Satellites, telecommunications equipment and spacecraft are mission-critical to government agencies and many commercial interests. Ensuring the cybersecurity of the devices within and supporting these deployments is one of the most important tasks over the coming decades.
Since its inception, Red Balloon Security has worked closely with the US Government to protect aerospace and defense deployments. Our core embedded defense technology, Symbiote, has been deployed by DARPA, the DoD, DHS, and other agencies. Symbiote’s runtime protection defense is also designed for deployment within critical commercial infrastructure.
With the government’s help, Red Balloon Security has developed new embedded defense capabilities, more streamlined approaches to implementing embedded security, and integrations into a dozen devices of interest to the U.S. Government.
Red Balloon Security has also been proud to deploy defensive technologies like Symbiote directly to the U.S. Government’s facilities, where there is a desperate need for proven, high-quality security for embedded systems to secure that nation’s devices.
Satellites, telecommunications equipment and spacecraft are mission-critical to government agencies and many commercial interests. Ensuring the cybersecurity of the devices within and supporting these deployments is one of the most important tasks over the coming decades.
Since its inception, Red Balloon Security has worked closely with the US Government to protect aerospace and defense deployments. Our core embedded defense technology, Symbiote, has been deployed by DARPA, the DoD, DHS, and other agencies. Symbiote’s runtime protection defense is also designed for deployment within critical commercial infrastructure.
With the Government’s help, Red Balloon Security has developed new embedded defense capabilities, more streamlined approaches to implementing embedded security, and integrations into a dozen devices of interest to the U.S. Government.
Red Balloon Security has also been proud to deploy defensive technologies like Symbiote directly to the U.S. Government’s facilities, where there is. a desperate need for proven, high-quality security for embedded systems to secure that nation’s devices.
Satellites, telecommunications equipment and spacecraft are mission-critical to government agencies and many commercial interests. Ensuring the cybersecurity of the devices within and supporting these deployments is one of the most important tasks over the coming decades.
Since its inception, Red Balloon Security has worked closely with the US Government to protect aerospace and defense deployments. Our core embedded defense technology, Symbiote, has been deployed by DARPA, the DoD, DHS, and other agencies. Symbiote’s runtime protection defense is also designed for deployment within critical commercial infrastructure.
With the Government’s help, Red Balloon Security has developed new embedded defense capabilities, more streamlined approaches to implementing embedded security, and integrations into a dozen devices of interest to the U.S. Government.
Red Balloon Security has also been proud to deploy defensive technologies like Symbiote directly to the U.S. Government’s facilities, where there is. a desperate need for proven, high-quality security for embedded systems to secure that nation’s devices.
Red Balloon Security is a leading developer of cutting-edge technologies in the field of embedded device security for government deployments and aerospace applications.
Red Balloon Security is a leading developer of cutting-edge technologies in the field of embedded device security for government deployments and aerospace applications.
Rather than using Ethernet communication to relay alerts from AESOP, which gathers telemetry data from Symbiote payloads, LADS explores the use of analog transmission of data (through LED lights, EM radiation, or other approaches). This allows for an AESOP that is truly out of band and completely air-gapped.
Using our FRAK capability, which applies firmware hardening and protection, we are developing a system to implement security patches into legacy embedded devices. FRAK also maintains a high degree of assurance that a device’s functionality will not be impacted.
Red Balloon Security contributed several well-received challenges to the 2020 DEFCON Hack-A-Sat challenge presented by the USAF.
Rather than using Ethernet communication to relay alerts from AESOP, which gathers telemetry data from Symbiote payloads, LADS explores the use of analog transmission of data (through LED lights, EM radiation, or other approaches). This allows for an AESOP that is truly out of band and completely air-gapped.
Using our FRAK capability, which applies firmware hardening and protection, we are developing a system to implement security patches into legacy embedded devices. FRAK also maintains a high degree of assurance that a device’s functionality will not be impacted.
Red Balloon Security contributed several well-received challenges to the 2020 DEFCON Hack-A-Sat challenge presented by the USAF.
Red Balloon Security is a leading developer of cutting-edge technologies in the field of embedded device security for government deployments and aerospace applications.
Rather than using Ethernet communication to relay alerts from AESOP, which gathers telemetry data from Symbiote payloads, LADS explores the use of analog transmission of data (through LED lights, EM radiation, or other approaches). This allows for an AESOP that is truly out of band and completely air-gapped.
Using our FRAK capability, which applies firmware hardening and protection, we are developing a system to implement security patches into legacy embedded devices. FRAK also maintains a high degree of assurance that a device’s functionality will not be impacted.
Red Balloon Security contributed several well-received challenges to the 2020 DEFCON Hack-A-Sat challenge presented by the USAF.
Embedded device security can be added directly to end devices bringing enhanced security to non-standard or out of
support devices.
Improve monitoring and data collection for mission-critical devices.
Prepare for and anticipate evolving cyber threats.
Practice in-depth defense to the edge device layer.
Embedded device security can be added to any operating system or hardware protecting the device from the boot loader to the application, including third-party libraries.
Enhance security without decreasing performance.
Open a path to detailed forensics.
Increase the time window for patches.
Embedded device security can be added directly to end devices bringing enhanced security to non-standard or out of support devices.
Improve monitoring and data collection for mission-critical devices.
Prepare for and anticipate evolving cyber threats.
Practice in-depth defense to the edge device layer.
Embedded device security can be added to any operating system or hardware protecting the device from the boot loader to the application, including third-party libraries.
Enhance security without decreasing performance.
Open a path to detailed forensics.
Increase the time window for patches.
Embedded device security can be added directly to end devices bringing enhanced security to non-standard or out of support devices.
Improve monitoring and data collection for mission-critical devices.
Prepare for and anticipate evolving cyber threats.
Practice in-depth defense to the edge device layer.
Embedded device security can be added to any operating system or hardware protecting the device from the boot loader to the application, including third-party libraries.
Enhance security without decreasing performance.
Open a path to detailed forensics.
Increase the time window for patches.
Sal Stolfo was an original founding member of Red Balloon Security, Inc.
© 2022 Red Balloon Security.
All Rights Reserved.
Contact us now to discover more about Red Balloon Security’s range of solutions and services or to arrange a demonstration.
Reach out to learn more about our embedded security offering and to schedule a demo.
Reach out to learn more about our embedded security offering and to schedule a demo.
Reach out to learn more about our embedded security offering and to schedule a demo.
Reach out to learn more about our embedded security offering and to schedule a demo.