IT Pro is supported by its audience. When you purchase through links on our site, we may earn an affiliate commission. Learn more

ProtectedBy.AI’s CodeLock blocks malware at source code level

The patented technology injects digital signatures at predetermined points across an entire code body

ProtectedBy.AI has launched a patented technology to keep software supply chains safe from malware attacks.

CodeLock by ProtectedBy.AI provides organizations with a virtually impenetrable network of security sensors to secure server-side applications. From a technical standpoint, CodeLock's algorithm injects custom digital signatures into a company's software at predetermined points or locations. Containers of code are then sealed, signed, and linked together.

This way, CodeLock maximizes protection for each line of code, from small utility functions to multimillion-character operating systems.

"Cyberattacks like the recent events with SolarWinds, Colonial Pipeline, and JBS have devastated thousands of organizations globally – including multiple U.S. government agencies; attacks that would have been stopped in their tracks by CodeLock," said ProtectedBy.AI.

There are two parts to ProtectedBy.AI's CodeLock: an alert monitor and a developer interface.

The‌ ‌developer‌ ‌interface‌ ‌requires‌ ‌programmers‌ ‌to‌ ‌verify their identities via multi-factor authentication, tiered passwords, ‌digital‌ ‌footprinting,‌ ‌and‌ ‌biometrics. The alert monitor, tailored for non-tech executives, serves as an early warning system configured to send emails, texts, and pre-recorded calls to anyone in an organization's chain of command.

A language-agnostic toolkit, CodeLock integrates seamlessly into any software development workflow‌, ‌including‌ ‌agile,‌ scrum, and waterfall. Among the major repositories connected to and accommodated by the platform are Git, GitHub, BitBucket, AWS, and Azure.

Related Resource

Four ransomware resiliency challenges you can combat with confidence

The benefits of a multi-layered security solution

Windows of a high rise building - Four ransomware resiliency challenges you can combat with confidence - whitepaper from VeritasDownload now

"Malware, ransomware, and creative new forms of cyberattacks are becoming more common around the world," said Brian Gallagher, president and co-founder of ProtectedBy.AI. 

"We've developed the only defense technology which automates the process of detecting an attack once it has gotten past your perimeter. CodeLock is being recognized as a critical component to keeping organizations cybersafe."

As of June 2021, CodeLock by ProtectedBy.AI is available as a subscription-based service that starts at $15,000 per year. 

Featured Resources

Four strategies for building a hybrid workplace that works

All indications are that the future of work is hybrid, if it's not here already

Free webinar

The digital marketer’s guide to contextual insights and trends

How to use contextual intelligence to uncover new insights and inform strategies

Free Download

Ransomware and Microsoft 365 for business

What you need to know about reducing ransomware risk

Free Download

Building a modern strategy for analytics and machine learning success

Turning into business value

Free Download

Recommended

The Total Economic Impact™ of Apple Mac in Enterprise: M1 update
Whitepaper

The Total Economic Impact™ of Apple Mac in Enterprise: M1 update

12 May 2022
Dell Technologies World 2022: Dell unveils fastest storage architecture in company history
Server & storage

Dell Technologies World 2022: Dell unveils fastest storage architecture in company history

4 May 2022
Dell Technologies World 2022: Dell unveils security offerings for major cloud providers
public cloud

Dell Technologies World 2022: Dell unveils security offerings for major cloud providers

3 May 2022
How do you become an ethical hacker?
ethical hacking

How do you become an ethical hacker?

29 Apr 2022

Most Popular

Russian hackers declare war on 10 countries after failed Eurovision DDoS attack
hacking

Russian hackers declare war on 10 countries after failed Eurovision DDoS attack

16 May 2022
Windows Server admins say latest Patch Tuesday broke authentication policies
Server & storage

Windows Server admins say latest Patch Tuesday broke authentication policies

12 May 2022
IT admin deletes company’s databases and is jailed for seven years
Policy & legislation

IT admin deletes company’s databases and is jailed for seven years

16 May 2022