Vulnerability management


Image with employee working on computer with multiple screens

Vulnerability management

PREVENTION, MONITORING AND MITIGATION

CrossControl continuously processes, assesses and identifies platform vulnerabilities, to prioritize and implement updates that protect systems from cyberattacks and data breaches. 

This applies also to developed system software where a software bill of materials (SBOM) declares the inventory of components used to build a software application. The Common Vulnerabilities and Exposures (CVE) system provides a reference method for publicly known information-security vulnerabilities and exposures. 

 

SPECIFICATION
Code audit report Through reviews and inspection with static code analysis 
Security auditing Via Vigiles and Yocto CVE check
Vulnerability scanning CVE scanning using Nessus and OpenVAS
SBOM     Software bill of materials via SPDX

 

AI-POWERED OBJECT DETECTIONAPPLICATION

Our display computers, CCpilot V1000 and V1200, have inherent AI support. AI and ML technology enables fast data processing. In the industrial space, AI/ML can be deployed in a wide spectrum of applications, like automation, diagnostics, speech recognition and object detection.

Field Application EngineeringOur Field Application Engineers are specialists in the capabilities of our products. They support customers with advice and examples on solutions and how to implement functionality in the most efficient way for different use cases and applications, based on our software platform.

UX Designer for easy design of premium GUIsUX Designer is the LinX application module for
advanced user interfaces, prepackaged with a set
of graphical components for human machine interaction.