Rechercher
Contactez-nous Suivez-nous sur Twitter En francais English Language
 











Freely subscribe to our NEWSLETTER

Newsletter FR

Newsletter EN

Vulnérabilités

Unsubscribe

INTEGRITY Security Services Launches Industry’s First End-to-End Security Solutions for Next-Generation Internet of Things

May 2015 by Marc Jacob

INTEGRITY Security Services (ISS), a Green Hills Software Company, has announced its new end-to-end IoT Security Solutions addressing both device and key management infrastructure required for secure embedded development.

The ISS Embedded Cryptographic Toolkit (ECT) is a complete set of standards-based, platform-agnostic security protocols with a FIPS 140-2 compliant, Suite B, cryptographic algorithm library for the protection of device software, data, and communication. The Device Lifecycle Management (DLM) System is an enterprise key management infrastructure for securing the manufacturing and management of cryptographic devices.

DLM uses industry-recognized standards for the high-assurance management of keys and operations across multiple product lines and distributed production environments. Engineering, manufacturing, and IT departments use DLM to securely generate software signatures, certificates and unique device keys for all their security products.

ISS Embedded Cryptographic Toolkits combined with the Green Hills INTEGRITY® operating system add an additional level of encryption, authentication, and reliability, protecting critical on-board resources from software failure and cyber security attacks.

INTEGRITY Security Services comprehensive solutions include cryptographic toolkits and high-availability enterprise PKI systems to provide end-to-end security. ISS end-to-end Security Solutions enable IoT devices to:
• Communicate securely without trusting the network
• Ensure software is not tampered
• Encrypt critical data
• Operate reliably
• Remotely update software

The rapid growth of new embedded devices servicing the automotive, aerospace and defence, industrial control, medical, mobility, consumer electronics and networking markets will require unique IP addresses and therefore provide new targets to be spoofed and attacked. This connectivity explosion mandates a focus on securing the smallest embedded component to the largest data centre throughout its lifecycle. With ISS solutions, embedded device manufacturers can rely for the first time on a single supplier to provide a complete suite of embedded security software and an end-to-end system for their embedded software.

Availability
The ISS end-to-end Security Solution is available today.


See previous articles

    

See next articles












Your podcast Here

New, you can have your Podcast here. Contact us for more information ask:
Marc Brami
Phone: +33 1 40 92 05 55
Mail: ipsimp@free.fr

All new podcasts