SANTA BARBARA, Calif., 1 Feb. 2012. Green Hills Software in Santa Barbara, Calif., is introducing the end-to-end ISS Security Solutions software engineering tools suite for the company's Integrity real-time operating system (RTOS). ISS Security Solutions consists of Security Protocol Toolkits and Device Lifecycle Management (DLM) system that meet Suite-B crypto modernization guidelines.
The Green Hills Integrity operating systems with an ISS Security Protocol Toolkit will enhance reliability and authenticated secure software, Green Hills officials say. The ISS DLM System is for embedded computing devices and applications.
The software tools include authentication to ensure that users, devices, and software on a network are correctly identified; authorization that grants the right to access resources and perform specified actions; network access control that limits access to the network to authenticated and authorized devices, software, and users; confidentiality ciphers that transform data to make it unreadable to anyone except those authorized and authenticated; integrity that detects unauthorized changes to transmitted data through the lifecycle of a device, software, and data; and remote management to monitor, update, and manage remotely manufactured and fielded devices.
The ISS DLM System and the ISS Embedded Cryptographic Toolkit are based on the Green Hills proprietary, Federal Information Processing Standards (FIPS)-compliant Embedded Cryptographic Toolkit and Security Protocol Toolkits.
The ISS Embedded Cryptographic Toolkit meets provides the underlying FIPS-compliant cryptographic primitives for use with cryptographic algorithms. The ISS Security Toolkits are designed to be small, scalable, and certifiable by the U.S. Government, with support available for Windows, Linux, VxWorks, Integrity, Integrity-178B, and general-purpose operating systems on ARM, Intel, Power Architecture, MIPS, and other processor architectures.
The ISS DLM System offers the following services: DLM Key Management; DLM Integrity Tracker; DLM Enable; DLM Integrity Armor; and DLM Integrity Service.
The rapid growth of new embedded devices aerospace and defense, industrial control, medical, automotive, mobility, consumer electronics, and networking applications require unique IP addresses, and provide targets to hackers to be spoofed and attacked, mandating a focus on securing the smallest embedded component to the largest data center throughout its lifecycle, Green Hills officials say.
For more information contact Green Hills Software online at www.ghs.com.