Professional Services Security Review for VxWorks 7 Datasheet

Are you planning to use or are you currently building an embedded device using VxWorks® 7?

Have you identified all of the security requirements for your device to protect your proprietary intellectual property and data against reverse engineering and theft?

Are you relying on the myth of air gap security to protect your device against network-based attacks, or are you unsure how to implement secure communications with your device and protect it against evolving security threats?

Work with the experts to ensure that security best practices are delivered in your project.

The VxWorks 7 SR0600 release now provides security capabilities that were previously only available to customers using the VxWorks Plus platform and Security Profile for VxWorks. These join a best-of-breed set of software-based security features that enable you to deliver cutting-edge, rock-solid security in your devices. This software solution includes:

  • Secure Boot, which verifies during boot-up that binary images have not been tampered with or corrupted
  • Secure Runtime Loader, which effectively protects the integrity of the system and safeguards your intellectual property from piracy and code from reverse engineering • Full disk encryption, using AES, enabling secure data at rest
  • Encrypted container support, using TrueCrypt-compatible AES-encrypted file containers, which safeguards data when the device is powered down
  • Advanced user management, enabling protection from unauthorized access and enabling the definition and enforcement of user-based policies and permissions
  • Enhanced network security through VxWorks 7 incorporation of the latest version of Wind River® SSL as well as Wind River SSH; Wind River cryptography libraries; and Wind River IPsec and IKE, the Wind River implementation of Internet Protocol Security and Internet Key Exchange, all to effectively secure network communications
  • Time partitioning, to provide resilience against denial-of-service (DOS) network attacks
  • Security events handler, which enables you to record and monitor conditions that could identify a potential security risk
Testing Against Cyber-Attacks with Simulation Technology
Testing Against Cyber-Attacks with Simulation Technology

Cyber-security is often a story of the “weak link.” The following two recent cyber-security events involvin...

Securing the Edge with StarlingX
Securing the Edge with StarlingX

Security on the edge is crucial. Learn more about how the StarlingX 2.0 release helps addressing this chall...

How can Wind River help you optimize the security of your systems and devices?