End-to-end security solutions for next-generation Internet of Things
The ISS Embedded Cryptographic Toolkit (ECT) is a complete set of standards-based, platform-agnostic security protocols with a FIPS 140-2 compliant, Suite B, cryptographic algorithm library for the protection of device software, data, and communication. The Device Lifecycle Management (DLM) System is an enterprise key management infrastructure for securing the manufacturing and management of cryptographic devices.
DLM uses industry-recognised standards for the high-assurance management of keys and operations across multiple product lines and distributed production environments. Engineering, manufacturing, and IT departments use DLM to securely generate software signatures, certificates and unique device keys for all their security products.
ISS Embedded Cryptographic Toolkits combined with the Green Hills INTEGRITY operating system add an additional level of encryption, authentication, and reliability, protecting critical on-board resources from software failure and cyber security attacks.
INTEGRITY Security Services comprehensive solutions include cryptographic toolkits and high-availability enterprise PKI systems to provide end-to-end security. ISS end-to-end Security Solutions enable IoT devices to:
Communicate securely without trusting the network
Ensure software is not tampered
Encrypt critical data
Operate reliably
Remotely update software
A user endorsement comes from Bob Honor, president of secure-industrial-automation maker Bedrock Automation. “With the ISS Security Solutions we can focus on building the world’s most secure industrial controller and leave our key management needs to INTEGRITY Security Services.”
The company comments; the rapid growth of new embedded devices servicing the automotive, aerospace and defence, industrial control, medical, mobility, consumer electronics and networking markets will require unique IP addresses and therefore provide new targets to be spoofed and attacked. This connectivity explosion mandates a focus on securing the smallest embedded component to the largest data centre throughout its lifecycle. “Our customers are requesting highly reliable security solutions as one of their top priorities,” said David Sequino, vice president and general manager of INTEGRITY Security Services. “With our INTEGRITY Security Services solutions and the Green Hills secure INTEGRITY-178 EAL 6+ certified operating system technology, we are able to secure all layers of all embedded devices.”
Green Hills Software; www.ghs.com