Black Duck debuts U.S. encryption compliance
Software can search source code for munitions-level crypto
IDG News Service - Black Duck Software Inc. is extending the scope of its compliance management offerings with a new product to handle U.S. export encryption requirements.
Available Monday, the company's exportIP software will enable users to search their source code to identify any encryption algorithms and ascertain whether the encryption complies with rules enforced by the U.S. Department of Commerce's Bureau of Industry and Security (BIS).
The rules forbid the export of powerful encryption algorithms to Cuba, Iran, North Korea, Sudan and Syria. The BIS can impose serious penalties on companies violating those rules including fines and a denial of export privileges.
Black Duck is launching exportIP at the Update 2006 Conference on Export Controls and Policy which is being hosted by the BIS and taking place in Washington through Tuesday.
"We're helping companies to understand the contents of their code so they can identify any intentional or unintentional use of encryption or encryption algorithms buried in the code," said Doug Levin, the company's chief executive officer and president.
Black Duck has been working on exportIP for about a year, he added. For the immediate future, the vendor will focus on U.S. regulations, but it could potentially localize exportIP for use in other countries with similar encryption rules.
The company will target not only developers but any organization whose products for export include embedded software such as phone handsets and computers, Levin said.
Black Duck already sells protexIP, compliance software and services to help companies analyze their development projects to determine whether they contain any pieces of open-source or other third-party code and then ensure that those code fragments meet the required licensing obligations.
At present, exportIP and protexIP are separate products, Levin said. They are designed to run on separate Windows or Linux servers since they have their own distinct analytics engines and knowledge bases.
- Radicati: Cloud Business Email - Market Quadrant 2013 Google was named the top cloud business email provider in a recent report by research firm Radicati. Out of 14 key players, Google...
- Tablets in the Enterprise: A Checklist for Successful Deployment How can you enterprise manage and secure tablets in order to protect corporate data while providing access to the information and applications employees...
- Enterprise Mobility: A Checklist for Secure Containerization The advantages and disadvantages of the multiple approaches to containerization. Learn More>>
- Enterprise File Sync & Share Checklist File sync and share has changed the way people work and collaborate in today's tech-savvy world. Gone are the email roadblocks, clunky FTP...
- Live Webcast LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users?
- LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users?
- On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy... All Security White Papers | Webcasts