About Lynx Software Technologies

This author has not yet filled in any details.
So far Lynx Software Technologies has created 183 blog entries.
24 Feb, 2016

Lynx unveils secure communications solution for connected car, connected infrastructure, and other safety critical IoT applications

2016-02-24T09:28:20+00:00

New version of LynxSecure adds secure bare-metal networking and advanced cloud-based threat detection capabilities San Jose, CA, Wednesday, 24 February 2016 – Lynx Software Technologies unveiled the LynxSecure 5.3 Separation Kernel Hypervisor at Embedded World, Nuremberg, and announced a powerful new capability that extends the principle of domain separation to the network connection. At the same time, in partnership with Webroot, they revealed real time cloud-based threat detection for guest operating systems hosted by LynxSecure. LynxSecure 5.3 is being demonstrated in the Lynx booth at both the Embedded World Conference in Nuremberg, Germany from February 23rd to 25th (hall 4A, booth 338) and at the RSA Conference in San Francisco, USA from February 29th to March 3rd (south hall, booth 732) Commenting, Robert Day, Vice President, Marketing at Lynx Software Technologies, said, “The success of connected cars, connected infrastructure and other safety-critical IoT applications rests on the resolution of two key security challenges. The first is the robust protection of not only the gateways and endpoints, but also the lines of communication between them, and then from the gateway out over the [...]

24 Feb, 2016

Lynx Software Technologies Offers Lynxsecure Security Platform New IoT Edge Gateways From Dell

2016-02-24T09:17:11+00:00

Demonstration of LynxSecure providing isolation on the Dell Edge Gateway 5000 at two key industry conferences NUREMBERG, GERMANY and SAN FRANCISCO, USA – February 24th & February 29th 2016 Lynx Software Technologies, Inc., a world leader in secure IoT solutions, is offering LynxSecure, its least privilege separation kernel, for the Dell Edge Gateway 5000 Series. LynxSecure provides military-grade isolation of IoT domains on the gateway to protect the Operational Technology (OT) world from the malicious threats that are ever-present in the Information Technology (IT) world. This solution is being demonstrated in the Lynx booth at both the Embedded World Conference in Nuremberg, Germany from February 23rd to 25th (hall 4A, booth 338) and at the RSA Conference in San Francisco, USA from February 29th to March 3rd (south hall, booth 732). This secure solution is also being shown in the Dell Security booth at the RSA conference (south hall, booth 1007). “We believe you must think security first and assess, prepare and implement the right amount of security at the right places to safely deploy your IoT initiatives,” said Jason Shepherd, director [...]

29 Jan, 2016

Core Avionics & Industrial Inc., Curtiss-Wright Defense Solutions, ENSCO Avionics, and Lynx Software Technologies Demonstrate FACE Consortium Avionics Cockpit Application

2016-01-29T10:56:02+00:00

FALLS CHURCH, Va., January 28, 2016 - Core Avionics & Industrial Inc., Curtiss-Wright Defense Solutions, ENSCO Avionics, and Lynx Software Technologies have joined forces to demonstrate the first ever FACE™ aligned cockpit display application at the Army Aviation FACE Technical Interchange Meeting at the Von Braun Civic Center in Huntsville, Ala., Feb. 2. The integrated demonstration stack will leverage key offerings by each of the contributing companies: ENSCO Avionics’ IData® Tool Suite with IDataMap Core Avionics & Industrial Inc.’s safety critical OpenGL® Driver Lynx Software Technologies’ LynxOS-178 real-time operating system Curtiss-Wright Defense Solution’s VPX3-131 3U VPX single board computer Curtiss-Wright Defense Solution’s XMC-715 high performance graphics controller The collaborating companies will provide an in-depth demonstration of the FACE architecture using all of the FACE segments. Two user applications will be contained in the Portable Component Segment that will represent interchangeable software components from different suppliers. These applications when linked into the FACE architecture will communicate with the IData RunTime in the Graphics services section of the Platform Specific Services segment via the Transport Services Segment. The IData RunTime Library application will also be [...]

7 Oct, 2015

Securing the Internet of Things Just Got Easier

2015-10-07T15:08:50+00:00

Traditional network and endpoint protection mechanisms are struggling today to protect our corporate IT infrastructure and computers. Adding the projected billions of nodes that will constitute the Internet of Things exacerbates the problem dramatically. The advantage that the embedded industry has over the traditional computer world, is that the devices are generally being built for a specific purpose, and as part of the design of these systems, security and protection could be a primary consideration. However, adding security of any form to a resource-constrained device that isn’t secure by design is almost impossible. Providers of the traditional embedded software platform, the real-time operating system, are in a prime position to address this need by stepping up and offering the security functionality developers need to protect connected embedded devices and allow them to be designed secure. NSA’s “Protection Profile for Single-level Operating Systems in Environments Requiring Medium Robustness” (SLOSPP), specifies the security requirements for commercial-off-the-shelf (COTS) general-purpose operating systems in networked environments that contain sensitive information. LynuxWorks’ LynxOS 7.0 is among the first to implement these standards, allowing developers to embed military-grade security [...]

2 Oct, 2015

Built-In Security for the Internet of Things

2015-10-02T16:01:55+00:00

With the number of devices being connected to the Internet increasing daily, bringing the vision of the Internet of Things (IoT) or Internet of Everything (IoE) to reality, we hear about securing the IoT with almost the same frequency. The reality is that securing the disparate ‘things’ is going to be a real problem; one certainly can’t use traditional enterprise and network security methods like anti-virus, as the things are not all running the same operating system (if an operating system is used at all), and the likely types of cyber threats will be very targeted to the specific system being attacked, which really nullifies any AV like approaches. Network protection is not any easier, as most of the networks that things are connected to are either proprietary or specific to the particular application (like CANbus for cars, and ProfiBus for industrial - often referred to as Operational Technology (OT) networks), and so traditional TCP/IP approaches are not particularly useful. So, does this mean that the things are vulnerable to cyber attacks? The answer very definitely is yes, but there is a [...]

22 Sep, 2015

Webroot and Lynx Partner to Protect Connected IoT Devices from Targeted Attacks

2015-09-22T12:40:13+00:00Tags: |

BrightCloud® Threat Intelligence and LynxSecure Virtualization Platform Integration Delivers Advanced Threat Detection and Protection in Real Time BROOMFIELD, CO and BOSTON – Sept. 22, 2015 – Webroot, the market leader in intelligent cybersecurity for endpoints and collective threat intelligence, and Lynx Software Technologies, Inc., a world leader in the embedded safety and security software market, today announced a strategic partnership. The companies are combining unique security technologies which enable developers to build advanced threat detection and protection into Internet of Things (IoT) and Industrial Internet of Things (IIoT) devices. The Webroot® IoT Security Toolkit enables IoT and IIoT system integrators and solution designers to integrate real-time threat intelligence services and intelligent cybersecurity device agents to protect critical systems against modern threats. The LynxSecure Hypervisor from Lynx Software Technologies is a secure virtualization solution that is based on separation kernel technology, originally designed to separate and protect military networks at different classification levels. Combining these technologies involves embedding components of the Webroot IoT Security Toolkit inside the LynxSecure Hypervisor secure virtual space. This allows for detection, identification and containment of threats without the [...]