New INTEGRITY RTOS business unit Green Hills focused on security services launched by Green Hills Software

SAN JOSE, Calif., 3 May 2011. Officials at Green Hills Software in Santa Barbara, Calif., announced a new business unit called INTEGRITY Security Services (ISS), based around the company's INTEGRITY real-time operating system (RTOS). The unit will focus on  the security and management of devices, software, networks and content in the embedded computing and special-purpose computing market. Company officials are showcasing this technology this week at the — Embedded Systems Conference in San Jose, Calif., at booth #916.

May 3rd, 2011

Posted by John McHale
SAN JOSE, Calif., 3 May 2011. Officials at Green Hills Software in Santa Barbara, Calif., announced a new business unit called INTEGRITY Security Services (ISS), based around the company's INTEGRITY real-time operating system (RTOS). The unit will focus on the security and management of devices, software, networks and content in the embedded computing and special-purpose computing market. Company officials are showcasing this technology this week at the Embedded Systems Conference in San Jose, Calif., at booth #916.
INTEGRITY Security Services Toolkits, provided by ISS, are based on the Green Hills proprietary Federal Information Processing Standards (FIPS) compliant Cryptographic Toolkit. The ISS Cryptographic Toolkit meets the latest government standards and also provides the underlying FIPS-compliant cryptographic primitives for use with a comprehensive complement of security protocols. The toolkits are designed to be small, scalable, and certifiable by the U.S. government. Support is available for Windows, Linux, VxWorks, INTEGRITY, INTEGRITY-178B and general-purpose operating systems on ARM, Intel, Power Architecture, MIPS, and other processor architectures.
INTEGRITY is an EAL6+, NSA-evaluated, and NIAP-certified RTOS.
Starting with the security toolkits and leveraging all of Green Hills Software's technology, the ISS business unit will deliver complete end-to-end security solutions for devices in all current and emerging markets.
Every new connected embedded device will be identified with a unique IP address that becomes a target to be spoofed and attacked. Embedded devices in the automotive, aerospace and defense, industrial control, medical device, mobility, consumer electronics and networking markets will all be connected in some way. This connectivity explosion mandates a focus on securing components, devices, software, networks and data from the smallest embedded component to the largest data center throughout the lifecycle of each embedded device, Green Hills Software officials say. Embedded operating systems control these ubiquitous computers. The INTEGRITY and INTEGRITY-178B operating systems will be offered with an ISS toolkit and will have reliable and authenticated security software around it to ensure all embedded devices powered by ISS Security Toolkits are secure.
The ISS solutions will focus on addressing:
-authentication - the process of ensuring that users, devices and software on a network are correctly identified; -authorization -- grants users and devices the right to access resources and perform specified actions;
-network access control -- mechanisms that limit access to the network to authenticated and authorized devices, software and users;
confidentiality -- using ciphers to transform data to make it unreadable to anyone except those authorized and authenticated to view the data;
-Integrity -- checking mechanisms are designed to detect unauthorized changes to transmitted data through the lifecycle of a device, software and data; and
-remote management -- a method to monitor, update and manage remotely manufactured and fielded devices. "Our Customers are requesting high assurance security solutions as one of their top priorities," says Dan O’Dowd, chief executive officer and founder of Green Hills Software. "With INTEGRITY Security Services solutions and our multi-level secure INTEGRITY-178B EAL6+ certified operating system technology we will be able to secure all layers of all embedded devices."
The Security Toolkits of INTEGRITY Secure Services are available today on a wide variety of microprocessor architectures and operating systems. For the remainder of calendar year 2011, Green Hills Software is offering the ISS Embedded Cryptographic Toolkit to new and existing INTEGRITY and INTEGRITY-178B development licensees at no additional cost for a 12-month period on all currently supported platforms. For projects mandating the latest U.S. government required encryption algorithms, email info-iss@ghs.com.

More in Computers