Military Embedded Systems

Protection from Internet threats

Product

August 31, 2014

John M. McHale III

Editorial Director

Military Embedded Systems

Protection from Internet threats

Icon Labs’ Floodgate Defender security software for real-time operating systems (RTOS) delivers protection from Internet-based threats by controlling what packets the embedded device processes and by preventing unwanted packets from being processed. Unlike encryption and authenticati...

Icon Labs’ Floodgate Defender security software for real-time operating systems (RTOS) delivers protection from Internet-based threats by controlling what packets the embedded device processes and by preventing unwanted packets from being processed. Unlike encryption and authentication, which may only protect the device from a hacker trying to connect, the Icon Labs product an prevent the hacker from even attempting to connect. Its filtering engine is capable of blocking denial of service attacks, packet floods, port scans, or other Internet-based threats.

The tool is a complete embedded firewall that provides static (rules-based) filtering, Stateful Packet Inspection (SPI), and threshold-based filtering. Along with McAfee’s ePolicy Orchestrator (ePO) platform, the software creates a security solution for managing and protecting Department of Defense (DoD) operational assets, industrial control, the Internet of Things (IoT), and Smart Grid. The Floodgate products provide a solution to aid in compliance with regulatory guidelines and mandates; gather and report command, device, and event status information for audit requirements; and protect control units and endpoint devices from cyber risks. The solution also achieved “McAfee Compatible” status and along with Icon Labs’ other software products is available through McAfee’s Security Innovation Alliance (SIA).

 

Featured Companies