Red Balloon Security Symbiote
0.00

Problems that solves

Shortage of inhouse software developers

Shortage of inhouse IT resources

Shortage of inhouse IT engineers

High costs of IT personnel

Values

Reduce Costs

Ensure Security and Business Continuity

Red Balloon Security Symbiote

The First Universal Embedded Defense for all embedded devices

Description

Symbiote is a platform-independent, OS-agnostic, real-time, host-based intrusion defense that works by layering specific defense modules and diverting unused CPU cycles for defense. Symbiote is designed to protect any and all embedded devices, from printers to PLCs. It can be applied to any device regardless of OS, CPU type, or hardware. Borrowing from strategies seen in nature, like defense through diversification and defensive mutualism, Symbiote Defense keeps embedded systems safe against a wide variety of attacks. It defends devices without requiring any code change from the vendor, any additional or upgraded hardware, and all without impacting the functionality of the device. Red Balloon Symbiote Defense is interlaced into the binary code and data of the host it protects. It is injected into the firmware in a randomized fashion. Once injected, it operates alongside the host program during runtime and continuously ensures that the code and data of the host device is untampered and never modified without permission. Symbiote Defense starts protecting the host the instant the host turns on, and will detect any unauthorized attempts to modify the firmware’s code or data within a fraction of a second, regardless of whether the device is in sleep mode, or busy servicing requests.