Safety Certification and Security

Refine Safety Certification and Security companies and products:
do-178c do-254 mils eal common criteria arinc 653 do-178b security-critical safety-critical partition multiple independent levels of security secure qualified safety and security safety security safesec safety compliance safety regulations safety standards safety certifications do254 do 254 do178 do178b security firewall intrusion attacker hacker encryption virus malware theft invade sensitive coercion credentials exploit exploitation trojan horse cyber risk cyber attack safety certification intrusion detection system cyber warfare malicious code secure rtos secure software network security network security software computer security crypto smartphone encryption smart phone encryption fpga encryption security system security systems encryption software encrypted data encryption encryption algorithm hard drive encryption encryption products password encryption e-mail encryption anti-tamper anti-tamper technology anti-tamper methods anti-tamper software avionics certification flight safety faa certifications safety critical software integrated modular avionics do-178b certification do-178c certification do-254 certification nsa common criteria safety certification and secur safety certification security
Click on any vendor
to see a listing of
Safety Certification and Security related products.
  • Fortinet  (3)
    • FortiGate-5000 ATCA
      A family of chassis based modular systems that provide the highest scalability for Unified Threat Management (UTM) security (+)

      Features:

      32149.jpg
      • The first AdvancedTCA-based security platform that performs the following security functions in an integrated solution: stateful firewall, antivirus, IDS/IPS, VPN, anti-spam, web content filtering, and bandwidth shaping
      • Most scalable (up to 112 GbE interfaces), multifunction security platform available
      • Multiple security functions into an ASIC-accelerated security platform
    • FortiGate 5050
      Optimal solution for Large Enterprise, Carriers and Managed Security Service Providers (MSSPs) (+)

      Features:

      19640.jpg
      • Scans and eliminates viruses and worms from HTTP, SMTP, POP3, IMAP, and FTP traffic without degrading network perfromance
      • Provides complete network protection functionality: network-based antivirus, web content filtering, firewall, VPN, network-based intrusion detection and prevention, traffic shaping, and antispam protection
      • “Transparent mode” operation supports highly available architectures and deployments for antivirus and content filtering only in conjunction with existing firewall, VPN, intrusion detection and prevention, or other existing systems
    • FortiGate 5020
      Optimal solution for Large Enterprise and Managed Security Service Providers (MSSPs) (+)

      Features:

      19638.jpg
      • Scans and eliminates viruses and worms from HTTP, SMTP, POP3, IMAP, and FTP traffic without degrading network performance
      • Provides complete network protection functionality: network-based antivirus, web content filtering, firewall, VPN, network-based intrusion detection and prevention, traffic shaping, and antispam protection
      • “Transparent mode” operation supports deployments for antivirus and content filtering in conjunction with existing firewall, VPN, intrusion detection and prevention, or other existing systems
  • Interphase Corporation  (5)
    • 5585
      A PCI/PCI-X network security acceleration adapter (+)

      Features:

      • Designed to eliminate the bottleneck of network traffic caused by VPNs, gateways, secure routers, and firewalls
      • Offloads IPSec security protocol processing from the host CPU in systems security encryption and decryption
      • Supports Gigabit line speed network security applications
    • 45NS/55NS
      Two network security acceleration cards (+)

      Features:

      • The 45NS (PMC) and 55NS (PCI) network security acceleration modules are designed to free up host CPU cycles used for embedded security software processing in VPN, gateway, secure router, firewall, IAD, and general enterprise network access servers
      • Offloads bandwidth-intensive IPSec and SSL security protocol processing from the host CPU
      • Performs a variety of functions for addressing the security needs of enterprise and carrier grade systems, including header analysis, payload extraction, compression, encryption, authentication, and packet assembly
    • 5585 PCI/PCI-X Network Security Acceleration Adapter
      Designed to eliminate the bottleneck of network traffic caused by today's VPNs, gateways, secure routers, and firewalls (+)

      Features:

      • Increase network efficiency and response times by offloading bandwidth-intensive IPSec security protocol processing from the host CPU in systems security encryption and decryption
      • Designed to support Gigabit line speed network security applications
      • Is expected to offer nearly a twenty five times improvement in system performance compared to a software-only based network security solution
    • 566GS PCI-Express
      Six-port Gigabit Ethernet with onboard Intelligent Packet Processing (+)

      Features:

      • IPSec acceleration
      • PCI Express x8
      • Six independent Gigabit Ethernet ports
    • 5556 PCI
      Carrier grade IPSec performance for space constrained applications (+)

      Features:

      35807.jpg
      • PCI low profile, 64-bit short card
      • Based on Hifn 7956 Security Co-Processor
      • High performance
  • SiliconSystems, Inc.  (3)
    • SiliconDrive Secure
      SiliconDrive Secure provides the industry's most comprehensive suite of proprietary technologies enabling multiple user-selectable options for data and software IP security (+)

      Features:

      33091.jpg
      • Prevention of Application Data and Software IP Theft
      • To prevent application data and software theft, patent-pending SiKey technology ties application data and software IP to a specific SiliconDrive Secure so that a host system can verify the drive and create unique encryption keys to prevent theft
      • Optimum Security for Critical Data
    • SiliconDrive
      Advanced storage technology engineered to meet the rigorous demands of the netcom, military, industrial, interactive kiosk, and medical markets (+)

      Features:

      • Suitable choice when replacing hard drives and flash cards or in host systems that require scalable, small footprint, or low-power storage technology
      • Zero field failures from drive corruption
      • No forced product requalifications
    • 1.8" SiliconDrive
      A 1.8" form factor version of SiliconSystems' SiliconDrive storage device (+)

      Features:

      32892.jpg
      • Ideal for space- and weight-constrained applications including in-flight applications, notebook and tablet PCs, and portable medical devices
      • Solid-state storage provides higher levels of reliability and robustness in rugged military applications
      • 16 GB of storage
  • Interpeak, Inc.  (6)
    • IPIPsec
      Interpeak's IPIPsec provides strong encryption, integrity, authentication and replay protection (+)

      Features:

      • Strong encryption protects your information
      • Ensures that packets have not been modified; any modifed packets are discarded
      • Authentication process verifies identity
    • IPPRISM
      Wireless driver for Conexant's PRISM 802.11 chipsets (+)

      Features:

      • Supports most popular operating systems out of the box (Linux, INTEGRITY, and OSE)
      • Portable to other operating systems and 802.11 chipsets
      • Configurable both as Access Point and Station
    • IPHWCRYPTO
      Interpeak's Hardware Crypto Acceleration Architecture (HCAA) supports various silicon implementations, as acceleration implementations vary across silicon vendors. (+)

      Features:

      • Optimized performance for Interpeak security products
      • Crypto hardware support requires only days with the use of Crypto Support Package (CSP)
      • Supports various vendors via a CSP model (including Freescale, Intel, SafeNET and Cavium)
    • IPIKE v1/v2
      The Interpeak IKE application handles the distribution of IPsec encryption keys automatically, using state-of-the-art algorithms to provide maximum flexibility and security. (+)

      Features:

      • Strong encryption with 128 bit (or more) symmetric keys and 1024 bit (or more) asymmetric keys
      • Simplified IPsec management
      • Flexible authentication with either pre-shared keys or X509 certificates (DSA and RSA)
    • IPLITE TCP/IP Stack
      Ultra-compact IPv4/IPv6 protocol stack designed for minimum footprint and maximum performance (+)

      Features:

      • Modular design allows for footprint optimization
      • Dual IPv4/IPv6 protocol stack
      • Full range of networking and security tools
    • IPNET TCP/IP Stack
      Full-featured embedded IPv4/IPv6 TCP/IP stack (+)

      Features:

      • Range of networking tools, including WPA/WPA2 and Mobile IP
      • Virtual routing, quality-of-service, and multicasting supported
      • Compatible with latest IEEE standards for wireless security
  • SYSGO AG  (4)
    • PikeOS
      Paravirtualization real-time operating system based on a separation microkernel (+)

      Features:

      33227.jpg
      • Supports multiple additional operating systems and runtime environments, such as Linux, ARINC 653, and POSIX, together with their associated applications
      • All OSs and RTEs run concurrently and cooperatively in their own partitions
      • The native design of the separation microkernel specifically addresses the requirements of safe and secure systems
    • PikeOS Safe and Secure Virtualization (SSV)
      PikeOS, both hypervisor and RTOS, is the only SSV product on the market being certified or certifiable according to major safety and security standards. It provides an embedded systems platform where multiple virtual machines can run simultaneously in a secure environment. The PikeOS technology combines safety, security, real-time and virtualization and it allows multiple operating systems APIs to run concurrently on one machine. PikeOS provides the widest range of “personalities� on the market. Its microkernel architecture allows it to be used in cost-sensitive, resource-constrained devices as well as large, complex systems. The simplicity, modularity, and compactness of the PikeOS design results in real-time performance that competes head-to-head with conventional proprietary RTOS solutions while offering innovations in platform independence. FEATURES: › Based on separation microkernel › Strict time and resource partitioning › Combines paravirtualization and hard real-time › MILS compliant › Eclipse-based development environment › Certified DO-178B, IEC 61508, EN 50128 › Certifiable DO-178C, ISO 26262, IEC 62304, CC EAL 5/6 › Can run POSIX, Linux, ARINC-653, RTEMS, Android, iTRON, AUTOSAR, RT Java, Ada, OSEK › Available for PowerPC, x86, ARM, MIPS, SPARC V8/LEON, V-850, SH-4 › Multi-core support in SMP and/or AMP mode [...] (+)

      Features:

    • PikeOS Safe and Secure Virtualization
      PikeOS is an innovative OS providing an embedded systems platform where multiple virtual machines can run simultaneously in a secure environment (+)

      Features:

      45653.jpg
      • The Safe and Secure Virtualization (SSV) technology allows multiple operating systems APIs to run concurrently on one machine
      • PikeOS provides the widest range of “personalities” on the market
      • Its microkernel architecture allows it to be used in cost-sensitive resource-constrained devices as well as large, complex systems
    • PikeOS version 3.2
      SYSGO will develop a new Personality executive environment for Android within the virtualized safety and/or security constraints on the same hardware host device (+)

      Features:

      47652.jpg
      • The Android Personality will work on separate sets of resources within the same machine, with resource separation enforced by PikeOS's microkernel
      • This microkernel is lightweight and designed to be used in cost-sensitive, resource-constrained devices in both single- and multi-core environments
      • Typical processor architectures include: x86, PowerPC, QorIQ, MIPS, ARM, SPARC, and SH
  • Mocana  (8)
    • Mocana's DSF for Freescale
      To ensure wired and wireless devices, networks and services perform and scale with the utmost security Freescale and Mocana developed the Device Security Framework (DSF) Software for Freescale PowerQUICC encryption-enabled processors (+)

      Features:

      44741.jpg
      • This single-source solution combines Freescale's encryption-enabled single-core and multicore PowerQUICC processors with Mocana's Device Security Framework, resulting in superior security performance
      • DSF is actually a suite of several best-in-class Mocana security products, optimized for the Freescale architecture: * NanoSec IPSec and IKEv1 and v2 * NanoSSL client and server * NanoSSH client and server * NanoEAP extensible authentication protocol * NanoCert simple certificate enrollment protocol (SCEP)
      • These protocol stacks can run on any PowerQUICC encryption-enabled processor device with the most popular embedded operating systems
    • Mocana's NanoSSL
      NanoSSL is Mocana's super fast, super small SSL/TLS solution specifically designed to speed product development while providing best-in-class device security services for resource-constrained environments (+)

      Features:

      44748.jpg
      • NanoSSL is open-standards based, extensible, extremely small footprint, platform-agnostic and includes an optional government-certified FIPS 140-2 level-1- validated crypto core
      • NanoSSL includes a full-featured key generator and certificate management client, and even supports Government Suite B crypto algorithms and the new RFC standard for TLS 1.2
      • Best of all it's surprisingly affordable: your NanoSSL total cost of ownership will usually be substantially less than that of open source
    • Mocana's NanoDefender
      Mocana's patent-pending new anti-malware product, NanoDefender, is a device-based application and firmware defense system that is designed to instantly detect and shut down malware or viruses before they have a chance to spread—and it does so while eliminating “false positives” (+)

      Features:

      44745.jpg
      • NanoDefender is the latest addition to the Device Security Framework, Mocana's top-to-bottom architecture for planning, implementing and managing comprehensive device security across the enterprise
      • The Mocana NanoDefender Difference: NanoDefender starts your device out on the right foot, by providing all the tools and firmware source you need to perform secure pre-boot verifications on your connected device
      • The solution uses strong cryptography to validate the BIOS, firmware, and boot loader images
    • Mocana's NanoVOIP
      Mocana's NanoVOIP Developers' Suite is a comprehensive security solution for application developers and device designers trying to build secure VOIP products (+)

      Features:

      • NanoVOIP contains all of the protocols, algorithms, standards specifications and tools you need to turn an average VOIP implementation into a fully secure, enterprise-class encrypted voice, video and data solution
      • Better yet, you don't need to be a security expert to build secure products with NanoVOIP: our simplified API and common cryptographic code base, along with tens of thousands of lines of sample code and professional development support hide the complexity of crypto, making it easy for your team to roll out a secure VOIP implementation, fast
      • The NanoVOIP Developer's Suite consists of a specially-selected set of Mocana's best-selling security components
    • Mocana's DSF for Android
      Android developers must balance security functionality, application performance and battery life effectively without introducing new security holes into the platform (+)

      Features:

      44740.jpg
      • Mocana's DSF for Android is the first and only open-standards-based software package enabling developers to build the security features that enterprises and savvy consumers demand
      • It was designed in a modular framework allowing developers to pick and use only what they need at the time, while allowing them the flexibility to add more functionality later
      • Using DSF for Android, developers can quickly add much-needed firewall, VPN, and encryption features to Android handsets and netbooks without compromising the performance, throughput or battery life of the platform [...]
    • Mocana's NanoWireless
      In NanoWireless, Mocana delivers a standards-based, full featured security solution that device manufacturers and ISVs can use to build wireless connectivity agents (Wi-Fi supplicants) for different endpoints like netbooks and laptops as well as embedded devices used in medical, industrial and smartgrid environments (+)

      Features:

      44750.jpg
      • Networking device OEMs can use NanoWireless to build highly scalable security into endpoint termination devices like enterprise wireline switches, wireless access points and Wi-MAX ASN (Access Service Network) gateways
      • Our integrated RADIUS client allows thousands of end points to be authenticated simultaneously by communicating with RADIUS servers deployed throughout the network
      • Device manufacturers and OEMs now have an off-the-shelf solution for integrating security into their designs
    • Mocana's NanoSec
      Mocana's NanoSec is an standards-based full featured and RFC-compliant IPsec toolkit (+)

      Features:

      44746.jpg
      • NanoSec is easy to use, uniquely architected with an asynchronous core to fully leverage hardware acceleration, is extremely portable and has an incredibly small memory footprint
      • It is ideally suited to securing voice, video and data communications
      • With NanoSec's integrated support for MOBIKE, the same security services can be extended to virtually any mobile device requiring VPN functionality
    • Mocana's DSF 5.1
      A series of components that provide sophisticated, multi-layered integrity protection for devices (+)

      Features:

      • All components of 5.1 are available as government-certified FIPS 140-2 level 1 validated binaries, or in source
      • NanoSec: An up-to-the-minute IPSec, IKEv1/v2 and MOBIKE solution for developers building device-based VPNs, with an integrated firewall and robust certificate management capabilities
      • NanoSSH: An ultra-optimized SSH solution with RADIUS support, perfect for encrypting device communications over untrusted networks
  • LynuxWorks, Inc.  (8)
    • LCS
      A standalone, certifiable TCP/IP stack for safety-critical systems (+)

      Features:

      • Certifiable to DO-178B level A
      • Standards-based code enhanced for determinism and safety-critical operation
      • COTS solution offers standalone stack operations on a Motorola 8260 processor to offload the sporadic nature of TCP/IP processing from host-based resources
    • LynxSecure
      A separation kernel to meet the needs for the highest level of embedded software security (+)

      Features:

      30051.jpg
      • MILS architecture conformance for building secure systems
      • Optimal security and safety – operating system supports CC EAL-7 and DO-178B Level A
      • Real time – time-space partitioned RTOS for superior determinism and performance
    • LynxSecure 2.0
      A next-generation separation kernel and embedded hypervisor for high-assurance systems (+)

      Features:

      • Provides a standards-based, secure, multidomain computational platform that serves as a trusted foundation for applications with low, medium, and high assurance requirements that are all running concurrently on a single system
      • Allows legacy applications to run unmodified, enabling systems to be modernized with increased information sharing and security
      • Designed from the ground up to minimize life-cycle costs (initial and tech refresh) of high-assurance evaluation, certification, and accreditation by using automated tools and the correct-by-construction methodology for formal methods and artifacts
    • LynxSecure 5.0
      Version 5.0 of the LynxSecure separation kernel and hypervisor (+)

      Features:

      47745.jpg
      • Boosts performance for fully virtualized guest operating systems (OSes)
      • 64-bit and symmetric multiprocessing (SMP) guest OS virtualization support
      • LynxSecure 5.0 features a new secure device virtualization mechanism, managed from a secure partition, to allow limited physical devices to be virtualized and shared between guest OSes
    • LynxOS-SE for ARM
      LynxOS-SE for ARM Cortex-A8 (+)

      Features:

      • Allows developers to quickly benefit from an out-of-the-box hardware/software solution that is optimized for the harshest environments
      • Offers a single, powerful solution for real-time systems that cannot afford downtime
      • Provides open APIs including full POSIX conformance, medium-assurance security per the general purpose operating-system-protection profile (GPOSPP), and an advanced set of networking features for uncompromised performance [...]
    • LynxOS RTOS Family
      Embedded operating systems for the most demanding real-time and embedded applications (+)

      Features:

      33662.jpg
      • LynxOS: POSIX and Linux compatible hard real-time operating system
      • LynxOS-178: safety certified DO-178 operating system
      • Unique FAA Reusable Software Component (RSC) certification
    • LynxOS-178
      A certifiable RTOS for safety-critical computing (+)

      Features:

      15839.jpg
      • DO-178B and EUROCAE/ED-12B certifiable, POSIX-conformant RTOS solution
      • COTS package
      • Designed to be tightly integrated with the LynxOS Certifiable Stack (LCS)
    • LynxOS-178 2.2
      New version of LynuxWorks LynxOS-178 for safety-critical devices (+)

      Features:

      • Supports Intel Pentium platforms
      • A COTS RTOS that supports the Intel Pentium x86 architecture
      • Includes support for distributed communications middleware products such as Common Object Request Broker Architecture (CORBA) or Distributed Data Systems (DDS)
  • Curtiss-Wright  (5)
    • DuraNET 30-2020 Rugged Cisco ESS-2020 L2 Ethernet Switch
      The Parvus® DuraNET® 30-2020 is an ultra-rugged 19-port Cisco IOS-managed Layer 2 network switch integrating Cisco’s ESS 2020 Embedded Services Switch technology with an isolated MIL-STD-1275/704 power supply in an IP67 (dust/water proof) sealed aluminum chassis with MIL-DTL-38999 connectors. Designed for Size, Weight and Power (SwaP) sensitive harsh military and civil environments (i.e. aircraft, vehicle, mining, industrial), the unit provides reliable local area network (LAN) switching capabilities with the ease of use, secure access, and manageability expected from Cisco-based technology. Two levels of Cisco IOS software (LAN Lite or LAN Base) are available to support access layer connectivity and needs for data, security, voice, and video traffic at the network edge for stationary or mobile network nodes. FEATURES: Rugged Cisco ESS-2020 L2 Ethernet Switch, 17x 10/100 + 2x GigE Ports • Integrated Cisco ESS 2020 Layer 2 IOS Managed Ethernet Switch with 19x Ethernet Ports (2x GigE, 17x 10/100) in Size, Weight & Power (SWaP) Optimized Chassis: < 5.0 lbs. Weight, Only 3.0� Height, < 20 Watts Power Consumption • Cisco IOS LAN Lite or Cisco IOS LAN Base Images Provide Robust Layer 2 Switching, Management, Security, and Quality of Service Features IOS Management • Cisco IOS® with Data, Video, and Voice Services Support • Security: Dot1x, Port Security, and DHCP Allow Dynamic Port-Based Authentication, Secure Shell (SSHv2), SNMPv3 Provides Encrypted Administrator Traffic During Telnet and SNMP Sessions, TACACS+ and RADIUS Authentication Facilitate Centralized Control and Restrict Unauthorized Users • Resiliency: Flex Links for Fast Recovery, Cisco REP Protocol for Fast Convergence, Rapid/Multiple Spanning Tree Redunancy, Link Aggregation • Manageability: Auto SmartPort, Cisco Web Device Manager, Telnet, HTTPS access, SNMP, Storm Control, IGMP Snooping, VLAN, and CoS/QoS Traffic Prioritization Rugged MIL-STD Design • Designed to Meet Harsh MIL-STD-810G and DO-160G Conditions (Temp, Shock, Vibration, Humidity, Altitude, Dust/Water Ingress) • Designed to Meet MIL-STD-461F and DO-160G EMI/EMC (Conducted & Radiated Emissions & Susceptibility) and MIL-STD-1275 & 704 Power Input and Transient Protections • Filtered, Transient-Protected Power Supply for Aircraft and Vehicle Use • Extended Temperature, Open Architecture PC104 Sized Circuit Card Assemblies with Cable-Less Internal Interconnect for Shock & Vibration Extremes • -40 to +71C Fanless Extended Temp Operation with No Moving Parts • Corrosion-Resistant, Aluminum Chassis Sealed (IP67) Against Water, Dust, EMI [...] (+)

      Features:

    • VPX6-684 FireBlade
      Fast, secure, and unified approach to interconnect subsystems, chassis, cards, and compute nodes via GbE (+)

      Features:

      34878.jpg
      • Fully managed, intelligent multilayer (Layer 2/3) GbE switch in a 6U VPX form factor
      • Complete range of convection and conduction cooled formats (IEEE 1101.1 and IEEE 1102.1) with shock and vibration support
      • Up to 24 x 1GbE auto-negotiating copper interfaces (4 of the ports can be optical)
    • DuraMAR 31-5915 IP67 Rugged Cisco 5915 Mobile IP Router
      The Parvus® DuraMAR® 31-5915 is a rugged Cisco IOS-managed mobile router designed to extend enterprise networking infrastructure beyond the reach of traditional fixed-networks into mobile and embedded networking applications. With Cisco’s 5915 Embedded Services Router (ESR) card, isolated vehicle-grade power supply, and fully dust and water proof (IP67) enclosure, the DuraMAR 31-5915 is an ideal mobile networking solution to interface with onboard computers, cameras, Ethernet switches, sensors, monitoring devices, and command-and-control gear in harsh environment and vibration environments, including tactical, mobile, vehicle, and outdoor installations in transportation, military, offshore drilling, underground mining, smart grid, homeland security, and public safety applications. FEATURES: Rugged IP67 Rugged Cisco 5915 Mobile IP Router with RJ-45 or M12 Connectors • Ruggedized Cisco 5915 Router with Enterprise IOS Software for Robust Security, Management, QoS, VLAN, IPv4 / IPv6 Routing, IP Mobility • 5 Ethernet Ports (3x 10/100 Switched, 2x 10/100 Routed) • Integrated Services Router (ISR) Features Support Concurrent Data, Video, and Voice Services, Firewall and Hardware AES Encryption Acceleration • Modular, Open Architecture Rugged COTS PC104 Hardware Design • -40 to +71C Fanless Extended Temp Operation with No Moving Parts • Rugged RJ-45 or M12 Connectors for Anti-Shock and Vibe Protection [...] (+)

      Features:

    • VPX3-685
      Secure router (+)

      Features:

      47648.jpg
      • Undergoing FIPS 140-2 Level 2 cryptographic validation at NIST under the Cryptographic Module Validation Program (CMVP)
      • Single-slot VPX module
      • Corsec Security, Inc., is helping CWCEC attain the certification
    • MPMC-935x Multi-Platform Mission Computer System
      A Multi-Platform Mission Computer System (+)

      Features:

      45526.jpg
      • Curtiss-Wright's family of Multi-Platform Mission Computers(MPMC) are Packaged COTS (PCOTS) subsystems comprised of state-of-the-art components from our embedded computing library
      • Integrated into our ruggedized enclosures, MPMC Systems are rugged computing solutions fully qualified for field deployment, and are designed for SWaP (Size, Weight and Power) constraints
      • The bottom line: faster deployment, lower development costs, and reduced program risk
  • Real-Time Innovations, Inc.  (2)
    • Data Distribution Service middleware w/SELinux
      RTI Data Distribution Service Real-Time Messaging Middleware – now Integrated with Security-Enhanced Linux (SELinux) (+)

      Features:

      41671.jpg
      • Combination offers real-time and high-performance distributed applications with the ability to securely distribute data by combining RTI's high-performance network communications with the extremely flexible Mandatory Access Control (MAC) facilities of SELinux
      • RTI Data Distribution Service allows distributed applications to securely exchange messages and data by authenticating peers and encrypting information that is sent over the network
      • MAC capabilities of SELinux add several additional levels of protection against misconfiguration, software errors, and application vulnerabilities: System-wide security policies control which applications are allowed to communicate with each other, and even applications with the appropriate credentials and keys can communicate only if explicitly provisioned to do so; and files containing keys, configuration information, and logs are protected from unauthorized access
    • DDS Technology Network
      Real-Time Innovations (RTI) introduces the DDS Technology Network, a comprehensive training, tools, and software website designed to help researchers get up to speed quickly and inexpensively (+)

      Features:

      47776.jpg
      • No-charge license to RTI's DDS software
      • Included are tools, runtime services from Professional and Elite toolkits, extensive source code
      • Mentoring and training materials containing DDS experts in data-centric design, distributed system security and safety, tools for applications in control systems and unmanned vehicles
  • Maxim Integrated Products  (1)
    • DS3650
      The DS3650 is an SPI-compatible secure supervisor that incorporates a battery-backup controller, system power monitor, CPU supervisor, temperature sensor, and two tamper-detection (+)

      Features:

      33985.jpg
      • Specifically designed to meet the stringent requirements of PCI-PED (payment card industry-PIN entry device) certification, the DS3650 integrates a battery-backup controller, system power monitor, CPU supervisor, temperature sensor, and two tamper-detection comparators.
      • he high integration and advanced security features of the DS3650 make it suitable for Point-of-Sale (POS) terminals, PIN pads, and other equipment where data protection and security is critical
      • The DS3650 provides two tamper-detection comparator inputs to interface with, and provide low-power continuous monitoring of, resistive anti-tamper meshes, external sensors, and digital interlocks
  • Quantum3D  (3)
    • Sentiris AV1
      Safety-critical, flight-certifiable graphics processing unit (+)

      Features:

      38993.jpg
      • This PCI Express Mezzanine Card (XMC) was conceived to address the ongoing needs of high safety- and security-critical applications such as primary flight instrumentation and multi-level security (MLS) systems
      • Certifiable to DO-178B for software and DO-254 for hardware
      • Offers an obsolescence-proof design
    • FidelityVCF RT EVC
      A COTS tightly integrated, advanced real-time embedded visual computing development and deployment software for the Safety-Critical market (+)

      Features:

      • PikeOS is a powerful paravirtualization real-time operating system based on a state-of-the-art separation microkernel that is optimized for safety-critical and multi-Level secure applications
      • IData Human Machine Interface (HMI) embedded visual computing software toolkits provide an advanced and comprehensive solution for a broad spectrum of safety-critical commercial, military, industrial, and FAA DO-178B Level-A- and ARINC-653-based avionics, vehicle electronics, medical, and other advanced real-time embedded visual computing initiatives
      • The companies are also collaborating to ensure that their respective products provide a tightly coupled solution for Linux applications by integrating IData with ElinOS
    • IData VCF Framework
      A suite of powerful, cost-effective, PC-based HMI tools that enables developers to rapidly prototype, develop and deploy dynamic and interactive cross-platform graphics (+)

      Features:

      • IData 3.0 extends IData's Dynamic Bytecode technology with powerful integrated logic-modeling capabilities
      • TrueStroke lines, a new feature for generating platform-independent anti-aliased lines
      • Supports powerful new development and deployment modules, including IDataMap for displaying scalable geospatial data in deeply embedded environments
  • Green Hills Software, Inc.  (4)
    • INTEGRITY 10
      The 10th anniversary edition of the INTEGRITY RTOS (+)

      Features:

      • Features new security, performance, and usability features
      • Suitable for a wide range of industries including consumer, networking, medical, automotive, industrial, and avionics
      • Supports Symmetric MultiProcessing (SMP) wherein the operating system will automatically load balance applications across multiple cores on SMP-capable processors such as the Freescale Power Architecture-based 8641D
    • ISS Solutions
      A security solution consisting of Suite B-Compliant Security Protocol Toolkits and Device Lifecycle Management (DLM) system, designed by the company’s INTEGRITY Security Services (ISS) business unit (+)

      Features:

      • Packaged with the Green Hills INTEGRITY Real-Time Operating System (RTOS) the ISS Security Protocol Toolkit adds an additional reliability level and authenticated security that ensure all embedded devices powered by ISS solutions are secure
      • The ISS solutions will address: authentication, authorization, network access control, confidentiality, integrity, and remote management
      • Authentication ensures that users, devices, and software on a network are correctly identified
    • INTEGRITY-178B RTOS
      A mission, safety, and information assurance critical RTOS (+)

      Features:

      40972.jpg
      • Certified by the NSA-managed NIAP Lab to EAL6+ High Robustness (the highest level of security ever provided to an RTOS)
      • Securely partitioned real-time operating system
      • DO-178B Level A certification package
    • Platform for Secure Networking
      A secure networking platform (+)

      Features:

      • Based on the safety- and security-certified INTEGRITY real-time operating system and its U.S.-developed IPv4/v6 networking stack
      • Features industry advancements in secure communications and access that allow networking equipment developers to completely secure their devices and the information flowing through them
      • Separation kernel architecture allows for fault isolation and containment and fast system recovery
  • Connect One Semiconductors  (3)
    • iChipSec CO2128
      The Connect One iChipSec CO2128 is a secure IP communication controller chip that reduces the cost and speeds the design of new IP-enabled Point-Of-Sale (POS) terminals (+)

      Features:

      32199.jpg
      • The chip also includes many hardware enhancements that ensure high throughput by offloading IP and network security protocols from the host processor
      • The CO2128's integrated ARM7 core processor, RTOS, security, and networking protocol stack ensure efficient and secure high-speed transaction processing
      • For high-bandwidth applications like video streaming, CO2128's high-speed parallel interface supports 32 Mbps with UDP/IP hardware acceleration
    • Socket iWiFi
      a secure serial-to-Wi-Fi embedded device server that connects devices running Machine-to-Machine (M2M) applications to 802.11b/g wireless LANs and protects them from network attacks. Socket iWiFi uses Connect One's iChipSec CO711AG IP communication controller chip with encryption, security, and IP protocols to act as a firewall and Wi-Fi controller for the onboard Marvell 88W8385 Wi-Fi chipset. Socket iWiFi enables devices that use communication modules in the industry-standard SocketModem form factor to be integrated into a wireless LAN network with minimal programming (+)

      Features:

      32062.jpg
      • Socket iWiFi frees up host processing time by offloading connectivity, cryptography, and security from the application processor
      • Developers can take advantage of 10 simultaneous TCP/UDP sockets; two listening sockets; SMTP, MIME, POP3, FTP, Telnet, and HTTP clients; a Web server with one website for the application and another for configuring iChipSec; and serial-to-IP bridging
      • Socket iWiFi supports 64-/128-bit WEP encryption, SSL3/TLS1, WPA1, and WPA2 [...]
    • II-EVB-600
      The CO2064 features 10/100 Ethernet, USB 2.0, SPI, and USART interfaces, along with a true random number generator, SHA-1/256 secure hash accelerator, AES-128/192/256 encryption accelerator, 3DES, SSL3/TLS1, and WEP/WPA2 encryption for Wi-Fi (+)

      Features:

      • The II-EVB-600 includes two CO2064s, two USB host and device connectors, two male-female RS-232 DB-9 connectors, RJ-45 connector, RJ-11 connector, SocketModem, Wi-Fi daughterboard with antenna, 4-pin TWI connector, two 6-pin SPI connectors, and SIM holder with either 110 V or 220 V power supply [...]
  • Radisys Corporation  (8)
    • FlexPacket ATCA-PP50 /FlexCompute ATCA-XE50 / FlexCore ATCA-FM40
      FlexPacket ATCA-PP50 (+)

      Features:

      36001.jpg
      • PP50 provides TEMs with deep packet inspection (DPI) capabilities to support advanced content-aware routing, traffic management, and security functions required by multi-service IP networks
      • The blade is engineered to meet the application needs of IPTV, 3G LTE aggregation gateways, and security platforms
      • Dual 1 GHz RMI XLR732 multicore MIPS64 packet processor
    • ATCA-PP50 Packet Processing Blade
      AdvancedTCA blade supporting two multi-core RMI XLR732 packet processors (+)

      Features:

      33080.jpg
      • Delivers deep packet inspection and security capabilities for wireless aggregators, IPTV, IMS, and security
      • Two XLR732 processors, each with 8 multi-threaded MIPS cores
      • Up to 16 GB per blade, 8 GB per XLR
    • ATCA 10GbE System
      AdvancedTCA 10 GbE traffic management and security system delivers very high performance deep packet inspection capabilities to allow TEMs to rapidly develop and deploy content-aware platforms (+)

      Features:

      33077.jpg
      • -Deep Packet Inspection for Content-Aware Infrastructure
      • Pre-Packaged with Trillium Protocol Software
      • Deep Packet Inspection: Multi-core, multi-threaded MIPS64 processor -Integrated 10 Gbps security acceleration engine
    • LTE SEG
      First 3GPP compliant LTE SEG solution based on Network Domain Security standards (+)

      Features:

      47711.jpg
      • Market leading performance for stateful firewall and IPsec tunneling in a single platform
      • Support for LTE Access and Packet Core security, plus 3G wireless offload applications
      • Designed for carrier grade availability and scalability
    • LTE SEG
      First 3GPP compliant LTE SEG solution based on Network Domain Security standards (+)

      Features:

      44022.jpg
      • Market leading performance for stateful firewall and IPsec tunneling in a single platform
      • Support for LTE Access and Packet Core security, plus 3G wireless offload applications
      • Designed for carrier grade availability and scalability
    • ATCA 40G Platforms
      Pre-integrated 40G ATCA Platforms. (+)

      Features:

      183838669505351182.jpg
      • Fixed & Mobile Broadband Networks
      • 3G & LTE Gateways including Internet Offload
      • DPI Policy Enforcement & Traffic Shaping
    • 10 GbE ATCA Traffic Management System
      Deep packet inspection for content-aware infrastructure (+)

      Features:

      34178.jpg
      • Multicore, multithreaded MIPS64 processor
      • Integrated 10 Gbps security acceleration engine
      • Packet inspection and distribution engine
    • SEG 11000
      A robust telecom security gateway based on NDS standards that provides stateful firewalling and IPsec tunneling in a single platform (+)

      Features:

      46963.jpg
      • The Radisys LTE SEG secures LTE Access/Backhaul and LTE Packet Core networks, as well as current generation wireless offload applications like I-WLAN, UMA/GAN and FemtoCell that are evolving to LTE
      • The Radisys LTE SEG, is built around the carrier-grade Advanced Telecommunications Computing Architecture (ATCA), and offers world-class security features with multi-gigabit performance
      • The LTE SEG is also available as a turnkey ATCA blade that can be integrated into other network elements
  • Zephyr Engineering, Inc.  (9)
    • ZPC864C
      A network security development kit (+)

      Features:

      14868.jpg
      • Enables developers to implement network security applications with Motorola's MPC860 PowerQUICC communications processor and the MPC180 security processor, which are part of Motorola's Smart Networks Platform
      • Consists of two components, the MPC860 processor card from Micetek and the MPC180 security processing daughtercard from Zephyr
      • The MPC860 processor card functions as a generic MPC860 resource board
    • ZPC860C
      A network security development kit (+)

      Features:

      14867.jpg
      • Enables developers to implement network security applications with Motorola's MPC860 PowerQUICC communications processor and the MPC180 security processor, which are part of Motorola's Smart Networks Platform
      • Consists of two components, the MPC860 processor card from Micetek and the MPC180 security processing daughtercard from Zephyr
      • The MPC860 processor card functions as a generic MPC860 resource board
    • ZPC.900C
      A complete package for implementing network security applications (+)

      Features:

      14859.jpg
      • ATX form-factor ZPCI.2900 Quad PMC Carrier base board, which accepts standard PMC cards
      • Includes a PrPMC800 Monarch CPU module, a ZPCI.3900 MPC190 security processor PMC module, and one or two ZPCI.3100 Gigabit Ethernet PMC modules [...]
    • ZPCI.3910
      A MPC190 security processor PCI card (+)

      Features:

      14865.jpg
      • High-performance encryption/decryption engine on a 64-bit, 66 MHz, PCI card
      • Bus-master design with a 33/66 MHz, 32/64-bit PCI interface
      • PCI rev 2.2 compliant [...]
    • ZPCI.3901
      A MPC184 security processor PMC module (+)

      Features:

      14864.jpg
      • High-performance encryption/decryption engine on a 32-bit, 66 MHz PMC card
      • IEEE 1386.1 PMC card
      • Bus-master design with a 33/66 MHz 32-bit PCI interface
    • ZPCI.3900
      A MPC190 security processor PMC module (+)

      Features:

      14863.jpg
      • High-performance encryption/decryption engine on a 64-bit, 66 MHz PMC card
      • IEEE 1386.1 PMC card
      • Bus-master design with a 33/66 MHz 32/64-bit PCI interface
    • ZPCI.2900
      A quad PMC carrier (+)

      Features:

      14861.jpg
      • Suitable for use with 64-bit, 66 MHz PMC form-factor cards
      • ATX form-factor base board
      • Accepts four standard PMC cards. Ideal for use with the PrPMC800 Monarch CPU module, the ZPCI.3900 MPC190 Security Processor, and the ZPCI.3100 Gigabit Ethernet card [...]
    • ZPCI.3911
      A MPC184 security processor PCI card (+)

      Features:

      14866.jpg
      • High-performance encryption/decryption engine on a 32-bit, 66 MHz, universal (3.3V/5.0V) PCI card
      • Uses a high-performance PCI bridge in a bus-mastering design with a 33/66 MHz, 32 bit PCI interface
      • PCI rev 2.2 compliant
    • ZPC.1900
      A security processor development platform (+)

      Features:

      14860.jpg
      • Has onboard MPC180 and MPC185 security processors
      • Supports a 32-bit 33/66 MHz PMC card
      • 64 Mbytes of 64-bit SDRAM DIMM (expandable to 128 Mbytes)
  • IEI Global Sourcing  (1)
    • Enano-8523T
      IEI Technology Corp. Launches the World's First Competitively Priced High-Security Financial Security Terminal Motherboard (+)

      Features:

      • 1. New ULV Celeron® M EPIC SBC: EPIC size, new ULV Inel® Celeron® M 800MHz zero cache processor with DDR266 SDRAM up to 1GB fanless embedded board.
      • Hardware Security Function: TPM v1.2 (Trusted Platform Module) hardware security function supported
      • 3.Complete I/Os Support: Complete I/O support with 4 x COM ports, IDE, CFII, Intel® LAN chipset, and 4 x USB2.0
  • LDRA  (4)
    • Embed-X
      “End-to-end” Application Lifecycle Management (ALM) system from LDRA and Visure Solutions (+)

      Features:

      45100.jpg
      • Integrates the entire software engineering process, from project management, to requirements management, to architecture, code creation, software configuration, and finally testing
      • Now requirements, for example those for DO-178B, can be found and used dynamically within the system alongside the tangibles from all other project phases, rather than being isolated and located elsewhere
      • Reports on the progression of development and enforces inter-phase development processes
    • LDRA tool suite (CWE Compatible)
      Dynamic and static analysis tools (+)

      Features:

      52220.jpg
      • TBvision and LDRA Testbed
      • Can successfully document, reference, and ID the specified software code security weaknesses
      • CWE compatible
    • LDRA tool suite v8.0
      Version 8.0 of the LDRA tool suite, a fully automated end-to-end product for software verification support (+)

      Features:

      41760.jpg
      • Provides important support and adoption of FAA, FDA, DoD, and MILS standards and implements methodology to help companies improve their CMMI maturity
      • Using LDRA DO-178B tool qualification support pack, customers gain end-to-end certification support for the FAA's DO-178B levels C, B, and A
      • Offers code coverage metrics down to the object code level
    • x86 assembler tool suite
      Compatible with any x86 assembler variant, the LDRA implementation proffers assembly coverage such as bitmap coverage, gain assembly static analysis, and report/artifact creation (+)

      Features:

      47223.jpg
      • The LDRA implementation is able to nix the prospects of (and therefore, the expenses of) new-code writing, testing, and verification
      • The LDRA tool suite includes the LDRA Testbed, TBrun, TBreq, TBvision, Embed-X, TBsecure, TBevolve, TBsafe, and DO-178B Tool Qual Pack products [...]
  • Visure Solutions  (1)
    • Embed-X
      “End-to-end” Application Lifecycle Management (ALM) system from LDRA and Visure Solutions (+)

      Features:

      45101.jpg
      • Integrates the entire software engineering process, from project management, to requirements management, to architecture, code creation, software configuration, and finally testing
      • Now requirements, for example those for DO-178B, can be found and used dynamically within the system alongside the tangibles from all other project phases, rather than being isolated and located elsewhere
      • Reports on the progression of development and enforces inter-phase development processes
  • Kontron  (4)
    • Kontron VMP3
      A 3U VME CPU board (+)

      Features:

      34835.jpg
      • Uncompromising computing performance and networking bandwidth for demanding control and communication tasks, achieved by state-of-the-art PowerPC technology
      • Performance built around the Freescale PowerPC MPC8541
      • Dual Gigabit Ethernet plus one Fast Ethernet channel
    • KTA55/pITX
      KTA55/pITX, a 2.5" Pico-ITX embedded SBC based on the AMD Embedded G-Series processor (+)

      Features:

      52208.jpg
      • Processing unit integrates one or two 64-bit processor cores, a programmable graphics unit that supports DirectX 11 and dual-screen 1080p video displays, plus a PCI Express Gen2 controller and a DDR3 RAM controller
      • Features a 100 mm x 72 mm footprint and includes six USB 2.0 ports, an integrated 10/100/1000 Ethernet port, three 6.0 Gbps SATA connections, a low pin count bus for legacy peripherals, and eight configurable GPIO
      • Trusted platform module provides data security for safety-critical applications
    • CP3002-RC and CP6003
      Powerful CompactPCI blades (+)

      Features:

      • The CP3002-RC is conduction cooled and supports operational temperatures ranging from -40°C to +85°C according to VITA 47 recommendations
      • Up to 8 GB of soldered DDR3 1066 MHz ECC memory ensures data accuracy for demanding mission-critical and safety-critical applications
      • The CP6003, a CompactPCI PICMG 2.16-compliant 6U CPU board, comes in various levels of ruggedization, making it yet another addition to Kontron’s rugged PICMG 2.16 portfolio. [...]
    • CP6002 and CP3002
      Intel Core i7 Processor Boards (+)

      Features:

      46585.jpg
      • The CP3002-RC is conduction cooled and supports operational temperatures ranging from -40 °C to +85 °C according to VITA 47 recommendations
      • On the memory side, up to 8 GB of soldered DDR3 1066 MHz ECC memory ensures data accuracy for demanding and mission-critical and safety-critical applications
      • The CP6002, a CompactPCI PICMG 2.16 compliant 6U CPU board, comes with various rugged levels
  • Lanner Electronics, Inc.  (12)
    • FW-8870
      Supports dual Intel Xeon multi-core processors and the Intel 5100 chipset (+)

      Features:

      • Suitable for a broad range of network acceleration, security and traffic management applications for enterprise markets
      • 1U rackmount appliance with one internal SATA storage bay
      • Built around the server-grade Intel 5100 MCH chipset, designed for performance and power optimization in embedded systems
    • FW-8880
      Supports dual Intel Xeon multi-core processors and the Intel 5100 chipset (+)

      Features:

      38966.jpg
      • Suitable for a broad range of network acceleration, security and traffic management applications for enterprise markets
      • 2U platform with four removable SATA drive bays
      • Built around the server-grade Intel 5100 MCH chipset, designed for performance and power optimization in embedded systems
    • FW-8890
      A two-way quad-core Xeon rack-mount appliance for enterprise-grade network security and management applications (+)

      Features:

      33347.jpg
      • Quad-core processing delivers better performance on multiple applications at a substantially reduced power envelope
      • Intel Core microarchitecture supports better system utilization, boosts application responsiveness, and increases performance headroom for single and multi-threaded applications
      • Onboard Cavium Nitrox CN1010 VPN Accelerator increases total system throughput by processing high-level IPsec and IKE, IPv6, SSL, and wireless LAN security protocol macro commands to reduce host I/O traffic and dramatically offload the system processor
    • LEC-5520
      In-Vehicle Hybrid DVR for Security, Safety and Entertainment Applications (+)

      Features:

      45362.jpg
      • 4 BNC Inputs
      • Onboard H.264 Hardware Encode
      • 4 Alarm Input, 2 Relay Output
    • MR-955
      Lanner's next generation network security platforms deliver exceptional performance and flexible networking using Cavium OCTEON Plus and OCTEON II Processors [...] (+)

      Features:

    • FW-9100
      Lanner “Twin Turbo” FW-9100 Network Application Platform combines x86 convenience with advanced Cavium security acceleration (+)

      Features:

      • 2U rackmount dual mainboard system
      • Intel Q965 + ICH8B chipset
      • Intel Core 2 Quad support, LGA775
    • MR-550
      Multi-core MIPS64 platform with embedded encryption, networking, and TCP acceleration engines (+)

      Features:

      36430.jpg
      • Intelligent Security - Unique hardware acceleration implements the latest set of algorithms to enable future-proof designs
      • Extensive Networking Interfaces
      • Deploy our base product with five GbE ports or customize with up to three SFP Connectors
    • FW-7570 Appliance
      Incorporates New Intel EP80579 Integrated Processor with Intel QuickAssist technology to provide better value and performance for network applications (+)

      Features:

      38381.jpg
      • Integrated security engine
      • Six integrated Ethernet ports with up to two pairs supporting abnormal state packet by-pass
      • Optional four Ethernet ports via expansion module with two pairs supporting by-pass
    • EP80679 Appliance
      Integrated security engine (+)

      Features:

      • Six integrated Ethernet ports with up to two pairs supporting abnormal state packet bypass
      • Optional four Ethernet ports via expansion module with two pairs supporting bypass
      • 2.0 USB, CF socket, 2.5” or 3.5” HDD, Mini-PCI and console
    • FW-7539
      A SFF network appliance designed for security and network communication (+)

      Features:

      46671.jpg
      • Features 4 GbE LAN ports (w/ 2 pair bypass option) and utilizes the Intel Atom D410/D510
      • Intel Atom D410/D510
      • Fanless
    • FW-7876
      Offers security providers increased system performance coupled with long- and short-term and cost savings (+)

      Features:

      33282.jpg
      • High network throughput – Scan more packets per second with six enterprise grade Intel 82573L Gigabit NICs with two pairs supporting port bypass
      • Intel Core 2 Duo, Core Duo, Core Solo, Celeron M, LV, and ULV processor support
      • Dual-channel DDR2 SDRAM at 667 MHz
    • FW-5330
      Lanner's latest network appliance is fanless and it features the AMD T24L processor (A50M chipset), up to 4GB of DDR3 memory, Realtek RTL 8111E network controller, type-II Compact Flash socket for storage, 2 or 4 Gigabit Ethernet ports and a 36W power adaptor with lock. Other I/O interface are two USB ports and one RJ-45 Cisco type console port. For more information about this product, please contact our sales representative: sales@lannerinc.com (+)

      Features:

      213844735666735110.jpg
      • AMD T24L processor
      • 4GB of DDR3 memory
      • Realtek RTL 8111E network controller
  • Aculab  (1)
    • ApplianX IP
      v2.10 software for the ApplianX IP Gateway (+)

      Features:

      • Resilient, single-purpose, easy-to-manage, plug-and-play device
      • New features have been added which further enable a solid VoIP migration strategy by allowing IP-based communications systems or networks to connect to legacy TDM-based PBXs or networks
      • Now includes support for Call Back When Free / Next Available (CBWF/NA) allowing for two or more DPNSS or Q.SIG enabled PBXs to be connected using a SIP trunk or connection
  • Ethernet Direct Corporation  (2)
    • HMG-828
      Industrial Managed Gigabit Switch with SFP option (+)

      Features:

      • Flexible port density: 8 10/100BASE-TX and 2 Gigabit RJ-45/SFP combo, (10/100/1000BASE-TX, 1000BASE-SX, 1000BASE-LX, or 100BASE-FX)
      • Supports wide range power redundancy with redundant DC power Inputs, wide temperature support, rigid aluminum case complying with the IP31 class of protection, input power isolation design for telecom application passing Hi-Pot 1.5K V isolation, DIN-Rail/Wall-Mounting/Desktop Installation, and SFP ports
      • Supports X-Ring proprietary protocol for high speed redundancy to Ethernet network
    • HMG-1628
      Powerful industrial 16 10/100TX + 2 port Gb copper/SFP managed switch (+)

      Features:

      • Flexible port density 16 10/100BASE-TX and 2 Gb RJ-45/SFP combo, (10/100/1000BASE-TX, 1000BASE-SX, 1000BASE-LX, or 100BASE-FX)
      • Superb Hardware Design
      • Supports wide range power redundant design with redundant DC Power Inputs
  • nCipher  (1)
    • Mini HSM
      Designed to provide original equipment manufacturers (OEMs) with a solution for data encryption, digital signing and strong authentication (+)

      Features:

      • miniHSM is about the size of a pack of chewing gum, but within this small form factor it provides embedded HSM functionality to enable a simplified and highly cost effective means to enable tamper-resistant hardware protection of encryption keys with a pre-validated FIPS 140-2 level 3 security rating
      • The small footprint and ease of integration of miniHSM allows manufacturers to embed HSM functionality into devices where space and power are at a premium
      • nCipher's miniHSM supports a wide range of cryptographic algorithms, including all common symmetric- and asymmetric-key cryptographic algorithms (including 3DES, AES, RSA, and DH) as well as more specialist algorithms such as Elliptic Curve Cryptography (ECC)
  • NEI  (2)
    • N-2170
      NEBS Level 3 certified carrier-grade rack mount server based on Dell PowerEdge technology with integrated GE packet processing technology for network security applications (+)

      Features:

      46555.jpg
      • This DC-powered 2U carrier grade platform contains GE OCTEON-based PCIe IP packet processor cards designed to perform DPI for security gateway applications such as content inspection, data security encryption/decryption (SSL/IPSec/TLS), network monitoring, lawful interception and traffic management
      • Dual socket support for Intel Xeon 5600 Series 6-core processors and combines high performance with power efficiency to deliver improved performance-per-watt over previous generation rack-mount servers
      • This rugged server is designed for demanding telco CO environments, network data centers, and enterprise networks
    • N-2170
      A NEBS Level 3 certified carrier-grade rack mount server based on Dell PowerEdge technology with integrated GE packet processing technology for network security applications (+)

      Features:

      46335.jpg
      • NEBS Level 3 certified, DC-powered 2U carrier grade server built on the Dell PowerEdge R710 server
      • GE OCTEON-based PCIe IP packet processor cards create a solution designed to perform deep packet inspection for security gateway applications such as content inspection, data security encryption/decryption (SSL/IPSec/TLS), network monitoring, lawful interception and traffic management
      • Provides dual socket support for Intel Xeon 5600 Series 6-core processors and combines high performance with power efficiency to deliver improved performance-per-watt over previous generation rack-mount servers
  • Panasonic Computer Solutions Company  (3)
    • CF-30 Toughbook
      A next-generation rugged “Toughbook” notebook computer (+)

      Features:

      32597.jpg
      • Ideal for mobile applications and mission-critical environments
      • Intel Core Duo Processor L2400 (2MB L2 cache), processor speed 1.66 GHz, 667 MHz FSB
      • 80 GB or 60 GB HDD, shock mounted and removable
    • CF-19
      A rugged convertible tablet PC (+)

      Features:

      32840.jpg
      • Intel Core Duo processor U2400 (2MB L2 cache), processor speed 1.06 GHz, 533 MHz FSB
      • 80 GB HDD
      • 512 MB SDRAM standard, expandable to 4096 MB
    • Toughbooks featuring DriveArmor
      Panasonic's rugged notebook Toughbooks with Mobile Armor's DriveArmor data security management, enterprise-class solution (+)

      Features:

      46271.jpg
      • The Toughbook 19 and the Toughbook 31's new DriveArmor arsenal provides policy-driven control for desktop computers and notebook PCs via 2.5", FIPS-compliant Seagate Technology Momentus self-encrypting disk drives
      • DriveArmor data security management solution renders extensive auditing and reporting capabilities, pre-boot authentication, and centralized management, all to thwart unauthorized data access on stolen or lost computers
      • The Toughbook 19 laptop convertible tablet features the Intel Core i5 and a 10.4" sunlight-viewable touchscreen at 1,000 nits and is MIL-STD-810G compliant
  • Netronome  (2)
    • NFP-32xx family
      The new Netronome NFP-32xx family delivers more than 1.838 billion instructions per watt in a profile of 15 to 35 W (+)

      Features:

      42250.jpg
      • These highly integrated network flow processor engines are designed to team with Intel architecture processors using the Single Root I/O Virtualization (SR-IOV) features of PCI Express Gen 2 to provide 256 queues for I/O coprocessing
      • The 40 microengines are integrated into an optimized high-speed interconnect, with programming tools available to help designers utilize the architecture
      • To integrate with high-speed networks, NFP-32xx incorporates 25 Gbps Interlaken, SPI 4.2, and 10 Gbps XAUI interfaces
    • NFP-32xx
      The NFP32xx is the industry's first processor designed for unified computing architectures,combining high performance network,content and security processing with I/O virtualization (+)

      Features:

      43994.jpg
      • High-Performance: Powered by 40 multi-threaded programmable networking cores running at 1.4 GHz, the NFP delivers over 56 billion instructions per second with 320 hardware threads that optimize memory utilization – allowing for 1800 instructions per packet at 30 million packets per second
      • This enables 40 Gbps of L2-L7 deep packet processing with line-rate security and I/O virtualization for millions of simultaneous flows
      • Power efficiency: Operating at only 15 to 35 watts, the NFP-32xx revolutionizes green computing by delivering more than four times the power efficiency of its closest competitor
  • Concurrent Technologies, Inc.  (1)
    • VP 91x/01x
      A processor board utilizing third-generation Intel Core processors (+)

      Features:

      • Brings unprecedented performance and power efficiency to the VME form factor while maintaining compatibility with the previous-generation product
      • Responding to the increased demand for security, the VP 91x/01x is offered with or without security packages
      • This incorporates a number of user-selectable and configurable proprietary security features deeply integrated into the board to prevent tampering and safeguard Intellectual Property
  • AR Infotek Inc.  (2)
    • Teak 3020
      ARinfotek developed a new Linux-compatible, compact yet high-performance Network Security Appliance: Teak 3020 (+)

      Features:

      41441.jpg
      • Intel Pentium M SOC EP80579 processor
      • Security engine feature
      • Quick assist support [...]
    • Teak 3010
      Teak 3010 is designed with low power consumption - 2.4 W AMD LX-800 CPU processor with North Bridge, AMD CS5536 south bridge and four Intel 82551ER LAN Fast Ethernet chipset. Even that's designed for entry level product, but it design concept is based on the large enterprise network performance and quality. It has fanless low power consumption and reliable performance that meets trusted network security appliance requirement in ROBO (Remote office, Branch office), SOHO (Small office, Home office), SMB (Small Medium Business) environment. (+)

      Features:

      • AMD LX-800 and CS-5536 CHIPSET
      • Built-in 3/4 Fast Ethernet LAN ports
      • Support LAN Bypass (Two 10/100 Mbps Bypass Port)
  • LynuxWorks  (1)
    • LynxSecure 3.1
      An upgraded version of the LynxSecure separation kernel and embedded hypervisor (+)

      Features:

      • Includes guest operating support for the latest Microsoft Windows and the latest Intel Core 2 Duo systems
      • As with prior versions, LynxSecure 3.1 can virtualize the underlying hardware to enable multiple, heterogeneous operating systems (OS) to coexist on the same platform
      • This mix can include traditional desktop OSs like fully virtualized Windows and para-virtualized Linux, along with hard real-time OSs like the LynxOS RTOS family
  • CommAgility  (1)
    • AMC-2C87W3
      Complete Digital Baseband design (+)

      Features:

      44259.jpg
      • L1 PHY (physical layer) L2 RLC/MAC (Radio Link Control/Media Access Control), S1/X2 interface and security processing for LTE (Long Term Evolution) or WiMAX in the compact single width, full-size Advanced Mezzanine Card (AMC) form factor
      • For these advanced wireless applications, the new CommAgility AMC-2C87W3 integrates the PHY, RLC/MAC, transport (including all backhaul and air interface security) and antenna connectivity requirements of eNodeB into a compact solution, and provides end-to-end data handling from raw radio IQ data through to backhaul IP packets
      • The module incorporates the latest WinPath3 Network Processor from Wintegra, which provides a flexible means of handling the Real-time IP packet and security processing and L2 RLC/MAC demands of wireless base stations
  • Icon Labs  (1)
    • Floodgate Defender
      Floodgate™ Defender is a complete embedded firewall providing a critical layer of security for networked devices. Floodgate Defender provides static (rules-based) filtering, Stateful Packet Inspection (SPI) and threshold-based filtering. Floodgate Defender’s Lockdown Mode provides the highest level of security for systems where security is critical. Floodgate Defender is the only embedded firewall to provide all three types of filtering to protect embedded devices from the growing number of Internet-based threats. (+)

      Features:

      284968888861766491.jpg
      • Event logging – all threshold crossings are logged to a file or to other interface.
      • Fully configurable API
      • Deterministic or non-deterministic threshold filtering.
  • Infoblox  (1)
    • PortIQ appliance
      PortIQ™ appliance, which provides visibility into switch port usage – essential for network capacity planning, security investigations, and ease of troubleshooting (+)

      Features:

      • With the Infoblox PortIQ appliance, network administrators can easily identify the physical port associated with every connected device and get reports on network port utilization
      • PortIQ enables IT departments to get more from their existing assets and make more intelligent switch purchase decisions, saving capital expenses
      • Allows quickly locate where devices are connected increases security and eases troubleshooting efforts, saving operational costs
  • Unicoi Systems, Inc  (4)
    • Secure Real-time Transport Protocol
      The Fusion Embedded Real-time Transport Protocol (RTP) software was designed to enable the transport of real-time data over packet-oriented data networks such as the Internet. Fusion SRTP is the security-enhanced implementation of Fusion RTP (+)

      Features:

      • Use of Fusion SRTP is optional to utilization of Fusion RTP; but even if SRTP is used, all provided features can be individually enabled or disabled
      • Fusion Embedded SRTP provides encryption, message authentication and integrity, along with replay protection for the data being streamed by Fusion RTP in both unicast and multicast applications
      • Fusion RTP data encryption is especially important for securely transmitting audio and video data in business, banking, and national security, across the Internet or a walled-garden environment
    • Fusion Embedded IPsec (IP Security) (+)

      Features:

      • Strong Encryption
      • Data Integrity
      • Peer Authentication
    • Security-Enhanced
      Fusion RTP based on RFC 3711. Fusion SRTP is the security-enhanced implementation of Fusion RTP. Fusion SRTP provides encryption, message authentication and integrity (+)

      Features:

      • Secure RTP (SRTP)
      • Supports multiple concurrent RTP sessions
      • Supports multicast, unicast, and multi-point unicast UDP sessions
    • Fusion Embedded IKE (Internet Key Exchange) (+)

      Features:

      • Greater simplicity, and enhanced performance, security and reliability
      • Support for Extensible Authentication Protocol (EAP)
      • Legacy IKEv1 support, including support for ISAKMP (RFC 2408), IKE (RFC 2409), the Internet DOI (RFC 2407), NAT traversal, legacy authentication, and remote address acquisition.
  • Espion International  (1)
    • Interceptor
      FIPS 140-1, 140-2, and 197 compliant (+)

      Features:

      46276.jpg
      • Guarantees the U.S. government's highest security standards, with the MX LOCK-enabled version transforming the sender's email data into unintelligible ciphertext, which is then converted into its original form once it reaches the receiver's side
      • Once the receiver's unique credentials are presented, another plus of Interceptor is validated records of email receipt including which IP address a given email was accessed from, as well as server locale and attachments' file names
      • Can assist in GLBA or other policy compliance
  • CPU Technology, Inc.  (1)
    • Acalis CPU872 Secure Processor
      The Acalis CPU872 Secure Processor provides unique and unprecedented anti-tamper protection for software and system IP (+)

      Features:

      45793.jpg
      • The CPU872 contains dual high-performance PowerPC 440 and FPU cores, dual embedded DRAMs and numerous other functions
      • The CPU872 also contains intrinsic features that prevent tampering and reverse-engineering to protect valuable intellectual property contained in the software and system
      • Acalis CPU872 Secure Processor
10/1/14 11:53
Close

Subscribe to Safety Certification and Security updates