What's New in Kevlar Embedded Security: A Live Demo + Q&A
Jun
20
1:00 PM13:00

What's New in Kevlar Embedded Security: A Live Demo + Q&A

Join us for a live demo and Q&A! We'll show the new features in Kevlar Embedded Security, the ease of implementation, and answer your questions.

Kevlar Embedded Security's new capabilities are designed to defeat efforts to access or capture critical data on Linux-based embedded systems at-rest and at runtime. These compliment the existing capabilities to provide cyber resilience for embedded systems through several mechanisms that build security into the design from the start.

New Capabilities include:

  1. Full Disk Encryption for Data Protection At-Rest

  2. Boot-time Full Disk Integrity Verification

  3. Containerization Isolation to Protect Applications at Runtime

 

Register today!

View Event →
Built-in vs Bolt-on Security: Why the Current Approach to Embedded Security Just Doesn't Cut it
Mar
26
1:00 PM13:00

Built-in vs Bolt-on Security: Why the Current Approach to Embedded Security Just Doesn't Cut it

Bolt-on Security, the concept that security is implemented later in the development lifecycle, has proven itself insufficient against attacks. Stuxnet, Verkada, and perhaps the lesser known 2015 Jeep hack, to name a few, have demonstrated that methodologies from enterprise security simply are not sufficient for embedded systems. Vulnerability scanning, observability, CVE patching, and other methods while important, just are not enough.

We need a new approach to securing embedded systems.

Queue Built-in Security, a modern approach promoting the implementation of secure methodologies as early in the device lifecycle as possible.

In this webinar, Matthew Fahrenkrug will discuss why you should move to a built-in security approach and outline 5 practical tips for both the practitioner and program leaders to help you get there:

  1. Update Your Threat Model

  2. Start Early

  3. Look at the Host Device

  4. You Don’t Have to be the Expert

View Event →
Secure Virtualization in A&D Applications
Feb
29
3:00 PM15:00

Secure Virtualization in A&D Applications

The use of virtualization in industrial and defense systems in the United States A&D applications has been on the rise for years. The benefits of new technologies are almost always offset by the introduction of new attack surfaces, and hypervisor-based virtualization is no exception. With new attack surfaces comes the need for new and innovative security solutions.

In this webinar, technology protection expert David Esler will discuss the unique threat landscape posed to virtualized systems. He will also discuss the unique solution set brought by Star Lab's latest release, Titanium for KVM. This security solution enables customers to deploy systems that simultaneously abide by U.S. government security guidelines and meet strict performance requirements.

About Titanium for KVM
Developed in response to the growing use of virtualization in U.S. defense and industrial systems, including increasing adoption of the KVM hypervisor in Red Hat Enterprise Linux (RHEL) systems, Titanium for KVM extends Titanium Technology Protection capabilities to provide safety and security for this critical component in the system stack.

View Event →