Red Balloon provides firmware-level solutions that enable manufacturers to become Defenders โ securing devices that protect essential infrastructure. We can help you elevate the security standard and end the patching rat race with runtime protection.ย
Turn cybersecurity into marketing edge by deploying the devices that can defend themselves.
Protect mission-critical safety elements against cyberattack.
Monitor device behavior at runtime and publish immediate alerts whenever a device deviates from its normal function.
Deliver continuous security without burdening developers with ongoing security demands.
Red Balloon has discovered critical architectural vulnerabilities in the Siemens SIMATIC and SIPLUS S7-1500 series that allow for bypass of all protected boot features.
Red Balloon provided embedded defense to protection relays, RTUs and network equipment to increase device protection, detect attacks and bring device level forensics.
Red Balloon discovered a vulnerability which allows an attacker to persistently bypass Ciscoโs proprietary secure boot mechanism and lock out future updates.
U.S. Government funded Red Balloon research to bring advanced on-device security with real-time detection to production-network building controllers.
Secure your devices in real time with unrivaled firmware security embedded to defend against memory corruption, control flow corruption, and process violations.
Automate your firmware analysis, randomization and modification to reduce attack surfaces and harden devices against attack.
Complement your runtime protection with complete visibility on attacks and enhanced forensics.
Sal Stolfo was an original founding member of Red Balloon Security, Inc.
ยฉ 2022 Red Balloon Security.
All Rights Reserved.
ยฉ 2022 Red Balloon Security. All Rights Reserved.
Contact us now to discover more about Red Balloon Security’s range of solutions and services or to arrange a demonstration.
Reach out to learn more about our embedded security offering and to schedule a demo.
Reach out to learn more about our embedded security offering and to schedule a demo.
Reach out to learn more about our embedded security offering and to schedule a demo.
Reach out to learn more about our embedded security offering and to schedule a demo.