Sonatype launches AI/ML component detection

February 26, 2024



Sonatype has announced artificial intelligence (AI) and machine learning component detection, available as part of Sonatype Lifecycle.

The software supply chain company says this technology changes the way organisations select and monitor AI/ML software components, enabling them to accelerate software development while managing the risks associated with AI.

According to Sonatype’s 9th annual State of the Software Supply Chain report, there was a 135% increase in the usage of AI/ML Components within corporate environments compared to the previous year.

By the end of January 2024, this number saw a further 20% increase in a matter of months.

Further, Gartner reported that by 2027, 70% of professional developers will use AI powered coding tools.

The widespread acceptance of AI is not only due to its expanding utility but also its transformative impact on speeding up software development.

Sonatype’s software development

“Organisations must be prepared for the wave of behavioural AI and generative AI that is already radically shaping the future of software development, much like open source did when Maven Central first launched in 2003,” said Mitchell Johnson, Chief Product Development Officer, Sonatype.

“This is an exciting time for software development productivity and innovation; the data shows that enterprises adopting AI in new product innovation and software supply chains are disrupting competitors and moving faster than ever before.

“At the same time, AI/ML introduces a whole new set of risks so it is crucial to have the data, precise identification, legal compliance and policy enforcement in place to understand where and how these new capabilities are being used – without slowing anyone down.”

Sonatype’s new AI/ML component detection offers visibility and control of AI/ML in the software you build.

This enables users to safely use the best AI/ML suppliers in your software, transforming software development lifecycle and security review processes.

More Security News

Read Next