Symbiote DefenseRed Balloon Security,
|
||||||
Related Products
|
||||||
About
We support our key account clients in their digital transformation strategies, R&D and innovation strategies. We have offices on five continents and provide our skills and solutions across the world. The new methodologies and technologies allow actors to quickly benefit from a successful digital transformation of the work environment, providing everyone with interactive, collaborative and participative tools ensuring quick and easy information search and sharing. Critical systems, such as embedded systems, are becoming increasingly complex, connected and efficient. They are equipped with advanced technologies such as AI or edge computing to elaborate their own diagnosis. The necessary know-how to develop and master all these embedded hardware and software systems, as well as remote middleware and communication means, is now available.
|
About
Symbiote is a platform-independent, OS-agnostic, real-time, host-based intrusion defense that works by layering specific defense modules and diverting unused CPU cycles for defense. Symbiote is designed to protect any and all embedded devices, from printers to PLCs. It can be applied to any device regardless of OS, CPU type, or hardware. Borrowing from strategies seen in nature, like defense through diversification and defensive mutualism, Symbiote Defense keeps embedded systems safe against a wide variety of attacks. It defends devices without requiring any code change from the vendor, any additional or upgraded hardware, and all without impacting the functionality of the device. Red Balloon Symbiote Defense is interlaced into the binary code and data of the host it protects. It is injected into the firmware in a randomized fashion.
|
|||||
Platforms Supported
Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook
|
Platforms Supported
Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook
|
|||||
Audience
Medium-sized to enterprise organizations looking for an IoT Security solution
|
Audience
IT teams that want to keep embedded systems safe against a wide variety of attacks
|
|||||
Support
Phone Support
24/7 Live Support
Online
|
Support
Phone Support
24/7 Live Support
Online
|
|||||
API
Offers API
|
API
Offers API
|
|||||
Screenshots and Videos |
Screenshots and Videos |
|||||
Pricing
No information available.
Free Version
Free Trial
|
Pricing
No information available.
Free Version
Free Trial
|
|||||
Reviews/
|
Reviews/
|
|||||
Training
Documentation
Webinars
Live Online
In Person
|
Training
Documentation
Webinars
Live Online
In Person
|
|||||
Company InformationAstek
Founded: 1988
France
astekgroup.fr/
|
Company InformationRed Balloon Security,
Founded: 2011
United States
www.redballoonsecurity.com/index.html
|
|||||
Alternatives |
Alternatives |
|||||
|
|
||||||
|
|
|
|||||
|
|
||||||
|
|
|
|||||
Categories |
Categories |
|||||
IoT Features
Application Development
Big Data Analytics
Configuration Management
Connectivity Management
Data Collection
Data Management
Device Management
Performance Management
Prototyping
Visualization
|
||||||
Integrations
EURODECISION
|
||||||
|
|
|