DEFEND YOUR MOST SENSITIVE SYSTEMS
Since its inception, Red Balloon Security has worked closely with the US Government to develop and enhance its core embedded defense technology, Symbiote, for runtime protection.
DARPA, the DoD, DHS, and other agencies have recognized Symbiote’s runtime protection defense as a key capability for securing the nation’s sensitive government systems and the wider world of privately owned critical infrastructure.
With the Government’s help, Red Balloon Security has developed new embedded defense capabilities, more streamlined approaches to implementing embedded security, and integrations into a dozen devices of interest to the U.S. Government.
Red Balloon Security has also been proud to deploy defensive technologies like Symbiote directly to the U.S. Government’s facilities, where there is a desperate need for proven, high-quality security for embedded systems to secure the nation’s devices.
Red Balloon Security is developing a number of cutting-edge technologies in the field of embedded device security. Here are some notable recent projects.
PUSH THE FRONTIER OF SECURITY
LADS: Leveraging the analog domain for security
Rather than using Ethernet communication to relay AESOP alerts, LADS explores the use of analog transmission of data (through LED lights, EM radiation, or other approaches). This allows for an AESOP that is truly out of band and completely air-gapped.
AMP: Applied micropatching
Using our FRAK capability, we are developing a system to implement security patches into legacy embedded devices. FRAK also maintains a high degree of assurance that device’s functionality will not be impacted.
Red Balloon Security contributed several well-received challenges to the 2020 DEFCON Hack-A-Sat challenge presented by the USAF.
SECURITY FOR GOVERNMENT OPERATIONS
BUILD INTO YOUR EXISTING ECOSYSTEM
FOR END USERS
Embedded device security can be added directly to end devices bringing enhanced security to non-standard or out of support devices.
Embedded device security can be added to any operating system or hardware protecting the device from the boot loader to the application including third-party libraries.
Enhance security without decreasing performance.
Open a path to detailed forensics.
Increase the time window for patches.
Automatically harden the devices.