Home » Computer & Software » Hardware » Green Hills Software and INTEGRITY Security Services to Showcase First End-to-End Security and Management Solutions for Next Generation Internet of Things
Ihren XING-Kontakten zeigen

Green Hills Software and INTEGRITY Security Services to Showcase First End-to-End Security and Management Solutions for Next Generation Internet of Things

SANTA BARBARA, CA and IRVINE, CA — (Marketwired) — 04/16/15 — INTEGRITY Security Services (ISS), a Green Hills Software Company, will demonstrate technical security and management solutions supported by valued partners within commercial, industrial, automotive, and defense industries at the RSA Conference 2015 in San Francisco, California, South Hall booth #1933.

This demonstration shows how the certified security policies and isolation architecture of the defeat RAM scraper malware recently used in credit card breaches at several major US retailers.

Web connectivity, secure communications, and machine-to-machine (M2M) management are featured in this demonstration running the security-certified and integrated with the hardware-accelerated cryptography of the Freescale C29x Crypto Coprocessor.

ISS and partner Bedrock Automation® answer the question “What would it take to design a control system strong enough for today–s security threats?” See the latest in industrial control platforms with security built-in from the start. The INTEGRITY Control Manager provides software tamper-detection, secure communication, and the most reliable operation using the INTEGRITY RTOS, managed by the world–s first purpose-built Device Lifecycle Management (DLM) System for device, network, user, software and command authentication.

ISS understands how to secure the connected car of tomorrow because we–re building it today. Partnered with industry leaders, Security Innovation® and Savari®, the ISS Secure Automotive IoT Platform includes everything needed for vehicle-to-vehicle communication development including, on-board equipment to use Freescale i.MX6 processors, trusted operating environment, V2X IEEE 1609-2 protocol stacks, and Security Credential Management System provisioning infrastructure.

Deploy software updates into the most rugged environments with the Kontron® Cobalt embedded computer for aerospace, transportation, and defense (ATD). Incorporating FIPS 140-2 compliant cryptographic toolkits and the ISS Device Lifecycle Management (DLM) system, Kontron ATD offers clients the ability to sign and remotely update trusted software.

INTEGRITY Security Services was established in 2009 by Green Hills Software to provide best-in-class embedded security solutions. ISS products and services secure devices, software, networks, and data — from the smallest embedded component to the largest data center — throughout the product lifecycles. Comprehensive solutions include cryptographic toolkits and high-availability enterprise PKI systems to provide absolute end-to-end security. Learn more about ISS at .

Founded in 1982, Green Hills Software is the largest independent vendor of embedded development solutions. In 2008, the Green Hills INTEGRITY-178B RTOS was the first and only operating system to be to EAL 6+, High Robustness, the highest level of security ever achieved for any software product. Our open architecture integrated development solutions address deeply embedded, absolute security and high-reliability applications for the military/avionics, medical, industrial, automotive, networking, consumer and other markets that demand industry-certified solutions. Green Hills Software is headquartered in Santa Barbara, CA, with European headquarters in the United Kingdom. Visit Green Hills Software at

Green Hills, the Green Hills logo, the INTEGRITY Security Services logo and INTEGRITY are trademarks or registered trademarks of Green Hills Software and/or INTEGRITY Security Services in the U.S. and/or internationally. All other trademarks (registered or otherwise) are the property of their respective owners.

Green Hills Software/INTEGRITY Security Services
Barbel French
805-965-6044

You must be logged in to post a comment Login


Blogverzeichnis - Blog Verzeichnis bloggerei.de Blog Top Liste - by TopBlogs.de Bloggeramt.de blogoscoop