Black Duck Audits
On-demand expertise to help you quickly identify open source, legal, security, and quality risks in software
For over 15 years, Black Duck audits have been the industry’s most trusted open source due diligence solution for M&A and internal compliance. When speed and accuracy are critical, high-tech enterprises and startups, PE firms, and legal advisors choose Black Duck for open source, security, quality, and compliance audit services.
What’s in the code matters when merger and acquisition (M&A) transactions are in motion. Undiscovered open source in applications can lead to costly license violations. These, along with security flaws in proprietary, open source, and other third-party software, can have a significant negative impact on the value of your software assets.
Whether you are acquiring or being acquired, you need an audit partner that can provide fast, trusted, and comprehensive software audits to mitigate these risks.
Black Duck software audits give you the information your firm needs to quickly assess a broad range of software risks in your acquisition target’s software or your own. Get a complete picture of open source license obligation, application security, and code quality risks, so you can make informed decisions with confidence.
Call the audit hotline
+1 781.425.4444
or fill out the form below, and one of our audit experts will contact you.
Open Source and Third-Party Code Audits draw on the Black Duck KnowledgeBase™ to provide you with a complete open source bill of materials (BoM) for the target codebase, showing all open source components and associated license obligations and conflict analysis.
The OSRA builds on the Open Source and Third-Party Code Audit to provide an enhanced view of open source risks in the codebase, including known security vulnerabilities and maintenance risks. It can serve as a high-level action plan to prioritize research and potential remediation actions.
The WSRA gives you a listing of the external web services used by an application, with insight into potential legal and data privacy risks. The summary report allows you to quickly evaluate web services risks across three key categories: governance, data privacy, and quality.
Penetration Test (ethical hacking) Audits assess the security robustness of a software asset through an examination of the application in its full running state. They include exploratory risk analysis to bypass security controls (such as WAF and input validation) as well as attempts to abuse business logic and user authorization to demonstrate how hackers might gain access and cause damage.
SAST Audits combine automated tool-based scans with a source code review to systematically find critical software security vulnerabilities such as SQL injection, cross-site scripting, buffer overflows, and the rest of the OWASP Top 10.
SCDA evaluates the design of key security controls—including password storage, identity and access management, and use of cryptography—against industry best practices to determine whether any are misconfigured, weak, misused, or missing. SCDA finds system defects related to security controls in the design of the application; no testing or analysis of the application or code is performed.
Quantitative Code Quality Audits combine static analysis tools and manual code review to analyze code quality. Results are compared to industry benchmarks to assess quality, reusability, extensibility, and maintainability in proprietary code. Experts interpret the results and provide recommendations for addressing shortfalls in code quality.
Qualitative Code Quality Audits offer a complete analysis of the processes and practices that compose the software development life cycle (SDLC). Experts conduct in-depth interviews with a small number of key personnel to gain insight into the quality and maturity of development practices, including coding standards, processes, and tools. From this, they provide recommendations for improving code quality while reducing development and maintenance costs.
Encryption Audits identify the encryption functions in proprietary, open source, and other third-party software components so you can disclose the proper information to government regulators to assure compliance with export regulations and avoid export restriction. These audits also enable you to ensure that the encryption code in the product meets your corporate security requirements.
Results from open source audits highlight risks you need to consider during M&A.
Watch the webinarFind out how PointClickCare uses Black Duck On-Demand by Synopsys to make sure their patient data stays secure.
Watch the testimonialThis checklist will help ensure you cover your open source risks during M&A.
Get the checklistThe prevalence of open source in applications today poses risks in the realm of M&A.
Understand the process of an open source audit—what comes before, during, and after.
Read the blogIn this course you’ll gain skills to assist client companies in efficiently and effectively navigating and interpreting the output of a Black Duck analysis.
Learn moreLearn how Black Duck audits helped AccessOne gain visibility into open source risk.
Read the case studyAccess the directory of legal professionals who have been certified as Black Duck Legal Specialists.
Learn more