Green Hills Software, the largest independent software vendor for the Internet of Things (IoT), today announced the launch of a new services group, IoT Security Advisors, comprised of security experts from all of Green Hills Software’s business units to provide security services for organizations that must manage the daunting privacy and security challenges associated with the IoT.
The IoT Security Advisors group is the only security organization with experts that have successfully achieved certification to IEC 15408 (Common Criteria) Evaluation Assurance Level 6+, High Robustness, the highest software security level ever attained. All other organizations that have attempted to meet this level have failed. EAL 6+, High Robustness is the certification required to protect “high-valued information” against “sophisticated threat agents.” The group has enabled clients across many industries to certify to the highest levels of security and safety standards including: NIST FIPS 140-2 (cryptography), DIA DCID 6/3 (classified intelligence information systems), NSA Type-1 (crypto devices), FAA/EASA DO-178B/C (avionics), FDA Class II/III (medical), IEC 61508 (industrial), ISO 26262 (automotive), EN 50128 (railway), and others.
Industry analyst, International Data Corporation (IDC), estimates there will be approximately 30 billion connected devices in the IoT by 2020, largely due to explosive growth in embedded device connectivity. The IoT will enable organizations and individual users to benefit from increased efficiencies, convenience, and lower costs. Unfortunately, a whole new generation of Things will be open to hacking, exploitation, and malware; and security techniques deployed thus far have proven ineffective at protecting consumers, governments, and businesses from determined hackers.
Beyond the staggering number of devices on the IoT, the types of Things that may be commandeered for nefarious purposes are equally alarming: cars, trains, traffic lights, power grids, factories, and home appliances to name a few. Our public safety and privacy must not be at the mercy of anonymous hackers, foreign intelligence services, organized crime, or multinational corporations. Manufacturers of insecure devices on the Internet of Things will be subject to lawsuits for invasion of privacy, catastrophic failures from denial of service attacks, recalls, and any harm that comes from devices being commandeered.
IoT Security Advisors services include:
- Embedded, enterprise, mobile, network, and system security design consulting services, comprised of security requirements management, secure software development processes, system architecture, data protection, testing, and security training
- Comprehensive certification assistance for IoT developers who must meet security, safety, and quality standards
- Embedded to enterprise threat and vulnerability assessment services performed by IoT Security Advisors’ leading white hat hackers and security experts regardless of industry, hardware, and operating system
Companies that work with IoT Security Advisors will be able to build products and systems that provide protection of valuable information, protect revenue streams through counterfeit prevention and secure application management, enable secure remote software updates, while reducing the business risks associated with negative brand reputation and potential lawsuits.
“We enable companies to build the Things in the IoT that cannot be hacked and must never fail. Achieving absolute security and total reliability has been our focus spanning the last three decades,” commented David Kleidermacher, chief technology officer of Green Hills Software. “The threats associated with having 30 billion connected devices necessitate security becoming the top priority for companies participating in the IoT. Our team of IoT Security Advisors brings expert system design and security services to companies that need assistance in this area.”
“The Internet of Things is focused on capturing, acting on, and monetizing data in a new world of intelligent systems. The distributed, connected nature of these devices open them up to an array of security concerns and the value of the data will be dependent on its inviolability,” commented Michael J. Palma, research manager for IDC. “This data, the billions of devices, and the networks that support IoT must be secured to drive adoption, protect investments, and win trust from users.”
For more information please contact Green Hills Software