Welcome to Chipmall.com
Products
View All Products
Home > News > News detail

Partnership helps manufacturers protect endpoint devices

Electronicspecifier | Microchip Technology | 11/11/2020

Partnership helps manufacturers protect endpoint devices

Sectigo and Green Hills Software have announced a partnership for a global reseller agreement to help manufacturers protect endpoint devices. The agreement enables Green Hills Software to offer Sectigo's Icon LabsEmbedded Firewall, integrated and optimised for use with Green Hills Software’s INTEGRITY real-time operating system (RTOS) and its embedded high-performance TCP/IP v4/v6 host and router networking stack.

The pairing strengthens Green Hills Software’s internet-connected platform solutions with the expanded networking security required in today’s connected systems responsible for critical functions for automotive, industrial, medical, transportation and mil/aero industries.

“Most cyberattacks on embedded systems remain undetected until it is too late. Early detection is critical as it maximises the safety of products while helping to prevent the loss of IP, disruption of services, and attacks proliferating to other portions of the system or network,” explained Alan Grau, VP of IoT/Embedded Solutions, Sectigo. “Green Hills Software’s integration of our embedded firewall with their proven and mature INTEGRITY RTOS will provide customers worldwide with a powerful combination of experience and security technology that sounds the alarm, then stops the attack.”

The INTEGRITY RTOS microkernel architecture is designed for critical embedded systems demanding proven separation, security, and real-time determinism. The operating system’s separation architecture helps manufacturers safely and securely partition software running at different levels of criticality. For critical functions, INTEGRITY assures secure and real-time execution by means of impenetrable partitions that deliver freedom-from-interference and guaranteed system resources.

The Sectigo Icon Labs Embedded Firewall enjoys widespread global adoption, combining numerous powerful and configurable features to detect and contain cyberattacks.

Configurable filtering policies: Uses configured filtering rules to control the filtering engine. The rules provide complete control over the type of filtering performed and the specific criteria used to filter packets. Rules can be configured for:

  • Static filtering rules for IP address, MAC address, port number, and protocol number
  • Block list and allow list filtering modes
  • DPI filtering rules for message type, message contents, and message source
  • Threshold-based filtering criteria
  • Independently enabling and disabling static filtering, dynamic filtering, DPI filtering, and threshold-based filtering

EDSA Compliance support: Serves as an important building block for achieving EDSA compliance for embedded devices, providing support for many capabilities mandated by EDSA-311:

  • Protocol fuzzing and replay attack protection
  • Data flooding protection
  • Denial of service protection
  • Notification of attacks
  • Disabling of unused ports

Logging and alerting: Maintains a log of security events and policy violations, enabling command audits and forensic investigation to determine the source of an attack.

Management system integration: Incorporates an agent that enables remote management from an enterprise security manager system, or to other Security Information and Event Management (SIEM) systems. This integration provides:

  • Centralised management of security policies
  • Situational awareness and device status monitoring
  • Event management and log file analysis

Intrusion detection and prevention: Blocks all unused ports and protocols, limiting the attack surface hackers can exploit. Logging packets that violate configured filtering rules enables detection of unusual traffic patterns, traffic from unknown IP addresses, and other suspicious behavior.

“Green Hills is pleased to be adding this additional cybersecurity capability to our portfolio of industry-leading foundational security offerings,” said Dan Mender, VP of Business Development, Green Hills Software. “Protecting critical internet-connected solutions is paramount for our customers, and Sectigo’s Icon Labs Embedded Firewall capability extends our customers’ ability to design purpose-built secure solutions in automotive, industrial, medical, transportation and mil/aero markets.”

Green Hills Software’s internet-connected platforms are integrated and optimised with Sectigo’s embedded firewall and are available today.

Tags

operating system

Topic
News Homepage
News detail

Brands

Cross News

1. Partnership helps manufacturers protect endpoint d...

Partnership helps manufacturers protect endpoint devices

2. Modular power supplies offer up to 18 outputs with...

Modular power supplies offer up to 18 outputs with low acoustic noise and full MoPPs isolation

3. Smart storage includes an open-source toolkit for ...

Smart storage includes an open-source toolkit for managing data centre storage

4. Power MOSFETs offer high power density and efficiency

Power MOSFETs offer high power density and efficiency

5. Sensor modules provide long range presence and pro...

Sensor modules provide long range presence and proximity sensing for light curtain applications

6. AMD Achieves 25x Energy Efficiency Goal from 2014

AMD Achieves 25x Energy Efficiency Goal from 2014

7. Podcast: DAC 2020 preview – AI, ML and RISC-V on rise

Podcast: DAC 2020 preview – AI, ML and RISC-V on rise

8. New touchscreen controller for smart surfaces and ...

New touchscreen controller for smart surfaces and multi-function displays

9. Intel to Introduce Control-Flow Enforcement Techno...

Intel to Introduce Control-Flow Enforcement Technology into Tiger Lake Mobile CPUs

10. What do AI users predict for its future?

What do AI users predict for its future?

Connect with us
Email error
©2022 Chipmall Electronics Limited. All Rights Reserved.    Sitemap
We use cookies to offer you a better experience. Detailed information on the use of cookies on this website is provided in our Privacy Policy. By using this site, you consent to the use of our cookies.
Accept