you’ve got is authentic, tamper-free and safe to install on critical.