BusinessCybersecurityNewswireTechnology

Keysight SBOM Manager: Simplify Cybersecurity Compliance & Transparency

Originally published on: March 20, 2026
▼ Summary

– Keysight Technologies has launched Keysight SBOM Manager, a solution to help organizations generate, manage, and use Software Bill of Materials (SBOMs) to meet global cybersecurity regulations like the EU’s Cyber Resilience Act.
– Global regulations, including the EU CRA and U.S. Executive Order 14028, are making SBOMs a foundational requirement for market access, regulatory approval, and customer trust by mandating transparency about digital product components.
– The solution provides accurate visibility into software components, continuously correlates SBOMs with vulnerability data, and uses VEX to help teams focus on meaningful risks rather than raw data.
– It supports secure, role-based sharing of SBOMs, ensures alignment with standards, and allows organizations to map SBOMs to deployed assets for operational transparency.
– The EU CRA, effective in 2026, requires SBOM maintenance and rapid vulnerability reporting, with similar rules emerging worldwide; non-compliance risks penalties and restricted market access.

Navigating the complex landscape of global cybersecurity regulations demands a robust and reliable approach to software transparency. Keysight SBOM Manager emerges as a comprehensive platform designed to help organizations generate, manage, and utilize Software Bills of Materials (SBOMs) with greater accuracy and confidence. This solution directly addresses the mounting pressure from regulations like the European Union’s Cyber Resilience Act (CRA), U.S. Executive Order 14028, and various international frameworks, making compliance a streamlined part of the product lifecycle rather than a burdensome afterthought.

The global regulatory environment is rapidly unifying around a core principle: manufacturers must thoroughly understand and disclose the components within their digital products. This includes all software, firmware, and embedded dependencies. Market access, regulatory approval, and customer trust are increasingly contingent on maintaining accurate SBOMs. Keysight’s tool supports this critical shift by tackling the practical hurdles companies face as these mandates expand.

The platform provides deep visibility by analyzing binary software, firmware, containers, and other packaged components, even uncovering closed-source and embedded dependencies. It doesn’t just create a static list; it continuously correlates SBOM data with multiple authoritative vulnerability sources. A key feature is its intelligent filtering, which uses Vulnerability Exploitability eXchange (VEX) to eliminate irrelevant vulnerabilities. This allows security teams to concentrate on genuine, actionable risks instead of drowning in unprioritized data.

For sharing and collaboration, the solution enables secure, scalable distribution of SBOMs and vulnerability information through controlled, role-based access and detailed version tracking. This meets both regulatory and customer demands for transparency. Built-in validation ensures SBOMs adhere to evolving standards, while support for SBOM consumers allows organizations to ingest and map these documents to their actual deployed assets. This creates a direct link between documentation and real-world operational environments, closing the loop on supply chain risk management.

Industry experts underscore the growing importance of such capabilities. “Solutions that provide visibility into system components and support vulnerability impact analysis hold significant potential for strengthening cybersecurity efforts,” noted an executive from Hitachi’s Software-Defined Solutions Division. Meanwhile, a prominent CTO in the cybersecurity space observed, “In an era of AI-paced innovation, tighter governance is non-negotiable. Organizations need the ability to continuously generate trustworthy SBOMs, correlate them with actionable intelligence, and automate response workflows at scale to meet global regulations.”

The urgency for such tools is clear. The EU CRA, set to take full effect in 2026, will mandate that manufacturers of connected products maintain SBOMs and report exploited vulnerabilities within a stringent 24-hour window. Similar requirements are already active in the U. S. under executive order and FDA guidance, with other major economies like India, Japan, and South Korea formalizing their own rules. Non-compliance risks severe penalties, delayed product approvals, recalls, or complete loss of market access.

By integrating accurate SBOM generation, continuous vulnerability intelligence, secure sharing, and data quality assurance into one platform, Keysight SBOM Manager aims to reduce regulatory risk and improve vulnerability response times. It provides a unified approach to building greater trust across increasingly scrutinized global digital supply chains. As one Keysight executive summarized, “SBOMs are now a global business prerequisite. Our manager brings the necessary accuracy, consistency, and scalability to help organizations meet these demands with confidence.”

(Source: Help Net Security)

Topics

sbom management 100% cybersecurity regulations 95% software transparency 90% Regulatory Compliance 85% vulnerability management 85% supply chain security 80% product lifecycle 75% digital products 75% Risk Management 70% market access 70%