industry news
Subscribe Now

Icon Labs Announces The Internet of Secure Things™ Initiative

  • Protecting the Perimeter is Not Enough – Devices need to be Secure 
  • Devices Using Real Time Operating Systems Need to Be Protected
  •  New Internet of Secure Things White Paper

November 5, 2014 – West Des Moines, IA – Icon Labs (www.iconlabs.com), a leading provider of embedded networking and security technology, today announced its Internet of Secure Things Initiative.

The Internet of Things has become a ubiquitous term to describe the tens of billions of devices that have sensing or actuation capabilities, and are connected to each other via the Internet. Until recently, security has not been a high priority for these devices.  It is now time to establish The Internet of Secure Things.

There has been a lot of discussion regarding the hacking of devices and systems to obtain information and data. However, just as critical are cyber-attacks against the devices themselves – attacks that take control and cause devices to operate in dangerous and insecure ways.

Unfortunately many of these systems – thought to be safe – are still vulnerable. For instance, even though Industrial Automation and Critical Infrastructure devices are usually installed inside the secure perimeter of an enterprise network, that perimeter is porous and can be easily penetrated or disabled. On top of that, insider threats, whether malicious or accidental, make up 70% of the attacks, and they usually originate inside that perimeter.

“Many of today’s modern embedded devices and systems are complex connected devices charged with performing critical functions,” says Alan Grau, CEO of Icon Labs.  “Including security in these devices is a critical design task.  Security features must be considered early in the design process to ensure the device is protected from the advanced cyber-threats they will be facing now as well as attacks that will be created in the future.  These are the steps to make your things fit into the Internet of Secure Things.”

In a recently published report by Gartner, they said that “Digital security leaders should collaborate with software and system developers to ensure security is intrinsic in architecture and approach. They must also incorporate the management and operational requirements for the embedded software and system security design, including security policy enforcement, access control policies, virtualization techniques, application security testing, quality assurance and areas for development.”  These capabilities provide the foundational requirements for the Internet of Secure Things.

The required security capabilities for the Internet of Secure Things initiative, described in Icon Labs’ new White Paper – “The Internet of Secure Things – What is Really Needed to Secure the Internet of Things?”, can be downloaded for free at http://www.iconlabs.com/sites/default/files/Internet%20of%20Secure%20Things.pdf.

Icon Labs delivers a full suite of security solutions to secure embedded and IoT devices and enabled Internet of Secure Things Initiative.  The Floodgate product family provides a security framework that is designed specifically for use in embedded and RTOS-based devices. Floodgate products support management system integration for policy management, event reporting and situational awareness. Icon Labs also provides solutions to harden the device, secure communication channels, and block DoS attacks. In addition to embedded security software and hardware solutions, Icon Labs provides professional services capabilities to accelerate customer deployments and facilitate unique implementation. Icon Labs helps you secure YOUR things.

About Icon Laboratories, Inc.

Icon Labs, a 2014 Gartner “Cool Vendor”, is a leading provider of embedded software for device security, device protection and networking management, including the award winning Floodgate Defender. Founded in 1992, Icon Labs is headquartered in West Des Moines, Iowa. For more information, visit www.iconlabs.com, send email to info@iconlabs.com, or call 1.888.235.3443 (U.S. and Canada) or 515.226.3443 (International).

Leave a Reply

featured blogs
Apr 24, 2026
A thought experiment in curiosity, confusion, and cosmic consequences....

featured paper

Quickly and accurately identify inter-domain leakage issues in IC designs

Sponsored by Siemens Digital Industries Software

Power domain leakage is a major IC reliability issue, often missed by traditional tools. This white paper describes challenges of identifying leakage, types of false results, and presents Siemens EDA’s Insight Analyzer. The tool proactively finds true leakage paths, filters out false positives, and helps circuit designers quickly fix risks—enabling more robust, reliable chip designs. With detailed, context-aware analysis, designers save time and improve silicon quality.

Click to read more

featured chalk talk

Nexperia GaN Power Proliferating in All Things Motor Control/Drive
Sponsored by Mouser Electronics and Nexperia
In this episode of Chalk Talk, Art Gonsky from Nexperia and Amelia Dalton discuss the biggest challenges of electric motors and controllers and how GaN power solutions can help solve these issues. They  also investigate how silicon, silicon carbide and GaN power solutions compare and how Nexperia and NXP technologies can get your next motor control design up and running in no time!     
Mar 25, 2026
30,228 views