CrossControl continuously processes, assesses and identifies platform vulnerabilities, to prioritize and implement updates that protect systems from cyberattacks and data breaches.
This applies also to developed system software where a software bill of materials (SBOM) declares the inventory of components used to build a software application. The Common Vulnerabilities and Exposures (CVE) system provides a reference method for publicly known information-security vulnerabilities and exposures.
| SPECIFICATION | |
| Code audit report | Through reviews and inspection with static code analysis |
| Security auditing | Via Vigiles and Yocto CVE check |
| Vulnerability scanning | CVE scanning using Nessus and OpenVAS |
| SBOM | Software bill of materials via SPDX |
AI-POWERED OBJECT DETECTIONAPPLICATION
Our display computers, CCpilot V1000 and V1200, have inherent AI support. AI and ML technology enables fast data processing. In the industrial space, AI/ML can be deployed in a wide spectrum of applications, like automation, diagnostics, speech recognition and object detection.
Field Application EngineeringOur Field Application Engineers are specialists in the capabilities of our products. They support customers with advice and examples on solutions and how to implement functionality in the most efficient way for different use cases and applications, based on our software platform.
UX Designer for easy design of premium GUIsUX Designer is the LinX application module for
advanced user interfaces, prepackaged with a set
of graphical components for human machine interaction.