Beyond Security Blog

IoT Device Testing Made Possible With BeStorm X

BeStorm X, a black-box fuzzer by Beyond Security and Ubiquitous AI, tests IoT devices to identify security weaknesses and vulnerabilities before they’re exploited.

This article was originally published on TechTarget on April 22, 2019.

In an international collaboration, U.S.-based Beyond Security and Japan-based Ubiquitous AI Corporation developed and launched BeStorm X, a vulnerability verification tool designed specifically to test IoT devices. The vendors claim the tool is an amalgamation of Beyond Security’s BeStorm version 7.6.8 and UAC’s IoT technologies.

The vendors claim that BeStorm X can perform IoT device testing for both known and unknown vulnerabilities. It’s a black-box fuzzer that tests IoT software for susceptibilities such as missing patches in the underlying operating system, bad configuration, as well as other weaknesses, including those in custom protocols.

Fuzzing is an automated tool-based software testing technique that intentionally inputs invalid or random data into a system and, when the system is unable to verify the data, exposes and locates bugs or leaks. The vendors claim BeStorm X will detect zero-day vulnerabilities, default passwords, bad encryption settings and other issues.

BeStorm X is geared toward IoT vendors, certification testers, and even commercial end users. End-user pricing starts at $9,500 and goes up according to number of seats and protocols that need to be tested.

Beyond Security, in addition to BeStorm X and BeStorm, offers vulnerability assessment and management tools (BeSecure) and PCI ASV services. UAC, born from a merger of Ubiquitous Corporation and A.I. Corporation in July 2018, touts lightweight security, networking, wireless and OS products.

Beyond Security

Beyond Security is a global leader in automated vulnerability assessment and compliance solutions – enabling businesses and governments to accurately assess and manage security weaknesses in their networks, applications, industrial systems and networked software at a fraction of the cost of human-based penetration testing.

Contact Us

By clicking Submit, I agree to the use of my personal data in accordance with the Beyond Security Privacy Policy. Beyond Security will not sell, trade, lease, or rent your personal data to third parties.