How it Works

Walk through the process with sample data — no sign-up. One analysis → six report views for executives, risk, technical, compliance, procurement, and legal.

This is a walkthrough page. For the live app demo (upload your own SBOM, full analyzer), use the "Open live demo in app" button below.

1. Choose a sample SBOM below  →  2. We analyze components and risks  →  3. Get six report views tailored to each stakeholder.

1
Select SBOM
2
Analyze
3
Results
4
Reports

Step 1: Select a Sample SBOM

Don't have an SBOM? Use one of our samples. Choose by category to find a vendor software example that matches your use case.

Business applications

HR Management Platform
CloudSync Workforce v3.2.1
Cloud-based HR and talent management system processing employee data, payroll, and benefits administration.
Components 247
Format CycloneDX 1.4
Risk Level High
Critical CVEs 3
Financial ERP System
FinanceFlow Enterprise v8.5.0
Integrated financial management platform handling accounting, procurement, revenue recognition, and compliance reporting.
Components 318
Format SPDX 2.3
Risk Level Critical
Critical CVEs 5
CRM Platform
SalesConnect Pro v12.3.4
Customer relationship management system managing sales pipelines, customer data, marketing automation, and service operations.
Components 192
Format CycloneDX 1.5
Risk Level Medium
Critical CVEs 1

Regulated & critical data

Healthcare Data Platform
MedFlow EHR v2.1.0
Electronic health records and care coordination system handling PHI, clinical workflows, prescriptions, and interoperability (HL7/FHIR).
Components 276
Format CycloneDX 1.4
Risk Level High
Critical CVEs 2

Security & resilience

Identity & Access Platform
AuthGate IAM v5.0.2
SSO, directory, and MFA platform managing authentication and authorization across applications—a primary ransomware target for credential theft and lateral movement.
Components 204
Format CycloneDX 1.5
Risk Level Critical
Critical CVEs 2
Backup & Recovery Platform
RestorePro Enterprise v4.3.1
Enterprise backup and recovery solution for servers, databases, and endpoints. Ransomware operators often target backup systems to prevent recovery.
Components 289
Format SPDX 2.3
Risk Level Critical
Critical CVEs 3

Step 2: Automated Vulnerability Analysis

Platform queries multiple vulnerability databases via APIs and correlates findings with SBOM components.

Processing

0%
[00:00] SBOM file parsed successfully
[00:01] Format validation complete

Step 3: Vulnerability Analysis Results

Analysis complete. Review identified vulnerabilities and risk assessment.

Critical
0
CVSS 9.0-10.0
High
0
CVSS 7.0-8.9
Medium
0
CVSS 4.0-6.9
Low
0
CVSS 0.1-3.9
CRITICAL RISK ALERT

Top Vulnerable Components

Component Version CVEs Max Severity EPSS Score
Open live demo in app

Ready for your own SBOM reports?

Request a demo for tailored SBOM analysis and corporate reporting. We’ll help you get multi-stakeholder reports that fit your organization.

Request trial

Step 4: Multi-Stakeholder Reports (Report Multiview)

One analysis, six report views. Each stakeholder gets the right level of detail — from executive summary to technical CVE details.

Executive Summary
Business risk, financial exposure, strategic recommendations
Risk Officer Report
Risk scores, compliance gaps, mitigation priorities
Technical Team Report
CVE details, patch versions, remediation steps
Compliance Report
NIST CSF, NTIA EO 14028, ISO 27001 mapping
Procurement Report
Vendor comparison, SLA requirements, contract terms
Legal Report
License compliance, liability assessment, regulatory exposure

Ready to Get Started?

Get SBOM analysis and corporate reporting for your organization. Request a demo for tailored reports and setup support.