ObjectSecurity OT.AI Platform | v2.2.0 Release Notes

Modified on Wed, 06 Mar 2024 at 12:08 PM

Previous versions of Release Notes can be accessed here.

ObjectSecurity OT.AI Platform v2.2.0 release adds a new feature: the Binary Delta Feature. Existing features have been optimized and improved. The descriptions of various CWE's have been improved with more context. Password Recovery can now be handled via email.


What's Changed with This Release:

What's New:

  1. Added the Binary Delta Feature, accessible from a new tab in the user interface.

What's Updated:

  1. Improved the descriptions of various CWEs. When detected, these CWEs are reported with more context than before.

  2. Added the ability to recover a user's password via email from the sign-in screen.

  3.  Fixed bugs and performance issues relating to user authentication.

Feature details

New Feature: Binary Delta Feature

The Binary Delta Feature allows you to compare binary assessment results for different versions of the same binary executable or firmware image (e.g., between updates, patches, upgrades, mergers, debloats, remediation, etc.). This can be used to verify that a remediation removed an issue, or that a merger did not introduce new vulnerabilities. 

You may select two assets for which to generate a Binary Delta Report. The Binary Delta Report is viewable in the user interface and may be exported to PDF. The Binary Delta Report will report any Binaries that are added, updated, removed, or unchanged between the two assets. 

Updated Feature: Improved the descriptions of various CWEs. 

When detected, some CWEs are reported with more context than before. 

Updated Feature: Added the ability to recover a user's password via email from the sign-in screen 

Passwords can now be reset via email directly from the sign-in screen.

Was this article helpful?

That’s Great!

Thank you for your feedback

Sorry! We couldn't be helpful

Thank you for your feedback

Let us know how can we improve this article!

Select atleast one of the reasons
CAPTCHA verification is required.

Feedback sent

We appreciate your effort and will try to fix the article