RUNTIME MONITORING

ANALYZE SECURITY EVENT FORENSICS

Red Balloon Security provides unified monitoring, alerts, and forensic analysis in real time across all embedded devices that deploy our Symbiote technology,ย delivering greater awareness and responsiveness.

RUNTIME MONITORING

ANALYZE SECURITY EVENT FORENSICS

Red Balloon Security provides unified monitoring, alerts, and forensic analysis in real time across all embedded devices that deploy our Symbiote technology, delivering greater awareness and responsiveness.

PROVIDING REAL-TIME INTELLIGENCE AND VISIBILITY INTO YOUR MOST CRITICAL EMBEDDED DEVICES

As embedded devices are increasingly targeted by attackers, it is critical to establish a means of monitoring their behavior at runtime and publish alerts whenever the a device deviates from its normal function. Red Balloon Securityโ€™s runtime monitoring capabilities complement our Symbiote technology and can help you maintain the clearestย view of activity below the OS and application layers.

The Advanced Embedded Security Ops (AESOP) analyzes telemetry data continuously gathered from Symbiote payloads. This data provides off-board attestation for the highest level of device integrity assurance.ย AESOP also publishes alerts to the SIEM via Syslog when the code and memory integrity of Symbiote-protected devices is corrupted.

Event Report allows Symbiote payloads to publish alerts directly to a security information and event system (SIEM) via Syslog messaging standard.

PROVIDING REAL-TIME INTELLIGENCE AND VISIBILITY INTO YOUR MOST CRITICAL EMBEDDED DEVICES

As embedded devices are increasingly targeted by attackers, it is critical to establish a means of monitoring their behavior at runtime and publish alerts whenever a device deviates from its normal function. Red Balloon Securityโ€™s runtime monitoring capabilities complement our Symbiote technology and can help you maintain the clearest view of activity below the OS and application layers.

The Advanced Embedded Security Ops (AESOP) analyzes telemetry data continuously gathered from Symbiote payloads. This data provides off-board attestation for the highest level of device integrity assurance. AESOP also publishes alerts to the SIEM via Syslog when the code and memory integrity of Symbiote-protected devices is corrupted.

Event Report allows Symbiote payloads to publish alerts directly to a security information and event system (SIEM) via Syslog messaging standard.

AWARD WINNING
TECHNOLOGY WITH A
STRONG HISTORY

2020

Tibbetts Award

SBIR achievements in US Government

2019

Pwnie Award

Most under-hyped research

2016

Greatest Tech of 2016

Popular Science

AWARD WINNING
TECHNOLOGY WITH A
STRONG HISTORY

2020

Tibbetts Award

SBIR achievements in US Government

2019

Pwnie
Award

Most under-hyped research

2016

Greatest Tech of 2016

Popular Science

AWARD WINNING
TECHNOLOGY WITH A STRONG HISTORY

2020

Tibbetts Award

SBIR achievements in US Government

2019

Pwnie Award

Most under-hyped research

2016

Greatest Tech of 2016

Popular Science

A COMPREHENSIVE SOLUTION THAT DEPLOYS AND INTEGRATES ACROSS ALL TYPES OF OPERATING SYSTEMS

Aesop and Event Report allow you to understand, catalogue and respond intelligently to any type of security event.

Deep level of forensics

Access a detailed analysis and characterization of attempted attacks. All alerts, forensic data and logs are directed to existingย  IDS systems to report on security events.

Independent security
attestation

Offboard attestation of device security will increase resilience in the event of complex, well-staged attacks.

Simple deployment and integration

Integrate security events sent from your devices to existing SIEM systems.

A COMPREHENSIVE SOLUTION THAT DEPLOYS AND INTEGRATES ACROSS ALL TYPES OF OPERATING SYSTEMS

Aesop and Event Report allow you to understand, catalogue and respond intelligently to any type of security event.

Deep level of forensics

Access a detailed analysis and characterization of attempted attacks. All alerts, forensic data and logs are directed to existingย  IDS systems to report on security events.

Independent security attestation

Offboard attestation of device security will increase resilience in the event of complex, well-staged attacks.

Simple deployment and integration

Integrate security events sent from your devices to existing SIEM systems.

Deep level of forensics

Access a detailed analysis and characterization of attempted attacks. All alerts, forensic data and logs are directed to existingย  IDS systems to report on security events.

Independent security attestation

Offboard attestation of device security will increase resilience in the event of complex, well-staged attacks.

Simple deployment and integration

Integrate security events sent from your devices to existing SIEM systems.

TECHNOLOGY THAT IS COMPATIBLE ACROSS YOUR SYSTEMS

Red Balloon Security's products are OS-agnostic:

We support any Operating System โ€” and even systems with no operating system. Existing deployments include but are not limited to: Linux, Android, Windows CE, VxWorks, QNX, Cisco IOS, Nuttx, Nucleus, ThreadX, RTA-OS, LynxOS.

Red Balloon Security's technology is device platform independent:

Existing Instruction Set Architecture (ISA) deployments include: ARM, ARM 64, ARM Thumb Mode, MIPS, PowerPC VLE, x86, x64, AVR, and MSP430. Additional ISAs can be supported.

TECHNOLOGY THAT IS COMPATIBLE ACROSS YOUR SYSTEMS

Red Balloon Security's products are OS-agnostic:

We support any Operating System โ€” and even systems with no operating system. Existing deployments include but are not limited to: Linux, Android, Windows CE, VxWorks, QNX, Cisco IOS, Nuttx, Nucleus, ThreadX, RTA-OS, LynxOS.

Red Balloon Security's technology is device platform independent:

Existing Instruction Set Architecture (ISA) deployments include: ARM, ARM 64, ARM Thumb Mode, MIPS, PowerPC VLE, x86, x64, AVR, and MSP430. Additional ISAs can be supported.

TECHNOLOGY THAT IS COMPATIBLE ACROSS YOUR SYSTEMS

Red Balloon Security's products are OS-agnostic:

We support any Operating System โ€” and even systems with no operating system. Existing deployments include but are not limited to: Linux, Android, Windows CE, VxWorks, QNX, Cisco IOS, Nuttx, Nucleus, ThreadX, RTA-OS, LynxOS.

Red Balloon Security's technology is device platform independent:

Existing Instruction Set Architecture (ISA) deployments include: ARM, ARM 64, ARM Thumb Mode, MIPS, PowerPC, x86, x64, AVR, MSP430, VLE. Additional ISAs can be supported.

THE REST OF THE RBS OFFER: OUR EXPERTS

We are prepared to help you build out and maintain our security solutions โ€” or provide back-up support when installation is straightforward. With over 10 yearsโ€™ experience in the field and a reputation for pioneering research that elevates industry and government standards, we can help you accelerate your security evolution โ€” and gain a powerful market advantage.

THE REST OF THE RBS OFFER: OUR EXPERTS

We are prepared to help you build out and maintain our security solutions โ€” or provide back-up support when installation is straightforward. With over 10 yearsโ€™ experience in the field and a reputation for pioneering research that elevates industry and government standards, we can help you accelerate your security evolution โ€” and gain a powerful market advantage.

THE REST OF THE RBS OFFER: OUR EXPERTS

We are prepared to help you build out and maintain our security solutions โ€” or provide back-up support when installation is straightforward. With over 10 yearsโ€™ experience in the field and a reputation for pioneering research that elevates industry and government standards, we can help you accelerate your security evolution โ€” and gain a powerful market advantage.

DEFEND YOUR EMBEDDED
SYSTEMS

DEFEND YOUR EMBEDDED SYSTEMS

DEFEND YOUR EMBEDDED
SYSTEMS

LEVERAGE OUR EXPERTISE FOR YOUR EMBEDDED SECURITY NEEDS

Contact us now to discover more about Red Balloon Security’s range of solutions and services or to arrange a demonstration.

LEVERAGE OUR EXPERTISE FOR YOUR SECURITY NEEDS

Reach out to learn more about our embedded security offering and to schedule a demo.

LEVERAGE OUR EXPERTISE FOR YOUR SECURITY NEEDS

Reach out to learn more about our embedded security offering and to schedule a demo.

LEVERAGE OUR EXPERTISE FOR YOUR SECURITY NEEDS

Reach out to learn more about our embedded security offering and to schedule a demo.

LEVERAGE OUR EXPERTISE FOR YOUR SECURITY NEEDS

Reach out to learn more about our embedded security offering and to schedule a demo.

;