Icon Labs Announces The Internet of Secure Things™ Initiative

Protecting the Perimeter is Not Enough – Devices, sensors and appliances inside the perimeter need to be secured; Devices using Real Time Operating Systems (RTOS) need to be protected; New Internet of Secure Things White Paper
By: Icon Labs
 
 
The Internet of Secure Things -  Sensors, Devices and Appliances need protection
The Internet of Secure Things - Sensors, Devices and Appliances need protection
WEST DES MOINES, Iowa - Nov. 6, 2014 - PRLog -- Internet of Secure Things™

Devices Using RTOS Need to Be Protected

Protecting the Perimeter is Not Enough – Devices need to be Secured

New Icon Labs Internet of Secure Things White Paper

November 6, 2014 – West Des Moines, IA –

Icon Labs (www.iconlabs (http://www.iconlabs.com).com), a leading provider of embedded networking and security technology, today announced its Internet of Secure Things Initiative. (http://www.iconlabs.com/sites/default/files/Internet%20of%20Secure%20Things.pdf)

The Internet of Things has become a ubiquitous term to describe the tens of billions of devices that have sensing or actuation capabilities, and are connected to each other via the Internet. Until recently, security has not been a high priority for these devices.  It is now time to establish The Internet of Secure Things.

There has been a lot of discussion regarding the hacking of devices and systems to obtain information and data. However, just as critical are cyber-attacks against the devices themselves – attacks that take control and cause devices to operate in dangerous and insecure ways.

Unfortunately many of these systems – thought to be safe – are still vulnerable. For instance, even though Industrial Automation and Critical Infrastructure devices are usually installed inside the secure perimeter of an enterprise network, that perimeter is porous and can be easily penetrated or disabled. On top of that, insider threats, whether malicious or accidental, make up 70% of the attacks, and they usually originate inside that perimeter.

“Many of today’s modern embedded devices and systems are complex connected devices charged with performing critical functions,” says Alan Grau, CEO of Icon Labs.  “Including security in these devices is a critical design task.  Security features must be considered early in the design process to ensure the device is protected from the advanced cyber-threats they will be facing now as well as attacks that will be created in the future.  These are the steps to make your things fit into the Internet of Secure Things.”

In a recently published report by Gartner, they said that “Digital security leaders should collaborate with software and system developers to ensure security is intrinsic in architecture and approach. They must also incorporate the management and operational requirements for the embedded software and system security design, including security policy enforcement, access control policies, virtualization techniques, application security testing, quality assurance and areas for development.”  These capabilities provide the foundational requirements for the Internet of Secure Things.

The required security capabilities for the Internet of Secure Things initiative, described in Icon Labs’ new White Paper – “The Internet of Secure Things – What is Really Needed to Secure the Internet of Things?”, can be downloaded for free at http://www.iconlabs.com/sites/default/files/Internet%20of%20Secure%20Things.pdf.

Icon Labs delivers a full suite of security solutions to secure embedded and IoT devices and enabled Internet of Secure Things Initiative.  The Floodgate product family (http://www.iconlabs.com/products/floodgate-products) provides a security framework that is designed specifically for use in embedded and RTOS-based devices. Floodgate products support management system integration for policy management, event reporting and situational awareness. Icon Labs also provides solutions to harden the device, secure communication channels, and block DoS attacks. In addition to embedded security software and hardware solutions, Icon Labs provides professional services capabilities to accelerate customer deployments and facilitate unique implementation. Icon Labs helps you secure YOUR things.

About Icon Laboratories, Inc.

Icon Labs, a 2014 Gartner “Cool Vendor”, is a leading provider of embedded software for device security, device protection and networking management, including the award winning Floodgate Defender. Founded in 1992, Icon Labs is headquartered in West Des Moines, Iowa. For more information, visit www.iconlabs.com, send email to info@iconlabs.com, or call 1.888.235.3443 (U.S. and Canada) or 515.226.3443 (International).

Contact:

Icon Labs:

Mark Shapiro

Tel: 619-249-7742

Email: mshapiro@srs-techpr.com

Contact
Mark Shapiro
***@srs-techpr.com
End
Source:Icon Labs
Email:***@srs-techpr.com Email Verified
Tags:Secure Internet, RTOS security, Cyber Defense Software, Cyber Defense Technology, Icon Labs
Industry:Security, Technology
Location:West Des Moines - Iowa - United States
Subject:Projects
Account Email Address Verified     Account Phone Number Verified     Disclaimer     Report Abuse
SRS Tech Media Relations News
Trending
Most Viewed
Daily News



Like PRLog?
9K2K1K
Click to Share