Red Balloon Security’s technology removes excess code, services and information from devices while making them faster, more difficult to exploit and less susceptible to vulnerabilities from third-party libraries.
Embedded devices rely on firmware, the code that contains a device’s operating and communications instructions. Red Balloon Security’s suite of firmware protection solutions harden firmware protections and repel the growing number of attacks that target embedded devices in many mission-critical systems.
Autotomic Binary Reduction (ABR) is an embedded security solution that removes unused features from binary embedded device firmware and reduces a device’s available attack surface.
Binary Structure Randomization (BSR) is an embedded security solution that randomizes the code layout and data at a binary level across firmware images, defeating attacks that rely on knowledge of the code layout.
The OFRAK appliance is utilized in the firmware build process to automatically apply firmware hardening (ABR & BSR) and inject the runtime protection.
Embedded devices rely on firmware, the code that contains a device’s operating and communications instructions. Red Balloon Security’s suite of firmware protection solutions harden firmware protections and repel the growing number of attacks that target embedded devices in many mission-critical systems.
Autotomic Binary Reduction (ABR) is an embedded security solution that removes unused features from binary embedded device firmware and reduces a device’s available attack surface.
The FRAK appliance is utilized in the firmware build process to automatically apply firmware hardening (ABR & BSR) and inject the runtime protection.
SBIR Achievements in US Government
Most Under-Hyped Research
Popular Science
SBIR achievements in US Government
Most under-hyped research
Popular Science
SBIR achievements in US Government
Most under-hyped research
Popular Science
Red Balloon Security’s technology stands out for its simplified deployment and focus on the particular challenges of securing embedded devices. We’ve designed ABR, BSR and OFRAK to keep your devices functional and consistent with their operational requirements while protecting them at the source from external vulnerabilities.
Limit access to your devices and the tools available to an attacker if they gain a foothold. Reduce the patches and firmware updates needed to keep up with the growth of vulnerabilities in libraries and operating systems.
Follow a standard device firmware build and apply the security in minutes, without R&D interactions, using the automated system.
Increase the difficulty and time required to exploit a vulnerability while expanding the window for your vendors and users to react to vulnerabilities.
Apply protection automatically to the final firmware without exposing intellectual property or disrupting device behavior and R&D resources.
(*Access to source code can accelerate the process).
Red Balloon Security’s technology stands out for its simplified deployment and focus on the particular challenges of securing embedded devices. We’ve designed ABR, BSR and FRAK to keep your devices functional and consistent with their operational requirements while protecting them at the source from external vulnerabilities.
Red Balloon Security’s technology stands out for its simplified deployment and focus on the particular challenges of securing embedded devices. We’ve designed ABR, BSR and FRAK to keep your devices functional and consistent with their operational requirements while protecting them at the source from external vulnerabilities.
Limit access to your devices and the tools available to an attacker if they gain a foothold. Reduce the patches and firmware updates needed to keep up with the growth of vulnerabilities in libraries and operating systems.
Follow a standard device firmware build and apply the security in minutes, without R&D interactions, using the automated system.
Increase the difficulty and time required to exploit a vulnerability while expanding the window for your vendors and users to react to vulnerabilities.
Apply protection automatically to the final firmware without exposing intellectual property or disrupting device behavior and R&D resources. (*Access to source code can accelerate the process).
Limit access to your devices and the tools available to an attacker if they gain a foothold. Reduce the patches and firmware updates needed to keep up with the growth of vulnerabilities in libraries and operating systems.
Follow a standard device firmware build and apply the security in minutes, without R&D interactions, using the automated system.
Increase the difficulty and time required to exploit a vulnerability while expanding the window for your vendors and users to react to vulnerabilities.
Apply protection automatically to the final firmware without exposing intellectual property or disrupting device behavior and R&D resources. (*Access to source code can accelerate the process).
We support any Operating System — and even systems with no operating system. Existing deployments include but are not limited to: Linux, Android, Windows CE, VxWorks, QNX, Cisco IOS, Nuttx, Nucleus, ThreadX, RTA-OS, LynxOS.
Existing Instruction Set Architecture (ISA) deployments include: ARM, ARM 64, ARM Thumb Mode, MIPS, PowerPC VLE, x86, x64, AVR, and MSP430. Additional ISAs can be supported.
We support any Operating System — and even systems with no operating system. Existing deployments include but are not limited to: Linux, Android, Windows CE, VxWorks, QNX, Cisco IOS, Nuttx, Nucleus, ThreadX, RTA-OS, LynxOS.
Existing Instruction Set Architecture (ISA) deployments include: ARM, ARM 64, ARM Thumb Mode, MIPS, PowerPC VLE, x86, x64, AVR, and MSP430. Additional ISAs can be supported.
We support any Operating System — and even systems with no operating system. Existing deployments include but are not limited to: Linux, Android, Windows CE, VxWorks, QNX, Cisco IOS, Nuttx, Nucleus, ThreadX, RTA-OS, LynxOS.
Existing Instruction Set Architecture (ISA) deployments include: ARM, ARM 64, ARM Thumb Mode, MIPS, PowerPC, x86, x64, AVR, MSP430, VLE. Additional ISAs can be supported.
We are prepared to help you build out and maintain our security solutions — or provide back-up support when installation is straightforward. With over 10 years’ experience in the field and a reputation for pioneering research that elevates industry and government standards, we can help you accelerate your security evolution — and gain a powerful market advantage.
We are prepared to help you build out and maintain our security solutions — or provide back-up support when installation is straightforward. With over 10 years’ experience in the field and a reputation for pioneering research that elevates industry and government standards, we can help you accelerate your security evolution — and gain a powerful market advantage.
We are prepared to help you build out and maintain our security solutions — or provide back-up support when installation is straightforward. With over 10 years’ experience in the field and a reputation for pioneering research that elevates industry and government standards, we can help you accelerate your security evolution — and gain a powerful market advantage.
Sal Stolfo was an original founding member of Red Balloon Security, Inc.
© 2022 Red Balloon Security.
All Rights Reserved.
© 2022 Red Balloon Security. All Rights Reserved.
Contact us now to discover more about Red Balloon Security’s range of solutions and services or to arrange a demonstration.
Reach out to learn more about our embedded security offering and to schedule a demo.
Reach out to learn more about our embedded security offering and to schedule a demo.
Reach out to learn more about our embedded security offering and to schedule a demo.
Reach out to learn more about our embedded security offering and to schedule a demo.