top of page

DEFEND YOUR MOST SENSITIVE SYSTEMS

Since its inception, Red Balloon Security has worked closely with the US Government to develop and enhance its core embedded defense technology, Symbiote, for runtime protection.

DARPA, the DoD, DHS, and other agencies have recognized Symbiote’s runtime protection defense as a key capability for securing the nation’s sensitive government systems and the wider world of privately owned critical infrastructure. 

 

With the Government’s help, Red Balloon Security has developed new embedded defense capabilities, more streamlined approaches to implementing embedded security, and integrations into a dozen devices of interest to the U.S. Government.

Red Balloon Security has also been proud to deploy defensive technologies like Symbiote directly to the U.S. Government’s facilities, where there is a desperate need for proven, high-quality security for embedded systems to secure the nation’s devices.

RUNTIME PROTECTION

Red Balloon Security is developing a number of cutting-edge technologies in the field of embedded device security. Here are some notable recent projects.

PUSH THE FRONTIER OF SECURITY

LADS: Leveraging the analog domain for security

Rather than using Ethernet communication to relay AESOP alerts, LADS explores the use of analog transmission of data (through LED lights, EM radiation, or other approaches). This allows for an AESOP that is truly out of band and completely air-gapped.

AMP: Applied micropatching

Using our FRAK capability, we are developing a system to implement security patches into legacy embedded devices. FRAK also maintains a high degree of assurance that device’s functionality will not be impacted.

Hack-a-sat

​Red Balloon Security contributed several well-received challenges to the 2020 DEFCON Hack-A-Sat challenge presented by the USAF.

SECURITY FOR GOVERNMENT OPERATIONS

BUILD INTO YOUR EXISTING ECOSYSTEM

FOR END USERS

Embedded device security can be added directly to end devices bringing enhanced security to non-standard or out of support devices.

FOR MANUFACTURERS

Embedded device security can be added to any operating system or hardware protecting the device from the boot loader to the application including third-party libraries.

 

  • Enhance security without decreasing performance.

  • Open a path to detailed forensics.

  • Increase the time window for patches.

  • Automatically harden the devices.

PROTECT YOUR ORGANIZATION AGAINST EXPLOITATION

bottom of page