Media Relations for a Connected World
Protect your embedded devices & systems from cyber-attacks
Two capabilities make the Icon Labs FSF stand out from other cyber defense solutions: Secure Boot and Intrusion Detection. Floodgate Secure Boot provides a critical security capability for embedded devices by ensuring that only validated code from the device OEM is allowed to run. This prevents attackers from replacing firmware with versions created to perform malicious operations. Secure boot utilises code signing to verify the authenticity and integrity of firmware prior to execution. Floodgate Secure Boot provides the APIs required for code signing, code validation and secure firmware updates.
Floodgate Intrusion Detection monitors system activity and configuration to detect unauthorised changes to the system. These changes are reported to a security management system. Engineers integrating Floodgate Intrusion Detection into their device can select the appropriate response based upon the severity of the threat and the specific requirements of their device. Supported responses include event logging, alert generation, shutting down the device, operating in ‘safe mode’, wiping data and deleting firmware. Floodgate Intrusion Detection can also support customisable responses to detected threats.
Read the entire article at Electronic Specifier - http://www.electronicspecifier.com/design-automation/protect-your-embedded-devices-systems-from-cyber-attacks