industry news
Subscribe Now

INTEGRITY Security Services Launches Industry’s First End-to-End Security Solutions for Next-Generation Internet of Things

SAN FRANCISCO, CA — April 20, 2015 — RSA Conference 2015, booth S1933 — INTEGRITY Security Services (ISS), a Green Hills Software Company, today announced its new end-to-end IoT Security Solutions addressing both device and key management infrastructure required for secure embedded development.

The ISS Embedded Cryptographic Toolkit (ECT) is a complete set of standards-based, platform-agnostic security protocols with a FIPS 140-2 compliant, Suite B, cryptographic algorithm library for the protection of device software, data, and communication. The Device Lifecycle Management (DLM) System is an enterprise key management infrastructure for securing the manufacturing and management of cryptographic devices.

DLM uses industry-recognized standards for the high-assurance management of keys and operations across multiple product lines and distributed production environments. Engineering, manufacturing, and IT departments use DLM to securely generate software signatures, certificates and unique device keys for all their security products.

“Our partnership with INTEGRITY Security Services meets our keys management needs,” said Bob Honor, president of Bedrock Automation. “With the ISS Security Solutions we can focus on building the world’s most secure industrial controller and leave our key management needs to INTEGRITY Security Services.”

ISS Embedded Cryptographic Toolkits combined with the Green Hills INTEGRITY® operating system add an additional level of encryption, authentication, and reliability, protecting critical on-board resources from software failure and cyber security attacks.

INTEGRITY Security Services comprehensive solutions include cryptographic toolkits and high-availability enterprise PKI systems to provide end-to-end security. ISS end-to-end Security Solutions enable IoT devices to:

     • Communicate securely without trusting the network
     • Ensure software is not tampered
     • Encrypt critical data
     • Operate reliably
     • Remotely update software

The rapid growth of new embedded devices servicing the automotive, aerospace and defense, industrial control, medical, mobility, consumer electronics and networking markets will require unique IP addresses and therefore provide new targets to be spoofed and attacked. This connectivity explosion mandates a focus on securing the smallest embedded component to the largest data center throughout its lifecycle. With ISS solutions, embedded device manufacturers can rely for the first time on a single supplier to provide a complete suite of embedded security software and an end-to-end system for their embedded software.

“Our customers are requesting highly reliable security solutions as one of their top priorities,” said David Sequino, vice president and general manager of INTEGRITY Security Services. “With our INTEGRITY Security Services solutions and the Green Hills secure INTEGRITY-178 EAL 6+ certified operating system technology, we are able to secure all layers of all embedded devices.”

Availability

The ISS end-to-end Security Solution is available today. For more information, contact info-iss@ghs.com.

About INTEGRITY Security Services

INTEGRITY Security Services was established in 2009 by Green Hills Software to provide best-in-class embedded security solutions. ISS products and services secure devices, software, networks, and data—from the smallest embedded component to the largest data center—throughout the product lifecycles. Comprehensive solutions include cryptographic toolkits and high-availability enterprise PKI systems to provide end-to-end security.  Learn more about ISS at www.ghsiss.com

Leave a Reply

featured blogs
May 2, 2024
I'm envisioning what one of these pieces would look like on the wall of my office. It would look awesome!...
Apr 30, 2024
Analog IC design engineers need breakthrough technologies & chip design tools to solve modern challenges; learn more from our analog design panel at SNUG 2024.The post Why Analog Design Challenges Need Breakthrough Technologies appeared first on Chip Design....

featured video

Why Wiwynn Energy-Optimized Data Center IT Solutions Use Cadence Optimality Explorer

Sponsored by Cadence Design Systems

In the AI era, as the signal-data rate increases, the signal integrity challenges in server designs also increase. Wiwynn provides hyperscale data centers with innovative cloud IT infrastructure, bringing the best total cost of ownership (TCO), energy, and energy-itemized IT solutions from the cloud to the edge.

Learn more about how Wiwynn is developing a new methodology for PCB designs with Cadence’s Optimality Intelligent System Explorer and Clarity 3D Solver.

featured paper

Designing Robust 5G Power Amplifiers for the Real World

Sponsored by Keysight

Simulating 5G power amplifier (PA) designs at the component and system levels with authentic modulation and high-fidelity behavioral models increases predictability, lowers risk, and shrinks schedules. Simulation software enables multi-technology layout and multi-domain analysis, evaluating the impacts of 5G PA design choices while delivering accurate results in a single virtual workspace. This application note delves into how authentic modulation enhances predictability and performance in 5G millimeter-wave systems.

Download now to revolutionize your design process.

featured chalk talk

Electrical Connectors for Hermetically Sealed Applications
Sponsored by Mouser Electronics and Bel
Many hermetic chambers today require electrical pathways to provide internal equipment with power, data or signals, or to receive data and signals from equipment within the chamber. In this episode of Chalk Talk, Amelia Dalton and Brad Taras from Cinch Connectivity Solutions explore the role that seals and connectors play in the performance of hermetic chambers. They examine the methodologies to determine hermetic seal leaks, the benefits of epoxy hermetic seals, and how Cinch Connectivity’s epoxy-based seals and hermetic connectors can add value to your next design.
Aug 22, 2023
30,475 views