Proving the Business Case for the Internet of Things

Green Hills security toolkit addresses IoT devices and infrastructure

Steve Rogerson
April 20, 2015
Integrity Security Services, a subsidiary of California-based Green Hills Software, has announced an end-to-end IoT security product addressing both device and key management infrastructure required for secure embedded development.
The ISS ECT embedded cryptographic toolkit is a set of standards-based, platform-agnostic security protocols with a Fips 140-2 compliant, suite B, cryptographic algorithm library for protecting device software, data and communications. The device lifecycle management (DLM) system is an enterprise key management infrastructure for securing the manufacturing and management of cryptographic devices.
DLM uses industry-recognised standards for the assurance management of keys and operations across multiple product lines and distributed production environments. Engineering, manufacturing and IT departments use DLM to generate software signatures, certificates and unique device keys securely for all their security products.
“Our partnership with Integrity Security Services meets our keys management needs,” said Bob Honor, president of Bedrock Automation. “With the ISS security we can focus on building the world’s most secure industrial controller and leave our key management needs to Integrity Security Services.”
The toolkits combined with the Green Hills Integrity operating system add an additional level of encryption, authentication and reliability, protecting critical on-board resources from software failure and cyber security attacks.
ISS products include cryptographic toolkits and high-availability enterprise PKI systems to provide end-to-end security. They enable IoT devices to communicate securely without trusting the network, ensure software is not tampered, encrypt critical data, operate reliably and remotely update software.
The rapid growth of embedded devices servicing the automotive, aerospace, military, industrial control, medical, mobility, consumer electronics and networking markets will require unique IP addresses and therefore provide new targets to be spoofed and attacked. This connectivity explosion mandates a focus on securing the smallest embedded component to the largest data centre throughout its lifecycle. With ISS, the company claims embedded device manufacturers can rely for the first time on a single supplier to provide a complete suite of embedded security software and an end-to-end system for their embedded software.
“Our customers are requesting highly reliable security as one of their top priorities,” said David Sequino, vice president and general manager of ISS. “With our Integrity Security Services and the Green Hills secure Integrity-178 EAL 6+ certified operating system technology, we are able to secure all layers of all embedded devices.”