Overview
All existing approaches to application security focus on the vulnerabilities in your programs.
Both approaches share the same flaw: they are blind to the vulnerabilities that remain hidden until they are exploited.
This focus on threat vectors leaves you exposed to zero-day attacks.
Program Behavior Intelligence solves this problem.
Rather than focusing on the threat vector, PBI focuses on the behavior of your program.
By understanding and enforcing only the behavior you expect, you solve the problem of a zero-day attack.
There are two unique solutions within the PBI framework.
PBI Explainer™ enables you to identify, vector and document all program behavior, including behaviors that are hidden.
PBI Enforcement™ enables the enforcement of only expected behaviors during runtime application, against a pre-defined and learned model of such behaviors.
PBI Explainer™
Modern software relies heavily on open-source libraries, but the scale, opacity, and constant change of these mean many vulnerabilities remain hidden.
Traditional supply chain tools, such as SCA and SAST, only detect known threats, or patterns relating to known threats.
They tell you what code you have, not what it is doing, and therefore remain blind to novel or undiscovered vulnerabilities.
At the core of PBI Explainer is our Model Explainer™, which closes this critical security gap in three simple steps:
- It maps real program behavior using your test cases and normal use.
- It creates a defensible baseline of expected actions that can flag any subsequent behaviors that fall outside of this.
- It delivers a complete and accurate Software Bill of Materials.
PBI Enforcement™
At the heart of PBI Enforcement is our Behavior Enforcement Engine™ (BEE), which comprises two distinct modes of operation: Training Mode and Protection Mode.
Training Mode
Behavior Enforcement Engine integrates seamlessly and easily into your existing testing and QA process. It observes how your software behaves, recording every legitimate function call, interaction, and system response. This creates a behavioral model of your program that is contextual to both the functions being executed and the operating environment it is running in. This whitelist of approved actions is therefore unique to you. The process is simple, transparent, and repeatable, with no rules to write and no manual tuning. Once created, the model can be reused across deployments and environments. Even incomplete test suites are supported. The BEE continues to learn during what we call captive normal use, when the program runs safely in production like conditions without exposure to attack. The result is a deterministic behavioral model that defines exactly how your program has been observed to operate.Protection Mode
Once trained, BEE enters Runtime Protection Mode, continuously validating future program behavior before it happens. Every action is checked against the model. Expected behavior runs normally. Anything outside the trained parameters triggers a user configurable intervention. Remediation aligns with your risk tolerance and operational goals and can include silent logging, alerting, restarting the process, executing a recovery routine or a combination of these. BEE operates deterministically so every action is consistent, auditable, and repeatable. This delivers continuous protection that stops both known and unknown attacks, including zero-day exploits, before they can execute. By enforcing only expected behavior, PBI Enforcement ensures your software only does exactly what it was designed to do, and nothing else.Client Profile
PBI represents a true paradigm shift in software protection. We can help you if:
- You are concerned about the vulnerabilities that open-source code exposes you to, the risk of rogue programmers, and AI-driven exploit generation.
- You have at least reasonably good software hygiene, i.e. you have an established software testing processes.
- You are running software written in either Java, JavaScript or Python