Icon Labs launches Floodgate Security Framework

Icon Labs has announced the availability of their new Floodgate Security Framework (FSF) to protect embedded devices and systems from cyber-attack. Internet-based attacks are on the rise and an increasing number of these attacks are targeting embedded devices.

Cyber-criminals, hacking bots, industrial or international espionage agents and even terrorist groups are now targeting industrial, military, automotive and medical devices as well as utility systems.

According to Alan Grau, CEO and founder of Icon Labs, “In IT security, endpoints must be authenticated, trusted, secured and managed before they are allowed to operate on the corporate network. IT/OT convergence and the emergence of security standards in various industries require that embedded devices provide the same security capabilities as IT devices.”

The Floodgate Security Framework provides:

  • Management system integration for IT/OT convergence.
  • Security capabilities to ensure devices are protected from attack.
  • Building blocks for compliance with security standards including NERC-CIP and EDSA.

Two new capabilities make the Icon Labs Floodgate Security Framework stand out from other cyber defense solutions – Secure Boot and Intrusion Detection.

Floodgate Secure Boot provides a critical security capability for embedded devices by ensuring that only validated code from the device OEM is allowed to run. This prevents attackers from replacing firmware with versions created to perform malicious operations. Secure boot utilises code signing to verify the authenticity and integrity of firmware prior to execution. Floodgate Secure Boot provides the APIs required for code signing, code validation and secure firmware updates. The Floodgate Secure Boot data sheet is available at http://www.iconlabs.com/prod/files/fg-secureboot-ds-april-2015pdf#overlay-context=resources

Floodgate Intrusion Detection monitors system activity and configuration to detect unauthorised changes to the system. These changes are reported to a security management system. Engineers integrating Floodgate IDS into their device can select the appropriate response based upon the severity of the threat and the specific requirements of their device. Supported responses include event logging, alert generation, shutting down the device, operating in “safe mode”, wiping data, and deleting firmware. Floodgate IDS can also support customisable responses to detected threats. The Floodgate Intrusion Detection data sheet is available at  http://www.iconlabs.com/prod/files/fg-ids-ds-april-2015pdf#overlay-context=resources

The Floodgate Security Framework also provides Root of Trust/Chain of Trust, Run-Time Integrity Validation, Application Guarding APIs, Secure Device Manifest support, an embedded firewall, and integration with various security management systems. These capabilities provide the building blocks for achieving EDSA Certification, ISA/IEC 62443 Compliance, and/or compliance with the NIST Cybersecurity framework

FSF is the only security solution for embedded devices providing both device protection capabilities and security management for any embedded OS . Floodgate Security Framework has been ported to a wide range of RTOSes including VxWorks, Nucleus, INTEGRITY, embedded Linux, μC/OS-III and RTXC.

FEATURED IoT STORIES

9 IoT applications that will change everything

Posted on: September 1, 2021

Whether you are a future-minded CEO, tech-driven CEO or IT leader, you’ve come across the term IoT before. It’s often used alongside superlatives regarding how it will revolutionize the way you work, play, and live. But is it just another buzzword, or is it the as-promised technological holy grail? The truth is that Internet of

Read more

Which IoT Platform 2021? IoT Now Enterprise Buyers’ Guide

Posted on: August 30, 2021

There are several different parts in a complete IoT solution, all of which must work together to get the result needed, write IoT Now Enterprise Buyers’ Guide – Which IoT Platform 2021? authors Robin Duke-Woolley, the CEO and Bill Ingle, a senior analyst, at Beecham Research. Figure 1 shows these parts and, although not all

Read more

CAT-M1 vs NB-IoT – examining the real differences

Posted on: June 21, 2021

As industry players look to provide the next generation of IoT connectivity, two different standards have emerged under release 13 of 3GPP – CAT-M1 and NB-IoT.

Read more

IoT and home automation: What does the future hold?

Posted on: June 10, 2020

Once a dream, iot home automation is slowly but steadily becoming a part of daily lives around the world. In fact, it is believed that the global market for smart home automation will reach $40 billion by 2020.

Read more
RECENT ARTICLES

IoT set to overtake cloud computing as primary Industry 4.0 technology, Inmarsat research reveals

Posted on: October 14, 2021

New research by Inmarsat, the provider of global mobile satellite communications, reveals that investment in the Internet of Things (IoT) is set to overtake cloud computing, next generation security, big data analytics and other digital transformation technologies in the near future.

Read more

IDTechEx looks at the setbacks and explores how to move forward

Posted on: October 14, 2021

Bill Gates backed a Belmont smart city in the Arizona desert little has happened beyond a land purchase. Authorities demand that the Colorado river’s diminishing water supply is unharmed. Arizona suffers historic water shortage. The Southwest and much of the West is suffering from an intense 22-year drought, resulting in increasingly low water levels, dry

Read more