
Codean
Founded Year
2020Stage
Grant | AliveTotal Raised
$1.5MLast Raised
$410K | 2 yrs agoMosaic Score The Mosaic Score is an algorithm that measures the overall financial health and market potential of private companies.
-103 points in the past 30 days
About Codean
Codean is a company that focuses on software security within the technology industry. The company offers a toolbox designed for security experts, including whitebox pentesters and security auditors, to make software security review more efficient. This toolbox, known as the Codean Review Environment, provides features that help track reviews, perform symbiotic taint analysis, and compose reports easily. The company primarily serves the software security industry. It was founded in 2020 and is based in Utrecht, Netherlands.
Loading...
Codean's Product Videos
_thumbnail.png?w=3840)
_thumbnail.png?w=3840)
Codean's Products & Differentiators
Review environment
Our review environment is a SaaS solution for whitebox pentesters, security auditors, and everyone else who wants to do security review code in less time. Our review environment supersedes the IDE for security experts: because it is optimized for security code review. Features range from keeping track what is reviewed while doing delta's, to symbiotic taint analysis, to easy report composition. The result: less mundane work, more fun, in half of the time.
Loading...
Expert Collections containing Codean
Expert Collections are analyst-curated lists that highlight the companies you need to know in the most important technology spaces.
Codean is included in 1 Expert Collection, including Cybersecurity.
Cybersecurity
9,887 items
These companies protect organizations from digital threats.
Latest Codean News
Aug 31, 2023
In this Help Net Security interview, Kevin Valk, co-CEO at Codean , discusses the consequences of relying solely on automated tools for software security. He explains how these tools can complement human knowledge to enhance software security analysis and emphasizes the need for the security industry to prioritize the symbiotic relationship between humans and machines. Why is postponing security analysis and tests after the implementation phase problematic? How does it affect the cost and effectiveness of identifying vulnerabilities? Software development is not much different from building houses or sometimes complex megastructures. To build anything you need a fundament that you can build upon. Let’s say you are building a skyscraper, before you start physically building you need lots of drawings, analysis of forces and preparations and then you can finally start building. Let’s say your skyscraper is pretty tall with a planned 500 meters total height. At around 400m high all work comes to an abrupt stop as there are visible cracks in the foundation (or maybe the used glass on all the floors turns out to be unsafe). Depending on the exact issue the result is either a complete rebuild (foundation was not strong enough to reach to 500m), or expensive as each and every window needs to be replaced. If instead, this was looked at during design or the first few floors it would be obviously way cheaper to resolve. Software security really is not that different, especially now that software development is agile and changes rapidly. You really want to ensure you are not building on an insecure foundation or with insecure materials. What tasks are best suited for automated tools, and what tasks require human expertise in software security? The biggest problem in cybersecurity is the assignment of value. Who decides that a specific functionality or data has value? Often, this is decided by the company behind the software in question. For example, banking software needs to keep the full transaction history of each bank account. This information is highly confidential as else you could figure out who has how much money. In stark contrast, Bitcoin requires all transactions to be publicly visible and verifiable. So the confidentiality of transactions between these two cases is completely opposite (Do note that in the case of Bitcoin the confidentiality is deferred because there should be no link between a public key and a party owning it). Currently all automated tools cannot understand this difference as the tool would need to understand the full business case and future plans of a company. Large Language Models (LLMs) could bridge this gap by providing business relevant knowledge, but often this information is not written down and simply exists in expectations or in the heads of people. In my eyes software security is about understanding what has value and then finding ways to obtain this value by abusing/altering the software. This will currently (and I expect for a long time) require humans as this information is currently not written down, let alone encoded in an easily digestible format. While humans are very good at deriving information and making assumptions, most of us are rather bad at performing complex calculations in our heads. Analysis of source code to figure out how software behaves or finding relations between all different components in a piece of software is something computers are getting rather good at. This is exactly the area that in my opinion automated tools should focus on. A human could mark some data structure or piece of code as valuable. Then a computer could try to find ways to get to this data structure of a piece of code and could even keep track of all the steps it had to take to try to get here. Finally, a human could verify if all the steps that the computer took make sense and are even feasible. Hence, I think the security industry should focus more on the symbiosis between man and machine. Not fully focused on automated tools, nor fully focused on human effort. Can you discuss the challenge of handling false positives generated by automated security tools? What are the consequences of relying solely on automated tools? This is currently not done and often results in tools that assign value to functionality and code that is not true for the business. This in turn leads to a significant amount of false positives which simply is noise for everybody involved. This “noise” can essentially hide the real problems because now you need to find those few critical vulnerabilities in all false positives. Sadly, we are just human after all and often we end up going numb while combing through the data and missing the real problems. If on the the hand you simply take all results from automated tools on face value and decide to fix them all, you are in for a bad surprise. Not only will developers have spent significant time trying to fix all the issues. They are probably not taking you seriously anymore because they had to fix some mundane issues in some piece of code that clearly had no business value. Now we are left with two major problems, the developers do not take security seriously anymore and the management thinks the product is completely secure because tools do not report any security issues. Sadly, the biggest security problems are completely logical as in, it is often semi hidden features that the creator was not fully aware of all the side effects. You are probably aware of the Log4j vulnerability a few years ago, this was exactly such a case that no automated tool could probably ever find. How have machine learning-based techniques changed or enhanced traditional approaches in software security analysis, specifically in static analysis and fuzzing? Personally I am not aware of any major breakthroughs currently, but I am sure many companies are jumping on it. As mentioned before, the biggest problem in software security is the assignment of value. What parts need to be protected and how well? I definitely see LLMs play major roles in guiding tools on what has and what does not have value. This holds for both static analysis and fuzzing. Static analysis could be guided to focus on specific business logic or the assign (business) value to code and data that can be used to guide the static analysis. The same holds for fuzzing, but you will require directed fuzzing. What roles do natural language processing techniques play in analyzing software specifications, especially when written in natural language? The biggest unsolved question in my opinion is how do we provide AI/LLMs the required information as a lot of information is common sense or only available in the heads of people. Considering once again the confidentiality of transactions in a banking system, I doubt that there currently is a single document that contains this and all other requirements and specifications the banking system needs to uphold. One alternative is to let a LLM start scraping the complete intranet of companies, but I do not expect companies jumping on this opportunity. Where do you see the field of software security analysis headed, especially with advancements in machine learning and AI? We are hitting limits on both automated tools and manual labor. Automated tools do not provide enough quality to get software to a “good” security posture. Humans on the other hand are too expensive and there are simply not enough security people to keep up with all development. One logical solution would be to increase the quality of tools by adding human knowledge and to add tools to humans to increase speed. Currently the interface between man and machine is severely lacking and we need innovation in this. The push on LLMs is definitely causing innovation but a simply mindset change to make tools more human could also have significant results. More about
Codean Frequently Asked Questions (FAQ)
When was Codean founded?
Codean was founded in 2020.
Where is Codean's headquarters?
Codean's headquarters is located at Parijsboulevard 209, Utrecht.
What is Codean's latest funding round?
Codean's latest funding round is Grant.
How much did Codean raise?
Codean raised a total of $1.5M.
Who are the investors of Codean?
Investors of Codean include React EU and TIIN Capital.
Who are Codean's competitors?
Competitors of Codean include Polyverse and 8 more.
What products does Codean offer?
Codean's products include Review environment.
Who are Codean's customers?
Customers of Codean include Codean security review department and Capptions.
Loading...
Compare Codean to Competitors

Mend.io is a company that focuses on application security, providing tools to manage application risk across various domains. Their main offerings include automated dependency updates, open source security management, proprietary code security, and risk analysis for AI models. Mend.io serves sectors that require application security measures, such as software development and IT security. Mend was formerly known as WhiteSource. It was founded in 2011 and is based in Givatayim, Israel.

Sonar specializes in code quality and security within the software development industry. The company offers tools for static application security testing, continuous codebase inspection, and real-time coding guidance to improve code reliability, maintainability, and security. Sonar's solutions cater to various sectors including the public sector, enterprise-level businesses, and developers seeking to integrate clean code practices into their development workflows. It was founded in 2008 and is based in Geneva, Switzerland.
Beanstalk is a software company that provides a complete workflow for code hosting, review, and deployment. It offers services that allow teams to write code, manage code reviews, and deploy code to various environments without the need for additional client software. Beanstalk's solutions cater to organizations of any size, aiming to streamline the development process. It is based in Philadelphia, Pennsylvania.

Semgrep operates in technology. The company offers a tool that helps find and fix bugs and reachable dependency vulnerabilities in code, and enforces code standards. It primarily serves the software development and cybersecurity sectors. Semgrep was formerly known as r2c. It was founded in 2017 and is based in San Francisco, California.
Quality Clouds is a company that focuses on quality control management software in the technology sector. The company offers a continuous improvement tool for SaaS platforms, providing organizations with greater control and visibility over their SaaS production and pre-production environments. The software helps to inventory current customizations, identify development that diverges from vendor coding best practices, and quantify the impact of real-time code development decisions on the long-term integrity, security, and upgradeability of the platform. It was founded in 2015 and is based in London, England.
GuardRails makes open-source security tools easily available in GitHub Pull Requests. The solution has been tuned to keep noise low and only report high-impact and relevant security issues. It was founded in 2017 and is based in Singapore.
Loading...