beStorm the first security testing tool to introduce RMI fuzzing

NORTHBROOK, IL, June 30, 2008 - Beyond Security, the leading provider of security testing and assessment tools, today announced the latest version of its security analysis solution. In the recently released version of beSTORM, Beyond Security has added the capabilities to fuzz test Sun's RMI Protocol (Remote Method Invocation). This is the industry's first automated security testing tool for the RMI protocol which until recently was regarded as a transparent transport layer and is now fast becoming a target for attack.

beSTORM's ability to test this transport layer allows users to verify that their RMI supported application is safe from attack, and that it cannot be rendered unusable, or even worse - leveraged to attack the database or server on which the application connects to. beSTORM also provides a special certification that can be used to proof to customers that the platform is free from vulnerabilities, effectively increasing product value for customers

beSTORM offers support for a wide range of transport layer protocols and can be used to test a variety of formats that are used by today's open and proprietary protocols. This includes support for SCTP, SSLv2, SSLv3, TLS and of course RMI.

Beyond Security's unique position in the security testing tools market comes from its unparalleled database of security holes. As the founder and operator of, the largest independent security portal in the world, Beyond Security has been building a database of known security holes in operating systems and software programs since 1998. Over 10,000 security holes in thousands of platforms, applications and devices have been documented on No other security vendor has a database of this magnitude, giving Beyond Security a distinct advantage over other companies with similar products.

beSTORM was launched in 2005 after a cumulative effort of three years of research and development. beSTORM performs exhaustive protocol analysis in order to uncover new and unknown vulnerabilities in network products. It is differentiated in that it does not require access to the source code, which makes it an ideal solution for testing third party products before they are implemented, a procedure often called “Blackbox testing”.


For organizations concerned about regulatory compliance or dissatisfied with the network security audit services provided by their consulting firms, Beyond-IP provides an Automated Vulnerability Management Appliance that provides a higher quality, lower cost network vulnerability assessment and management than any other alternative. The Automated Vulnerability Management Appliances performs a security mapping of your network and simulates attacks originating from either the internal or the external network. Once the security scanning is complete, the software generates a detailed vulnerability report specifying the security breaches, along with practical solutions to fix those vulnerabilities. Beyond-IP’s solutions allow simplified measurement, monitoring and management of vulnerabilities over time. To learn more, visit


Beyond Security is a leading provider of security assessment technologies. Beyond Security specializes in developing solutions for network security, providing detection and prevention tools. Solutions include internal network, external network and product security audits. Beyond Security owns and administers the world’s largest independent security portal -- This portal gives security professionals from around the world critical information on new security threats and vulnerabilities, and it provides background data, fixes, patches and workarounds to identified threats, 24 hours a day, 365 day a year, making it one of the most comprehensive security resources in the world. SecuriTeam currently receives over one million unique page impressions per month from security professionals worldwide and it contains over 6,500 pages of linked. To learn more, visit

Contact for Beyond-IP, LLC
Ben Bradley