Click here to close now.

SYS-CON MEDIA Authors: JP Morgenthal, AppDynamics Blog, John Wetherill, Harry Trott, Roger Strukhoff

News Feed Item

Green Hills Software Adds New Levels of Security for Networking and Cryptographic Computing

Green Hills INTEGRITY RTOS and Embedded Cryptographic Toolkit Integrated With Freescale C29x Cryptographic Coprocessor

NUREMBERG, GERMANY and SAN FRANCISCO, CA -- (Marketwired) -- 02/25/14 -- embedded world, Hall 4, Stand 325 and RSA Conference -- Green Hills Software, the largest independent vendor of embedded software solutions, today announced its multi-tiered integration with the Freescale Semiconductor C29x cryptographic coprocessor family. The Green Hills solution, comprised of its INTEGRITY® real-time operating system (RTOS), Embedded Cryptographic Toolkit and advanced MULTI® integrated development environment (IDE), is optimized to utilize the C29x security engines (SEC). This will enable designers to efficiently accommodate the exploding demand for secure processing in applications, such as data center computing, hardware security modules and security appliances, used in government, banking, and defense systems.

"As modern commerce and communications require higher levels of security, Freescale's C29x crypto coprocessor family brings new scalability in both power and performance at a low cost," said Tareq Bustami, vice president of product management for Freescale's Digital Networking business. "Green Hills Software brings to us industry leadership for software security through its INTEGRITY RTOS and Embedded Cryptographic Toolkit."

Compute-intensive math behind key transactions and secure network communications quickly saturates today's general-purpose processors and even multicore SoCs with cryptographic acceleration. The C29x security engine (SEC) offloads this processing with unparalleled performance.

Green Hills expands its existing security solutions by incorporating the computational acceleration of the C29x coprocessor, thus offering customers a three-pronged end-to-end solution for the stringent requirements of embedded secure networking and cryptographic module computing:

  • The INTEGRITY RTOS is the ideal run-time foundation for secure processing -- certified as the most secure operating system in the world (Common Criteria EAL 6+, High Robustness). The INTEGRITY separation architecture and scheduling policies guarantee real-time determinism, application separation and quality of service. The INTEGRITY RTOS offers an extensive array of integrated middleware for file systems, wireless, IPv4/v6 networking, graphics and connectivity.
  • The Embedded Cryptographic Toolkit from Green Hills provides a complete set of C- language cryptographic algorithms, random number generators, secret-key and public-key cryptography and secure networking protocols, validated to FIPS 140-2 level 1 and meeting the NSA Suite B Standard:
    • High Assurance Embedded Cryptographic Toolkit (HA-ECT) is a complete set of cryptographic algorithms, including AES encryption and Elliptic Curve Cryptography (ECC) for key agreement and digital signatures
    • SSL 3.0/TLS 1.0 server and client protocol supporting RSA, PKCSv1.5, DES, 3DES, AES, RC4, SHA1, SHA2, MD2, MD4, MD5, RNG, OCSP and SCEP for certificate management
    • IPsec/IKEv2 for secure IP packet communication with peer authentication, encryption and message integrity using AES, DES, 3DES, Diffie-Hellman, SHA1, MD5
    • Portable SSH developers kit for interactive shell and tunneled TCP/IP security layer
  • The MULTI IDE and Green Hills JTAG probe are a complete software and hardware environment for building embedded applications in C, C++, and Embedded C++, enabling software developers to create a more reliable product, brought to market more quickly, with lower development costs.

Availability
The INTEGRITY RTOS and Embedded Cryptographic Toolkit are available now and will be demonstrated at the RSA Conference, February 24-28 in San Francisco in the Freescale exhibitor stand, South Expo #1733.

About Green Hills Software
Founded in 1982, Green Hills Software is the largest independent vendor of embedded development solutions. In 2008, the Green Hills INTEGRITY-178 RTOS was the first and only operating system to be certified by NIAP (National Information Assurance Partnership comprised of NSA & NIST) to EAL 6+, High Robustness, the highest level of security ever achieved for any software product. Our open architecture integrated development solutions address deeply embedded, absolute security and high-reliability applications for the military/avionics, medical, industrial, automotive, networking, consumer and other markets that demand industry-certified solutions. Green Hills Software is headquartered in Santa Barbara, CA, with European headquarters in the United Kingdom. Visit Green Hills Software at www.ghs.com.

Green Hills, the Green Hills logo, MULTI and INTEGRITY are trademarks or registered trademarks of Green Hills Software in the U.S. and/or internationally. All other trademarks are the property of their respective owners.

Add to Digg Bookmark with del.icio.us Add to Newsvine

More Stories By Marketwired .

Copyright © 2009 Marketwired. All rights reserved. All the news releases provided by Marketwired are copyrighted. Any forms of copying other than an individual user's personal reference without express written permission is prohibited. Further distribution of these materials is strictly forbidden, including but not limited to, posting, emailing, faxing, archiving in a public database, redistributing via a computer network or in a printed form.

Latest Stories
As enterprises look to take advantage of the cloud, they need to understand the importance of safeguarding their confidential and sensitive data in cloud environments. Enterprises must protect their data from (i) system administrators who don't need to see the data in the clear and (ii) adversaries who become system administrators from stolen credentials. In short, enterprises must take control of their data: The best way to do this is by using advanced encryption, centralized key management and...
What are the benefits of using an enterprise-grade orchestration platform? In their session at 15th Cloud Expo, Nate Gordon, Director of Technology at Appcore, and Kedar Poduri, Senior Director of Product Management at Citrix Systems, took a closer look at the architectural design factors needed to support diverse workloads and how to run these workloads efficiently as a service provider. They also discussed how to deploy private cloud environments in 15 minutes or less.
In his session at DevOps Summit, Andrei Yurkevich, CTO at Altoros, provided an overview of all the benefits and opportunities, as well as drawbacks of deploying Cloud Foundry PaaS with Juju and compared it to BOSH. Discover the features that overlap, and understand what Juju Charm is, what it is not, where you use one or the other or where you use both BOSH and Juju Charms together. Andrei Yurkevich is Cloud Foundry protagonist and CTO at Altoros. Under his supervision, the Altoros engineering ...
Cultural, regulatory, environmental, political and economic (CREPE) conditions over the past decade are creating cross-industry solution spaces that require processes and technologies from both the Internet of Things (IoT), and Data Management and Analytics (DMA). These solution spaces are evolving into Sensor Analytics Ecosystems (SAE) that represent significant new opportunities for organizations of all types. Public Utilities throughout the world, providing electricity, natural gas and water,...
The Internet of Things will put IT to its ultimate test by creating infinite new opportunities to digitize products and services, generate and analyze new data to improve customer satisfaction, and discover new ways to gain a competitive advantage across nearly every industry. In order to help corporate business units to capitalize on the rapidly evolving IoT opportunities, IT must stand up to a new set of challenges. In his session at @ThingsExpo, Jeff Kaplan, Managing Director of THINKstrateg...
For better or worse, DevOps has gone mainstream. All doubt was removed when IBM and HP threw up their respective DevOps microsites. Where are we on the hype cycle? It's hard to say for sure but there's a feeling we're heading for the "Peak of Inflated Expectations." What does this mean for the enterprise? Should they avoid DevOps? Definitely not. Should they be cautious though? Absolutely. The truth is that DevOps and the enterprise are at best strange bedfellows. The movement has its roots in t...
The true value of the Internet of Things (IoT) lies not just in the data, but through the services that protect the data, perform the analysis and present findings in a usable way. With many IoT elements rooted in traditional IT components, Big Data and IoT isn’t just a play for enterprise. In fact, the IoT presents SMBs with the prospect of launching entirely new activities and exploring innovative areas. CompTIA research identifies several areas where IoT is expected to have the greatest impac...
One of the biggest challenges when developing connected devices is identifying user value and delivering it through successful user experiences. In his session at Internet of @ThingsExpo, Mike Kuniavsky, Principal Scientist, Innovation Services at PARC, described an IoT-specific approach to user experience design that combines approaches from interaction design, industrial design and service design to create experiences that go beyond simple connected gadgets to create lasting, multi-device exp...
Can call centers hang up the phones for good? Intuitive Solutions did. WebRTC enabled this contact center provider to eliminate antiquated telephony and desktop phone infrastructure with a pure web-based solution, allowing them to expand beyond brick-and-mortar confines to a home-based agent model. It also ensured scalability and better service for customers, including MUY! Companies, one of the country's largest franchise restaurant companies with 232 Pizza Hut locations. This is one example of...
There is little doubt that Big Data solutions will have an increasing role in the Enterprise IT mainstream over time. 8th International Big Data Expo, co-located with 17th International Cloud Expo - to be held November 3-5, 2015, at the Santa Clara Convention Center in Santa Clara, CA - has announced its Call for Papers is open. As advanced data storage, access and analytics technologies aimed at handling high-volume and/or fast moving data all move center stage, aided by the cloud computing bo...
Some developers believe that monitoring is a function of the operations team. Some operations teams firmly believe that monitoring the systems they maintain is sufficient to run the business successfully. Most of them are wrong. The complexity of today's applications have gone far and beyond the capabilities of "traditional" system-level monitoring tools and approaches and requires much broader knowledge of business and applications as a whole. The goal of DevOps is to connect all aspects of app...
DevOps is the hottest moving target when it comes to software development methodologies. Many people fear that this fast-paced, barrier-breaking movement will leave information security best practices in the dust. Analysts provide recommendations to security professionals using bingo-laden terms like "moving security to the left" or "get a seat at the table." What we need are real-world examples and tactics for security practitioners to be part of DevOps. In his session at DevOps Summit, Andrew...
Containers Expo Blog covers the world of containers, as this lightweight alternative to virtual machines enables developers to work with identical dev environments and stacks. Containers Expo Blog offers top articles, news stories, and blog posts from the world's well-known experts and guarantees better exposure for its authors than any other publication. Bookmark Containers Expo Blog ▸ Here Follow new article posts on Twitter at @ContainersExpo
The Internet of Things will greatly expand the opportunities for data collection and new business models driven off of that data. In her session at @ThingsExpo, Esmeralda Swartz, CMO of MetraTech, discussed how for this to be effective you not only need to have infrastructure and operational models capable of utilizing this new phenomenon, but increasingly service providers will need to convince a skeptical public to participate. Get ready to show them the money!
DevOps is all about agility. However, you don't want to be on a high-speed bus to nowhere. The right DevOps approach controls velocity with a tight feedback loop that not only consists of operational data but also incorporates business context. With a business context in the decision making, the right business priorities are incorporated, which results in a higher value creation. In his session at DevOps Summit, Todd Rader, Solutions Architect at AppDynamics, discussed key monitoring techniques...