FIRMWARE HARDENING

REDUCE YOUR ATTACK SURFACE

Red Balloon Security’s technology removes excess code, services and information from devices while making them faster, more difficult to exploit and less susceptible to vulnerabilities from third-party libraries.

SECURITY AT THE FIRMWARE LEVEL THAT REMOVES EXPLOIT OPPORTUNITIES

Embedded devices rely on firmware, the code that contains a device’s operating and communications instructions. Red Balloon Security’s suite of firmware protection solutions harden firmware protections and repel the growing number of attacks that target embedded devices in many mission-critical systems.

Autotomic Binary Reduction (ABR) is an embedded security solution that removes unused features from binary embedded device firmware and reduces a device’s available attack surface.

Binary Structure Randomization (BSR) is an embedded security solution that randomizes the code layout and data at a binary level across firmware images, defeating attacks that rely on knowledge of the code layout. 

The OFRAK appliance is utilized in the firmware build process to automatically apply firmware hardening (ABR & BSR) and inject the runtime protection.

SECURITIZATION AT THE FIRMWARE LEVEL THAT REMOVES EXPLOIT OPPORTUNITIES

Embedded devices rely on firmware, the code that contains a device’s operating and communications instructions. Red Balloon Security’s suite of firmware protection solutions harden firmware protections and repel the growing number of attacks that target embedded devices in many mission-critical systems.

ABR_wordmark_red

Autotomic Binary Reduction (ABR) is an embedded security solution that removes unused features from binary embedded device firmware and reduces a device’s available attack surface.

BSR@4x
Binary Structure Randomization (BSR) is an embedded security solution that randomizes the code layout and data at a binary level across firmware images, defeating attacks that rely on knowledge of the code layout. 
RBS_Frak_wordmark_red

The FRAK appliance is utilized in the firmware build process to automatically apply firmware hardening (ABR & BSR) and inject the runtime protection.

AWARD WINNING
TECHNOLOGY WITH A
STRONG HISTORY

2020

Tibbetts Award

SBIR Achievements in US Government

2019

Pwnie Award

Most Under-Hyped Research

2016

Greatest Tech of 2016

Popular Science

AWARD WINNING
TECHNOLOGY WITH A
STRONG HISTORY

2020

Tibbetts Award

SBIR achievements in US Government

2019

Pwnie
Award

Most under-hyped research

2016

Greatest Tech of 2016

Popular Science

AWARD WINNING
TECHNOLOGY WITH A STRONG HISTORY

2020

Tibbetts Award

SBIR achievements in US Government

2019

Pwnie Award

Most under-hyped research

2016

Greatest Tech of 2016

Popular Science

THE MOST ADVANCED SECURITY SOLUTION DELIVERED WITH SPEED, EFFICIENCY AND ANTICIPATION OF EVOLVING ATTACK METHODS.

Red Balloon Security’s technology stands out for its simplified deployment and focus on the particular challenges of securing embedded devices. We’ve designed ABR, BSR and OFRAK to keep your devices functional and consistent with their operational requirements while protecting them at the source from external vulnerabilities.

Reduce Exposure to Vulnerabilities

Limit access to your devices and the tools available to an attacker if they gain a foothold. Reduce the patches and firmware updates needed to keep up with the growth of vulnerabilities in libraries and operating systems.

Deploy to Firmware
in Minutes

Follow a standard device firmware build and apply the security in minutes, without R&D interactions, using the automated system.

Randomize Memory
& Code

Increase the difficulty and time required to exploit a vulnerability while expanding the window for your vendors and users to react to vulnerabilities.

No Source Code Required*

Apply protection automatically to the final firmware without exposing intellectual property or disrupting device behavior and R&D resources.
(*Access to source code can accelerate the process).

THE MOST ADVANCED SECURITY SOLUTION DELIVERED WITH SPEED, EFFICIENCY AND ANTICIPATION OF EVOLVING ATTACK METHODS.

Red Balloon Security’s technology stands out for its simplified deployment and focus on the particular challenges of securing embedded devices. We’ve designed ABR, BSR and FRAK to keep your devices functional and consistent with their operational requirements while protecting them at the source from external vulnerabilities.

THE MOST ADVANCED SECURITY SOLUTION DELIVERED WITH SPEED, EFFICIENCY AND ANTICIPATION OF EVOLVING ATTACK METHODS.

Red Balloon Security’s technology stands out for its simplified deployment and focus on the particular challenges of securing embedded devices. We’ve designed ABR, BSR and FRAK to keep your devices functional and consistent with their operational requirements while protecting them at the source from external vulnerabilities.

Reduce exposure to vulnerabilities

Limit access to your devices and the tools available to an attacker if they gain a foothold. Reduce the patches and firmware updates needed to keep up with the growth of vulnerabilities in libraries and operating systems.

Deploy to firmware in minutes

Follow a standard device firmware build and apply the security in minutes, without R&D interactions, using the automated system.

Randomize memory and code

Increase the difficulty and time required to exploit a vulnerability while expanding the window for your vendors and users to react to vulnerabilities.

No source code required*

Apply protection automatically to the final firmware without exposing intellectual property or disrupting device behavior and R&D resources. (*Access to source code can accelerate the process).

Reduce exposure to vulnerabilities

Limit access to your devices and the tools available to an attacker if they gain a foothold. Reduce the patches and firmware updates needed to keep up with the growth of vulnerabilities in libraries and operating systems.

Deploy to firmware in minutes

Follow a standard device firmware build and apply the security in minutes, without R&D interactions, using the automated system.

Randomize memory and code

Increase the difficulty and time required to exploit a vulnerability while expanding the window for your vendors and users to react to vulnerabilities.

No source code required*

Apply protection automatically to the final firmware without exposing intellectual property or disrupting device behavior and R&D resources. (*Access to source code can accelerate the process).

TECHNOLOGY THAT IS COMPATIBLE ACROSS YOUR SYSTEMS

Red Balloon Security's Products Are OS-Agnostic:

We support any Operating System — and even systems with no operating system. Existing deployments include but are not limited to: Linux, Android, Windows CE, VxWorks, QNX, Cisco IOS, Nuttx, Nucleus, ThreadX, RTA-OS, LynxOS.

Red Balloon Security's Technology Is Device Platform Independent:

Existing Instruction Set Architecture (ISA) deployments include: ARM, ARM 64, ARM Thumb Mode, MIPS, PowerPC VLE, x86, x64, AVR, and MSP430. Additional ISAs can be supported.

TECHNOLOGY THAT IS COMPATIBLE ACROSS YOUR SYSTEMS

Red Balloon Security's products are OS-agnostic:

We support any Operating System — and even systems with no operating system. Existing deployments include but are not limited to: Linux, Android, Windows CE, VxWorks, QNX, Cisco IOS, Nuttx, Nucleus, ThreadX, RTA-OS, LynxOS.

Red Balloon Security's technology is device platform independent:

Existing Instruction Set Architecture (ISA) deployments include: ARM, ARM 64, ARM Thumb Mode, MIPS, PowerPC VLE, x86, x64, AVR, and MSP430. Additional ISAs can be supported.

TECHNOLOGY THAT IS COMPATIBLE ACROSS YOUR SYSTEMS

Red Balloon Security's products are OS-agnostic:

We support any Operating System — and even systems with no operating system. Existing deployments include but are not limited to: Linux, Android, Windows CE, VxWorks, QNX, Cisco IOS, Nuttx, Nucleus, ThreadX, RTA-OS, LynxOS.

Red Balloon Security's technology is device platform independent:

Existing Instruction Set Architecture (ISA) deployments include: ARM, ARM 64, ARM Thumb Mode, MIPS, PowerPC, x86, x64, AVR, MSP430, VLE. Additional ISAs can be supported.

THE REST OF THE RBS OFFER: OUR EXPERTS

We are prepared to help you build out and maintain our security solutions — or provide back-up support when installation is straightforward. With over 10 years’ experience in the field and a reputation for pioneering research that elevates industry and government standards, we can help you accelerate your security evolution — and gain a powerful market advantage.

THE REST OF THE RBS OFFER: OUR EXPERTS

We are prepared to help you build out and maintain our security solutions — or provide back-up support when installation is straightforward. With over 10 years’ experience in the field and a reputation for pioneering research that elevates industry and government standards, we can help you accelerate your security evolution — and gain a powerful market advantage.

THE REST OF THE RBS OFFER: OUR EXPERTS

We are prepared to help you build out and maintain our security solutions — or provide back-up support when installation is straightforward. With over 10 years’ experience in the field and a reputation for pioneering research that elevates industry and government standards, we can help you accelerate your security evolution — and gain a powerful market advantage.

DEFEND YOUR EMBEDDED
SYSTEMS

DEFEND YOUR EMBEDDED
SYSTEMS

DEFEND YOUR EMBEDDED
SYSTEMS

LEVERAGE OUR EXPERTISE FOR YOUR SECURITY NEEDS

Reach out to learn more about our embedded security offering and to schedule a demo.

LEVERAGE OUR EXPERTISE FOR YOUR SECURITY NEEDS

Reach out to learn more about our embedded security offering and to schedule a demo.

LEVERAGE OUR EXPERTISE FOR YOUR SECURITY NEEDS

Reach out to learn more about our embedded security offering and to schedule a demo.

LEVERAGE OUR EXPERTISE FOR YOUR SECURITY NEEDS

Reach out to learn more about our embedded security offering and to schedule a demo.