GrammaTech Named to 50 Most Promising IoT Solution Providers

January 23, 2017 GrammaTech News

GrammaTech CIOReview Top 50

GrammaTech, a leading developer of software-assurance tools and advanced cyber-security solutions, was named to CIO Review Magazine’s list of 50 Most Promising IoT Solution Providers of the year for 2016.

The list of companies was selected by a panel of experts and members of CIO Review’s editorial board; GrammaTech’s IoT solutions were selected based on their ability to deliver exceptional value in today’s IoT-driven marketplace. Derived from deep innovation and intensive research in software analysis and software hardening, GrammaTech’s solutions are designed to address today’s most challenging software issues.

GrammaTech’s commercial static analysis tool CodeSonar combines source code analysis and binary code analysis, empowering software developers with the ability to find and fix critical bugs and vulnerabilities in connected systems. These coding defects are increasingly important to remediate in today’s highly connected world.

“Today, more systems are controlled by software, more devices are connected, and more software is susceptible to attack,” explained Dave Hauck, VP of Sales and Marketing at GrammaTech. “We know from VDC Research that software developers aren’t meeting this challenge at a high enough rate. Developers need better tools to be able to deliver connected devices that are secure.”

Unlike other traditional tools vendors, GrammaTech’s mission includes a research arm with over 20 PhDs focused on advancing the state-of-the-art in software analysis and protection. Through highly innovative research programs advancing techniques and technologies in software analysis, transformation, monitoring, and autonomic functions, GrammaTech’s software scientists are solving the software issues impacting the embedded, M2M, and IoT equipment markets.

To learn more about how to address the challenges of the IoT era, read the relevant whitepaper here:, or

Visit GrammaTech at the upcoming conferences: RSA Conference and Embedded World.

Previous Article
The Role of Static Analysis in a Secure Software Development Lifecycle
The Role of Static Analysis in a Secure Software Development Lifecycle

INTRODUCTION: "When should static analysis be applied?" The answer to this question is fairly ...

Next Article
Automated Binary Code Analysis for Software Forensics
Automated Binary Code Analysis for Software Forensics

INTRODUCTION: In my last post, I talked about extending the term software forensics to include ...