RUNTIME PROTECTION

SYMBIOTE: DETECT ATTACKS ON YOUR DEVICES AND RESPOND IN REAL TIME

Firmware attacks are on the rise, but many businesses are uncertain about how to monitor its runtime or even gain visibility into this level of their device operation. Red Balloon Security’s core offering can address this disadvantage and ensure your devices are protected from attack — today and through many years of service. 

 

With Symbiote, you can choose to block, reboot or alert your team when an attack is detected. It can deploy to your firmware in minutes, without necessary access to source code as an OS-agnostic, real time and host-based defense.

RUNTIME PROTECTION

SYMBIOTE: DETECT ATTACKS ON YOUR DEVICES AND RESPOND IN REAL TIME

Firmware attacks are on the rise, but many businesses are uncertain about how to monitor its runtime or even gain visibility into this level of their device operation. Red Balloon Security’s core offering can address this disadvantage and ensure your devices are protected from attack — today and through many years of service. 

 

With Symbiote, you can choose to block, reboot or alert your team when an attack is detected. It can deploy to your firmware in minutes, without necessary access to source code as an OS-agnostic, real time and host-based defense.

AN ADVANCED FIRMWARE DEFENSE SOLUTION FOR ALL TYPES OF
EMBEDDED DEVICES

Symbiote is the foundational Red Balloon technology. Created in 2011, it is an OS-agnostic product, which means it is effective for any industry or product category that relies on embedded devices. It is compatible with any ECU, gateway, central processing unit (CPU), firmware or hardware platform or operating system

 

Symbiote Defense keeps embedded devices safe by constantly checking the integrity of the code and memory at the firmware level. In essence, it keeps all authorized software running on the system and prevents exploits that depend on executing unauthorized codes or commands.

symbiote@4x

With Symbiote, you can continuously monitor in real time for any modifications to critical conditions of the device, including corruption of device memory, control-flow, and processes. Symbiote also embeds defensive payloads in device firmware to protect your firmware against attacks.

AN ADVANCED FIRMWARE DEFENSE SOLUTION FOR ALL TYPES OF EMBEDDED DEVICES

Symbiote is the foundational Red Balloon technology. Created in 2011, it is an OS-agnostic product, which means it is effective for any industry or product category that relies on embedded devices. It is compatible with any ECU, gateway, central processing unit (CPU), firmware or hardware platform or operating system.

 

Symbiote Defense keeps embedded devices safe by constantly checking the integrity of the code and memory at the firmware level. In essence, it keeps all authorized software running on the system and prevents exploits that depend on executing unauthorized codes or commands.

With Symbiote, you can continuously monitor in real time for any modifications to critical conditions of the device, including corruption of device memory, control-flow, and processes. Symbiote also embeds defensive payloads in device firmware to protect your firmware against attacks.

AWARD WINNING
TECHNOLOGY WITH A
STRONG HISTORY

2020

Tibbetts Award

SBIR achievements in US Government

2019

Pwnie Award

Most under-hyped research

2016

Greatest Tech of 2016

Popular Science

AWARD WINNING
TECHNOLOGY WITH A
STRONG HISTORY

2020

Tibbetts Award

SBIR achievements in US Government

2019

Pwnie
Award

Most under-hyped research

2016

Greatest Tech of 2016

Popular Science

AWARD WINNING
TECHNOLOGY WITH A STRONG HISTORY

2020

Tibbetts Award

SBIR achievements in US Government

2019

Pwnie Award

Most under-hyped research

2016

Greatest Tech of 2016

Popular Science

WHY CHOOSE SYMBIOTE?

While many modern computing systems are adopting forms of load-time integrity, Symbiote goes a step beyond and offers real-time, continuous integrity attestation.

 

Symbiote does not require modifications to the source code of the device, or additional hardware resources.

 

Symbiote does not affect the functionality, performance or speed of the device it is protecting.

 

Symbiote is currently deployed on devices with HP and the U.S. Department of Homeland Security and used under contract by the U.S. Department of Defense for devices in various industry applications, including electrical grid, telecommunications, aerospace, and COTS products.

protect

Protect and monitor memory & code paths

Monitor code and memory usage to detect attacks, regardless of the vulnerability, for protection against zero days.

compliant

Compliant with existing & future regulations

Embed security technology that supports the resiliency of your device firmware with runtime integrity protection at the host-level, now and into the future.

WHY CHOOSE SYMBIOTE?

While many modern computing systems are adopting forms of load-time integrity, Symbiote goes a step beyond and offers real-time, continuous integrity attestation.

 

Symbiote does not affect the functionality, performance or speed of the device it is protecting.

 

Symbiote is currently deployed on devices with HP and the U.S. Department of Homeland Security and used under contract by the U.S. Department of Defense for devices in various industry applications, including electrical grid, telecommunications, aerospace, and COTS products.

 

Protect and monitor memory & code paths

Monitor code and memory usage to detect attacks, regardless of the vulnerability, for protection against zero days.

Complaint with existing & future regulations

Embed security technology that supports the resiliency of your device firmware with runtime integrity protection at the host-level, now and into the future.

Protect and monitor memory & code paths

Monitor code and memory usage to detect attacks, regardless of the vulnerability, for protection against zero days.

Compliant with existing & future regulations

Embed security technology that supports the resiliency of your device firmware with runtime integrity protection at the host-level, now and into the future.

TECHNOLOGY THAT IS COMPATIBLE ACROSS YOUR SYSTEMS

Red Balloon Security's products are OS-agnostic:

We support any Operating System — and even systems with no operating system. Existing deployments include but are not limited to: Linux, Android, Windows CE, VxWorks, QNX, Cisco IOS, Nuttx, Nucleus, ThreadX, RTA-OS, LynxOS.

Red Balloon Security's technology is device platform independent:

Existing Instruction Set Architecture (ISA) deployments include: ARM, ARM 64, ARM Thumb Mode, MIPS, PowerPC VLE, x86, x64, AVR, and MSP430. Additional ISAs can be supported.

TECHNOLOGY THAT IS COMPATIBLE ACROSS YOUR SYSTEMS

Red Balloon Security's products are OS-agnostic:

We support any Operating System — and even systems with no operating system. Existing deployments include but are not limited to: Linux, Android, Windows CE, VxWorks, QNX, Cisco IOS, Nuttx, Nucleus, ThreadX, RTA-OS, LynxOS.

Red Balloon Security's technology is device platform independent:

Existing Instruction Set Architecture (ISA) deployments include: ARM, ARM 64, ARM Thumb Mode, MIPS, PowerPC VLE, x86, x64, AVR, and MSP430. Additional ISAs can be supported.

TECHNOLOGY THAT IS COMPATIBLE ACROSS YOUR SYSTEMS

Red Balloon Security's products are OS-agnostic:

We support any Operating System — and even systems with no operating system. Existing deployments include but are not limited to: Linux, Android, Windows CE, VxWorks, QNX, Cisco IOS, Nuttx, Nucleus, ThreadX, RTA-OS, LynxOS.

Red Balloon Security's technology is device platform independent:

Existing Instruction Set Architecture (ISA) deployments include: ARM, ARM 64, ARM Thumb Mode, MIPS, PowerPC, x86, x64, AVR, MSP430, VLE. Additional ISAs can be supported.

THE REST OF THE RBS OFFER: OUR EXPERTS

We are prepared to help you build out and maintain our security solutions — or provide back-up support when installation is straightforward. With over 10 years’ experience in the field and a reputation for pioneering research that elevates industry and government standards, we can help you accelerate your security evolution — and gain a powerful market advantage.

THE REST OF THE RBS OFFER: OUR EXPERTS

We are prepared to help you build out and maintain our security solutions — or provide back-up support when installation is straightforward. With over 10 years’ experience in the field and a reputation for pioneering research that elevates industry and government standards, we can help you accelerate your security evolution — and gain a powerful market advantage.

THE REST OF THE RBS OFFER: OUR EXPERTS

We are prepared to help you build out and maintain our security solutions — or provide back-up support when installation is straightforward. With over 10 years’ experience in the field and a reputation for pioneering research that elevates industry and government standards, we can help you accelerate your security evolution — and gain a powerful market advantage.

DEFEND YOUR EMBEDDED
SYSTEMS

DEFEND YOUR EMBEDDED SYSTEMS

DEFEND YOUR EMBEDDED
SYSTEMS

LEVERAGE OUR EXPERTISE FOR YOUR EMBEDDED SECURITY NEEDS

Contact us now to discover more about Red Balloon Security’s range of solutions and services or to arrange a demonstration.

LEVERAGE OUR EXPERTISE FOR YOUR SECURITY NEEDS

Reach out to learn more about our embedded security offering and to schedule a demo.

LEVERAGE OUR EXPERTISE FOR YOUR SECURITY NEEDS

Reach out to learn more about our embedded security offering and to schedule a demo.

LEVERAGE OUR EXPERTISE FOR YOUR SECURITY NEEDS

Reach out to learn more about our embedded security offering and to schedule a demo.

LEVERAGE OUR EXPERTISE FOR YOUR SECURITY NEEDS

Reach out to learn more about our embedded security offering and to schedule a demo.