Security must remain effective throughout a product’s entire lifetime

June 28, 2018 Rich Nass

Security, security, security. My in-box is filled with releases, updates, and new info about the latest in security for embedded systems. Is this information critical to our new designs, and our future in general? You bet it is, and it’s far more significant if you’re designing for an industrial or mission-critical application.

Where it’s most critical is in the development of a system that’s going to be out on the Internet. That opens your system to hackers from all angles. And with the advent of the IoT, it’s nearly impossible to track the number of systems, nodes, devices, and so on.

With designers are under intense pressure to get products out the door as quickly as possible, it becomes difficult at best to properly vet the latest security products and protocols. Add to that the complexity of many of today’s designs and you have a recipe for disaster. Note that such a disaster can occur in any point after a product is released to the market, even years later.

The bottom line is you had better take your security precautions seriously.

To that end, Timesys has released a solution that targets device developers using embedded Linux and other open-source software. The goal of this solution is to maintain security throughout the product lifecycle. Called Threat Resistance Security Technology (TRST) protection, it enables developers to reduce the attack surface of their products, harden devices, and maintain security at IoT scale.

The Timesys technology was endorsed by GE Healthcare, which says a lot. According to Roshy Francis, CTO of Diagnostic Cardiology, “We chose to partner with Timesys in the development of our new portfolio of medical devices to ensure that they stay secure throughout their lifecycle. Our customers globally face strict information security requirements combined with a heightened threat environment when deploying these devices within their enterprise. Our secure design methodology, partnership with Timesys, and operational policies allow our customers to be confident in choosing and deploying these devices in their healthcare practice.”

Timesys claims that its technology instills CIA, aka confidentiality, integrity, and availability, which are the hallmarks of the best security best practices across the end-to-end product lifecycle. That involves the “cradle to grave” timeline.

TRST eliminates the need for device developers to sift through thousands of Common Vulnerabilities and Exposures (CVE) notifications every year, to determine which ones apply to their devices in production and require patching to mitigate.

Security: don’t leave home without it.

About the Author

Rich Nass

Richard Nass is the Executive Vice-President of OpenSystems Media. His key responsibilities include setting the direction for all aspects of OpenSystems Media’s Embedded and IoT product portfolios, including web sites, e-newsletters, print and digital magazines, and various other digital and print activities. He was instrumental in developing the company's on-line educational portal, Embedded University. Previously, Nass was the Brand Director for UBM’s award-winning Design News property. Prior to that, he led the content team for UBM Canon’s Medical Devices Group, as well all custom properties and events in the U.S., Europe, and Asia. Nass has been in the engineering OEM industry for more than 25 years. In prior stints, he led the Content Team at EE Times, handling the Embedded and Custom groups and the TechOnline DesignLine network of design engineering web sites. Nass holds a BSEE degree from the New Jersey Institute of Technology.

Follow on Twitter Follow on Linkedin Visit Website More Content by Rich Nass
Previous Article
Moxa’s IIoT Edge-Ready Gateways Integrate Microsoft Azure IoT Edge

Developers of industrial systems will benefit from an easy cloud integration.

Next Article
Smart sensor nodes cut costs in ubiquitous IoT data capture

The cost of IoT sensors is falling. So, too, is the overall cost of IoT sensor nodes.