|Page (1) of 1 - 01/24/12||email article||print page|
Green Hills Software Launches First End-to-End Security Solutions for Next Generation of Security and ManagementSuite B-Compliant Security Protocol Toolkits and End-to-End Device Lifecycle Management Secure Devices, Software, Networks and Content (January 24, 2012)
SAN ANTONIO, TX -- (Marketwire) -- 01/24/12 -- DistribuTECH, Booth 1745 -- Green Hills Software, the largest independent vendor of embedded software solutions and the only provider of an EAL 6+, High Robustness NSA-evaluated and NIAP-certified real-time operating system (RTOS), today announced its new end-to-end ISS Security Solutions consisting of Suite B-Compliant Security Protocol Toolkits and Device Lifecycle Management (DLM) system, delivered by its INTEGRITY Security Services (ISS) business unit.
The Green Hills INTEGRITY® operating systems with an ISS Security Protocol Toolkit will add an additional level of reliability and authenticated security that ensures all embedded devices powered by ISS Solutions are secure. The ISS DLM System is designed from the ground up to meet the special needs of today's most demanding embedded devices and applications and delivers complete end-to-end security solutions for devices in all current and emerging markets.
"Our Partnership with the Green Hills ISS Business Unit met our keys management needs," said Erran Kagan, president of Electro Industries. "With the ISS Security Solutions we can focus on building the world's most advanced smart meters and leave our key management needs to Green Hills."
The ISS solutions will address:
- Authentication - ensuring that users, devices and software on a network are correctly identified
- Authorization - grants the right to access resources and perform specified actions
- Network Access Control - limits access to the network to authenticated and authorized devices, software and users
- Confidentiality - ciphers transform data to make it unreadable to anyone except those authorized and authenticated
- Integrity - detects unauthorized changes to transmitted data through the lifecycle of a device, software and data
- Remote Management - monitor, update and manage remotely manufactured and fielded devices
The ISS DLM System and the ISS Embedded Cryptographic Toolkit are based on the Green Hills proprietary, Federal Information Processing Standards (FIPS)-compliant Embedded Cryptographic Toolkit and Security Protocol Toolkits.
Suite B-Compliant Security Protocol Toolkits
The ISS Embedded Cryptographic Toolkit meets the latest government standards and provides the underlying FIPS-compliant cryptographic primitives for use with a comprehensive complement of cryptographic algorithms. The ISS Security Toolkits are designed to be small, scalable and certifiable by the US Government, with support available for Windows®, Linux, VxWorks®, INTEGRITY, INTEGRITY-178B and general-purpose operating systems on ARM®, Intel®, Power Architecture®, MIPS® and other processor architectures. The Toolkits consist of:
- ISS SSL;
- ISS IPSec/Ike v1/2;
- ISS SSH;
- ISS Secure Loader; and
- ISS Key Mask.
Device Lifecycle Management (DLM) System
The ISS DLM System offers the following services:
- DLM Key Management(SM);
- DLM INTEGRITY Tracker(SM);
- DLM Enable(SM);
- DLM INTEGRITY Armor(SM); and
- DLM INTEGRITY Service(SM).
The rapid growth of new embedded devices servicing the automotive, aerospace and defense, industrial control, medical, mobility, consumer electronics and networking markets, will require unique IP addresses and therefore provide new targets to be spoofed and attacked. This connectivity explosion mandates a focus on securing the smallest embedded component to the largest data center throughout its lifecycle. With ISS solutions, embedded device manufacturers can rely for the first time on a single supplier to provide a complete suite of embedded security software and an end-to-end system for their embedded software.
"Our Customers are requesting highly reliable security solutions as one of their top priorities," said Dan O'Dowd, chief executive officer and founder of Green Hills Software. "With our INTEGRITY Security Services solutions and our secure INTEGRITY-178B, EAL 6+ certified operating system technology, we are able to secure all layers of all embedded devices."
The ISS DLM System is available today. If your projects mandate the latest US Government required security, contact your local Green Hills Sales Representative or email email@example.com.
About Green Hills Software
Founded in 1982, Green Hills Software is the largest independent vendor of embedded development solutions. In 2008, the Green Hills INTEGRITY-178B RTOS was the first and only operating system to be certified by NIAP (National Information Assurance Partnership comprised of NSA & NIST) to EAL 6+, High Robustness, the highest level of security ever achieved for any software product. Our open architecture integrated development solutions address deeply embedded, absolute security and high-reliability applications for the military/avionics, medical, industrial, smart energy, automotive, networking, consumer and other markets that demand industry-certified solutions. Green Hills Software is headquartered in Santa Barbara, CA with European headquarters in the United Kingdom. Visit Green Hills Software at www.ghs.com.
Green Hills, the Green Hills logo and INTEGRITY are trademarks or registered trademarks of Green Hills Software in the U.S. and/or internationally. All other trademarks are the property of their respective owners.
Green Hills Software
Copyright @ Marketwire
Related Keywords: Suite B, security protocol, DLM, device lifecycle, toolkits, smart meters, cryptographic, FIPS, Digital Media Software, Sales, Applications, Sales & Marketing, Security, Networking, Computer Technology, Internet, Business Issues, Connectivity, Architecture, Security, Internet Server Applications, E-mail, Management, Sales, Sales, USA, Marketwire, , Consumer Electronics, Computer Science, Business, Email, england, Other,