Deconstructing Enterprise VPNs: SonicWall, Check Point & OpenVPN

Knowing how your VPN tools are constructed, whether they exhibit any suspicious functionality, contain vulnerabilities and outdated components, or represent a risk to the data they are meant to protect is critical. Trust but verify! 

Watch as Tim Stahl  deconstructs these common tools, exposing the threats hidden within, and discusses how your organization can address these potential threats.

Software Package Deconstruction

About the Series

In each episode of our application security series we will deconstruct, analyze, and expose hidden risks inside some of the largest most complex software packages. App Sec and Dev Teams will see our Software Supply Chain Security platform in action and how it provides teams with new found confidence and the ability to make Go/No Go software release decisions based on the most comprehensive view of software risk in the industry.

Special Reports

The 2025 Software Supply Chain Security Report

The 2025 Software Supply Chain Security Report

Software supply chain attacks are an increasingly popular tool for malicious actors. And the rapid embrace of AI and machine learning (ML) tools is introducing new supply chain risks. Here's what your organization needs to know.

March 12, 2025