• Menu
  • Skip to right header navigation
  • Skip to main content
  • Skip to primary sidebar

DigiBanker

Bringing you cutting-edge new technologies and disruptive financial innovations.

  • Home
  • Pricing
  • Features
    • Overview Of Features
    • Search
    • Favorites
  • Share!
  • Log In
  • Home
  • Pricing
  • Features
    • Overview Of Features
    • Search
    • Favorites
  • Share!
  • Log In

BlueVoyant’s Software Bill of Materials (SBOM) solution automates the ingestion, analysis, and tracking of open-source software components from both first and third-party vendors to help reduce supply chain risks

June 5, 2025 //  by Finnovate

BlueVoyant has introduced a Software Bill of Materials (SBOM) management offering to help organizations manage and reduce third-party software risks. The new feature automates the ingestion, analysis, and tracking of software components from third-party vendors, enhancing BlueVoyant’s Supply Chain Defense. The collaboration with cybersecurity company Manifest aims to provide security teams with insights into software risk exposure and dependencies that may impact business operations. Key benefits include automated vendor risk management, allowing organizations to request SBOMs from vendors, view risk levels for products, and integrate this data into wider risk management activities. The solution assembles an enterprise-wide inventory of open source software components across both first and third-party products, allowing scanning of OSS repositories to assess risk before implementation. BlueVoyant’s Supply Chain Defense solution has been recognized with industry awards, including winning the Cybersecurity Excellence Awards for Supply Chain and being featured in the 2025 Gartner Market Guide for Third-Party Risk Management Technology Solutions.

Read Article

Category: Cybersecurity, Innovation Topics

Previous Post: « Zero Networks’s agentless microsegmentation solution creates secure micro-perimeters around every device on a network, including OT and IoT devices, and enforces least-privilege access controls by dynamically learning network behavior
Next Post: Snowflake’s data ingestion service handles the extraction of any type of data directly from source systems, then performs the transform and load processes using prebuilt or custom connectors for rapid AI deployment »

Copyright © 2025 Finnovate Research · All Rights Reserved · Privacy Policy
Finnovate Research · Knyvett House · Watermans Business Park · The Causeway Staines · TW18 3BA · United Kingdom · About · Contact Us · Tel: +44-20-3070-0188

We use cookies to provide the best website experience for you. If you continue to use this site we will assume that you are happy with it.OkayPrivacy policy