industry news
Subscribe Now

Green Hills Software Announces IoT Security Advisors Program

Green Hills Software, the largest independent software supplier for the Internet of Things (IoT), has announced the launch of a new services group, IoT Security Advisors, comprised of security experts from all of Green Hills Software’s business units to provide security services for organisations that must manage the daunting privacy and security challenges associated with the IoT.

The IoT Security Advisors group is the only security organisation with experts that have successfully achieved certification to IEC 15408 (Common Criteria) Evaluation Assurance Level 6+, High Robustness, the highest software security level ever attained. All other organisations that have attempted to meet this level have failed. EAL 6+, High Robustness is the certification required to protect “high-valued information” against “sophisticated threat agents.” The group has enabled clients across many industries to certify to the highest levels of security and safety standards including: NIST FIPS 140-2 (cryptography), DIA DCID 6/3 (classified intelligence information systems), NSA Type-1 (crypto devices), FAA/EASA DO-178B/C (avionics), FDA Class II/III (medical), IEC 61508 (industrial), ISO 26262 (automotive), EN 50128 (railway), and others.

Industry analyst, International Data Corporation (IDC), estimates there will be approximately 30 billion connected devices in the IoT by 2020, largely due to explosive growth in embedded device connectivity. The IoT will enable organisations and individual users to benefit from increased efficiencies, convenience, and lower costs. Unfortunately, a whole new generation of Things will be open to hacking, exploitation, and malware; and security techniques deployed thus far have proven ineffective at protecting consumers, governments, and businesses from determined hackers.

Beyond the staggering number of devices on the IoT, the types of Things that may be commandeered for nefarious purposes are equally alarming: cars, trains, traffic lights, power grids, factories, and home appliances to name a few. Our public safety and privacy must not be at the mercy of anonymous hackers, foreign intelligence services, organised crime, or multinational corporations. Manufacturers of insecure devices on the Internet of Things will be subject to lawsuits for invasion of privacy, catastrophic failures from denial of service attacks, recalls, and any harm that comes from devices being commandeered.

IoT Security Advisors services include:

  • Embedded, enterprise, mobile, network, and system security design consulting services, comprised of security requirements management, secure software development processes, system architecture, data protection, testing, and security training
  • Comprehensive certification assistance for IoT developers who must meet security, safety, and quality standards
  • Embedded to enterprise threat and vulnerability assessment services performed by IoT Security Advisors’ leading white hat hackers and security experts regardless of industry, hardware, and operating system

Companies that work with IoT Security Advisors will be able to build products and systems that provide protection of valuable information, protect revenue streams through counterfeit prevention and secure application management, enable secure remote software updates, while reducing the business risks associated with negative brand reputation and potential lawsuits.

“We enable companies to build the Things in the IoT that cannot be hacked and must never fail. Achieving absolute security and total reliability has been our focus spanning the last three decades,” commented David Kleidermacher, chief technology officer of Green Hills Software. “The threats associated with having 30 billion connected devices necessitate security becoming the top priority for companies participating in the IoT. Our team of IoT Security Advisors brings expert system design and security services to companies that need assistance in this area.”

“The Internet of Things is focused on capturing, acting on, and monetising data in a new world of intelligent systems. The distributed, connected nature of these devices open them up to an array of security concerns and the value of the data will be dependent on its inviolability,” commented Michael J. Palma, research manager for IDC. “This data, the billions of devices, and the networks that support IoT must be secured to drive adoption, protect investments, and win trust from users.”

Availability

Green Hills Software’s IoT Security Advisors is the only team equipped to defeat the myriad of threats to the connected world. The group offers a free initial consultation to companies that want to build secure systems for the IoT.  IoT Security Advisors’services are available today. 

About Green Hills Software

Founded in 1982, Green Hills Software is the largest independent supplier of embedded development solutions. In 2008, the Green Hills INTEGRITY-178B RTOS was the first and only operating system to be certified by NIAP (National Information Assurance Partnership comprised of NSA and NIST) to EAL 6+, High Robustness, the highest level of security ever achieved for any software product. Our open architecture integrated development solutions address deeply embedded, absolute security and high-reliability applications for the military/avionics, medical, industrial, automotive, networking, consumer and other markets that demand industry-certified solutions. Green Hills Software is headquartered in Santa Barbara, CA, with European headquarters in the United Kingdom. Visit Green Hills Software atwww.ghs.com.

Leave a Reply

featured blogs
Jan 29, 2026
Most of the materials you read and see about gyroscopic precession explain WHAT happens, not WHY it happens....

featured chalk talk

Speed Matters: Methods and Methodologies to Get the Most Performance
In this episode of Chalk Talk, Ludovic Jacomme from Siemens and Amelia Dalton investigate the benefits that Siemens Veloce proFPGA CS can bring to your next FPGA-based prototyping project and how you can take advantage of this solution today.
Jan 19, 2026
14,885 views