🎉 Gartner® ranks Data Theorem #1 in Cloud Native Apps in the 2025 Critical Capabilities for AST

Learn more
Supply Chain Security

SAST, SCA
and SBOM

Security violations across third party APIs, SDKs, open source libraries, and software bill of materials (SBOMs) from vendors and partners.

Discover Your
Software Supply Chain.

1.

Begin by marking your most important mobile and web apps (first party) and your third-party vendors and suppliers. Upload your SBOM files for ingestion.

2.

The Analyzer Engine will conduct full-stack analysis across first and third party APIs, cloud services, SDKs, and open source libraries.

3.

Take action by identifying third party supply chain attack surfaces within your applications, opening policy violations, and listing your SBOM inventories.

1

Mark Your
Apps + Vendors

Mobile & Web Apps
Vendors and Suppliers
SBOM Files
2

Analyzer
Engine

dt

Full-Stack Analysis:

· APIs & SDKs

· Cloud Services

· Mobile & Web

· OSS Libraries

· SBOM Files

3

Take
Action

Web Portal with SBOM
Attack Surface
Policy Violations
Proactive Security

Traditional 3rd party exposure (global pandemic)

Raw Materials
Manufacturing
Distribution
Retail Locations
Consumers

Software 3rd party exposure (Vendors, OpenSource, SDKs, APIs, Clouds)

Developers
Source Code
Infrastructure
Applications
Users/Customers

Hack Your
Supply Chain.

Supply Chain security goes beyond the code with focuses across the entire application stack:

Discover all of your 3rd Party assets:
APIs, SDKs, Open Source
Cloud, Mobile, Web Services
Hack 3rd Party Attack Surfaces
Automate Vendor Management
Ingest software bill of materials (SBOM) files
Create dynamic SBOM inventory listings based on full-stack analysis

The analyzer engine discovers third-party assets across the application full-stack using runtime analysis (dynamic, interactive security testing).

Manage SBOM
Inventory.

Data Theorem's Code Secure allows customers to ingest all of their SBOM files to be processed by its Analyzer Engine. As an output, Data Theorem's Code Secure pipeline will generate a comprehensive SBOM Inventory listing based on multiple sources including SBOM files and full-stack application analysis.

SBOM is defined as a "formal record containing the details and supply chain relationships of various components used in building software." It is analogous to a list of ingredients on food packaging.

Code Library
SDK
Input
Output
SBOM File

Prevent Data Breaches

We look forward to Data Theorem’s continued push into API, Web, and Cloud security to give us security visibility into our entire stack.

Eko Logo

Daniel Barbosa

Machine Learning Engineer , Eko Health

Go to Case Study