Welcome!

Cloud Security Authors: Pat Romanski, Elizabeth White, Zakia Bouachraoui, Yeshim Deniz, Liz McMillan

Related Topics: Cloud Security

News Feed Item

General Software Announces Boot Security Firmware Application to Deliver Trust for Embedded x86 Devices

General Software Announces Boot Security Firmware Application to Deliver Trust for Embedded x86 Devices

SAN FRANCISCO, CA -- (MARKET WIRE) -- 03/01/05 -- Intel Developer Forum -- General Software, Inc., the leading supplier of embedded x86 firmware solutions, today introduced at the Spring Intel Developer Forum a new firmware application for increasing security and trust in embedded x86 devices. As the second member of a new Firmware Application Suite(TM) specifically developed to enhance embedded x86 systems, the Boot Security application provides an ideal way of ensuring the integrity of deployed products ranging from set-top boxes, teller machines, voting machines, gaming machines, information appliances, industrial controllers and telecommunications equipment.

"Maintaining integrity of embedded devices is becoming increasingly important as more critical functions are being handled by these systems. The Boot Security Application from General Software is a unique firmware application that establishes trust between platform hardware and the user application, preventing operation of systems compromised by unauthorized alteration of the BIOS, OS, or application," said Steve Dearden, General Software's vice president of sales and marketing. "Our customers can now develop products that have built in safeguards against product tampering; using cryptographic verification techniques before, during, and after the OS and application have booted, they can be confident that both hardware and critical software components have not been compromised. Our firmware solution goes far beyond today's simple middleware or software security applications."

Boot Security is a firmware application written utilizing Firmbase® Technology that runs cryptographic checks on software components prior to boot, and performs additional, optionally bi-directional, cryptographic handshaking with the application once the system has booted. When these checks fail, Boot Security can be directed by a policy established by the ODM/OEM in the system registry to generate alerts over the network, run or terminate an OEM application, or log the events to mass storage. It can also trigger an automatic reload of trusted software. Standard Firmbase Technology TCB user-level security is provided on administrative remote access Common applications include tamper-proof BIOS, OS, and user application/data on ODM/OEM hardware; and eliminating the possibility that the user application might be run successfully on non-authorized hardware.

About Embedded BIOS® 2000

Embedded BIOS 2000 is the leading BIOS SDK for embedded x86 designs, with over 800 OEM-customizable configuration parameters, support for multiple embedded operating systems, and support for major OS and hardware initiatives. Embedded BIOS 2000 addresses the entire lifecycle of embedded products, from board bring-up, configuration prototyping, testing with system diagnostics, and product manufacturing to in-field diagnostics and software reload. Features include an integrated debugger; console redirection; highly configurable POST; manufacturing mode; ROM, RAM, and Flash file systems; support for a host of industry initiatives; and much more. Embedded BIOS 2000 supports industry-standard operating systems that run on PC-compatible hardware, including the full spectrum of Windows, Linux, and real-time operating systems.

About Firmbase® Technology

Firmbase Technology is General Software's patented 32-bit firmware infrastructure that contributes the surety and trust expected from firmware applications. A non-stop SMM envelope is provided which keeps firmware applications running, even when the OS and user application have failed or are missing. Firmbase Technology is ROM-resident and provides a chain of trust from power-on to OS boot. It supplies the user-level security for the BIOS and for firmware applications which do not run under OS control.

About General Software, Inc.

General Software, Inc. provides superior embedded x86 firmware solutions and world-class support for OEM manufacturers of telecommunications, data communications, consumer electronics, dedicated servers, and other specialized computing devices. General Software's well-architected and reliable firmware products reduce risk, speed development, and address embedded OEM product lifecycle needs. For more information about General Software and its embedded firmware, visit http://www.gensw.com, e-mail [email protected], or contact David Tobar at 800-850-5755 or 425-576-8300.

CONTACT:
Kate Johnsen
General Software, Inc.
425.576.8300 x229
[email protected]

More Stories By Marketwired .

Copyright © 2009 Marketwired. All rights reserved. All the news releases provided by Marketwired are copyrighted. Any forms of copying other than an individual user's personal reference without express written permission is prohibited. Further distribution of these materials is strictly forbidden, including but not limited to, posting, emailing, faxing, archiving in a public database, redistributing via a computer network or in a printed form.

IoT & Smart Cities Stories
The graph represents a network of 1,329 Twitter users whose recent tweets contained "#DevOps", or who were replied to or mentioned in those tweets, taken from a data set limited to a maximum of 18,000 tweets. The network was obtained from Twitter on Thursday, 10 January 2019 at 23:50 UTC. The tweets in the network were tweeted over the 7-hour, 6-minute period from Thursday, 10 January 2019 at 16:29 UTC to Thursday, 10 January 2019 at 23:36 UTC. Additional tweets that were mentioned in this...
Over the course of two days, in addition to insightful conversations and presentations delving into the industry's current pressing challenges, there was considerable buzz about digital transformation and how it is enabling global enterprises to accelerate business growth. Blockchain has been a term that people hear but don't quite understand. The most common myths about blockchain include the assumption that it is private, or that there is only one blockchain, and the idea that blockchain is...
Atmosera delivers modern cloud services that maximize the advantages of cloud-based infrastructures. Offering private, hybrid, and public cloud solutions, Atmosera works closely with customers to engineer, deploy, and operate cloud architectures with advanced services that deliver strategic business outcomes. Atmosera's expertise simplifies the process of cloud transformation and our 20+ years of experience managing complex IT environments provides our customers with the confidence and trust tha...
At CloudEXPO Silicon Valley, June 24-26, 2019, Digital Transformation (DX) is a major focus with expanded DevOpsSUMMIT and FinTechEXPO programs within the DXWorldEXPO agenda. Successful transformation requires a laser focus on being data-driven and on using all the tools available that enable transformation if they plan to survive over the long term. A total of 88% of Fortune 500 companies from a generation ago are now out of business. Only 12% still survive. Similar percentages are found throug...
Never mind that we might not know what the future holds for cryptocurrencies and how much values will fluctuate or even how the process of mining a coin could cost as much as the value of the coin itself - cryptocurrency mining is a hot industry and shows no signs of slowing down. However, energy consumption to mine cryptocurrency is one of the biggest issues facing this industry. Burning huge amounts of electricity isn't incidental to cryptocurrency, it's basically embedded in the core of "mini...
In his general session at 19th Cloud Expo, Manish Dixit, VP of Product and Engineering at Dice, discussed how Dice leverages data insights and tools to help both tech professionals and recruiters better understand how skills relate to each other and which skills are in high demand using interactive visualizations and salary indicator tools to maximize earning potential. Manish Dixit is VP of Product and Engineering at Dice. As the leader of the Product, Engineering and Data Sciences team at D...
The term "digital transformation" (DX) is being used by everyone for just about any company initiative that involves technology, the web, ecommerce, software, or even customer experience. While the term has certainly turned into a buzzword with a lot of hype, the transition to a more connected, digital world is real and comes with real challenges. In his opening keynote, Four Essentials To Become DX Hero Status Now, Jonathan Hoppe, Co-Founder and CTO of Total Uptime Technologies, shared that ...
At CloudEXPO Silicon Valley, June 24-26, 2019, Digital Transformation (DX) is a major focus with expanded DevOpsSUMMIT and FinTechEXPO programs within the DXWorldEXPO agenda. Successful transformation requires a laser focus on being data-driven and on using all the tools available that enable transformation if they plan to survive over the long term. A total of 88% of Fortune 500 companies from a generation ago are now out of business. Only 12% still survive. Similar percentages are found throug...
Every organization is facing their own Digital Transformation as they attempt to stay ahead of the competition, or worse, just keep up. Each new opportunity, whether embracing machine learning, IoT, or a cloud migration, seems to bring new development, deployment, and management models. The results are more diverse and federated computing models than any time in our history.
At CloudEXPO Silicon Valley, June 24-26, 2019, Digital Transformation (DX) is a major focus with expanded DevOpsSUMMIT and FinTechEXPO programs within the DXWorldEXPO agenda. Successful transformation requires a laser focus on being data-driven and on using all the tools available that enable transformation if they plan to survive over the long term. A total of 88% of Fortune 500 companies from a generation ago are now out of business. Only 12% still survive. Similar percentages are found throug...