Icon Labs Launches Floodgate Security Framework Comprehensive security solution for the development of secure, managed, trusted devices

First to Include Secure Boot and Intrusion Detection Features

May 6, 2015 -West Des Moines, Iowa -- Icon Labs today announced the availability of their new Floodgate Security Framework (FSF) to protect embedded devices and systems from cyber-attack.  Internet-based attacks are on the rise and an increasing number of these attacks are targeting embedded devices. Cyber-criminals, hacking bots, industrial or international espionage agents and even terrorist groups are now targeting industrial, military, automotive and medical devices as well as utility systems.

According to Alan Grau, CEO and Founder of Icon Labs, “In IT security, endpoints must be authenticated, trusted, secured and managed before they are allowed to operate on the corporate network. IT/OT convergence and the emergence of security standards in various industries require that embedded devices provide the same security capabilities as IT devices.”

The Floodgate Security Framework provides:

  • Management system integration for IT/OT convergence. 
  • Security capabilities to ensure devices are protected from attack. 
  • Building blocks for compliance with security standards including NERC-CIP and EDSA.

Two new capabilities make the Icon Labs Floodgate Security Framework stand out from other cyber defense solutions – Secure Boot and Intrusion Detection.  

Floodgate Secure Boot provides a critical security capability for embedded devices by ensuring that only validated code from the device OEM is allowed to run. This prevents attackers from replacing firmware with versions created to perform malicious operations. Secure boot utilizes code signing to verify the authenticity and integrity of firmware prior to execution. Floodgate Secure Boot provides the APIs required for code signing, code validation and secure firmware updates. The Floodgate Secure Boot data sheet is available at http://www.iconlabs.com/prod/files/fg-secureboot-ds-april-2015pdf#overlay-context=resources

Floodgate Intrusion Detection monitors system activity and configuration to detect unauthorized changes to the system. These changes are reported to a security management system. Engineers integrating Floodgate IDS into their device can select the appropriate response based upon the severity of the threat and the specific requirements of their device. Supported responses include event logging, alert generation, shutting down the device, operating in “safe mode”, wiping data, and deleting firmware. Floodgate IDS can also support customizable responses to detected threats.  The Floodgate Intrusion Detection data sheet is available at  http://www.iconlabs.com/prod/files/fg-ids-ds-april-2015pdf#overlay-context=resources 

The Floodgate Security Framework also provides Root of Trust/Chain of Trust, Run-Time Integrity Validation, Application Guarding APIs, Secure Device Manifest support, an embedded firewall, and integration with various security management systems. These capabilities provide the building blocks for achieving EDSA Certification, ISA/IEC 62443 Compliance, and/or compliance with the NIST Cybersecurity framework

FSF is the only security solution for embedded devices providing both device protection capabilities and security management for any embedded OS . Floodgate Security Framework has been ported to a wide range of RTOSes including VxWorks, Nucleus, INTEGRITY, embedded Linux, μC/OS-III and RTXC.

 

About Icon Laboratories, Inc.

Icon Labs, a 2014 Gartner “Cool Vendor”, is a leading provider of embedded software for device security, device protection and networking management, including the award winning Floodgate Defender. Founded in 1992, Icon Labs is headquartered in West Des Moines, Iowa. For more information, visit www.iconlabs.com, send email to Email Contact, or call 1.888.235.3443 (U.S. and Canada) or 515.226.3443 (International). 

Contacts:

Mark Shapiro, PR for Icon Labs
Tel: 619-249-7742
Email: Email Contact

 



Read the complete story ...


Review Article Be the first to review this article
Featured Video
Editorial
Peggy AycinenaWhat Would Joe Do?
by Peggy Aycinena
Job Openings: Can EDA Predict the Future
More Editorial  
Jobs
Lead Java Platform Engineer IOT-WEB for EDA Careers at San Francisco Area, CA
ASIC Design Engineer 2 for Ambarella at Santa Clara, CA
Test Development Engineer(Job Number: 17001697) for Global Foundaries at Santa Clara, CA
ASIC Design Engineer for Ambarella at Santa Clara, CA
Technical Support Engineer for EDA Careers at Freemont, CA
Technical Support Engineer Germany/UK for EDA Careers at San Jose, CA
Upcoming Events
CDNLive Silicon Valley 2017 at Santa Clara Convention Center Santa Clara CA - Apr 11 - 12, 2017
10th Anniversary of Cyber-Physical Systems Week at Pittsburgh, PA, USA PA - Apr 18 - 21, 2017
DVCon 2017 China, April 19, 2017, Parkyard Hotel Shanghai, China at Parkyard Hotel Shanghai Shanghai China - Apr 19, 2017
Zuken Innovation World 2017 at Hilton Head Marriott Resort & Spa Hilton Head Island NC - Apr 24 - 26, 2017
S2C: FPGA Base prototyping- Download white paper



Internet Business Systems © 2017 Internet Business Systems, Inc.
595 Millich Dr., Suite 216, Campbell, CA 95008
+1 (408)-337-6870 — Contact Us, or visit our other sites:
AECCafe - Architectural Design and Engineering TechJobsCafe - Technical Jobs and Resumes GISCafe - Geographical Information Services  MCADCafe - Mechanical Design and Engineering ShareCG - Share Computer Graphic (CG) Animation, 3D Art and 3D Models
  Privacy Policy