The main threats are linked to confidentiality, integrity and availability.
Kontron answers digital security requirements with hardware enforced root of trust (secure elements), and software only
techniques such as Secure Boot.
Highly sensitive Embedded Applications can benefit from secure elements available on COTS CPU Boards to build a robust digital security solution. Distributing a secret in different circuits significantly lowers the risk of a successful attack, reduces the impact of the discovery of vulnerability and streamlines the security rules associated with the provisioning of the keys.
Discover how standard hardware security mechanisms on COTS CPU boards can be leveraged to build a distributed security scheme with critical keys stored in distinct secure elements.
Read the application noteEssential elements for a lightweight, user-configurable, continuous system monitoring
A CBIT service example reporting alerts in the system journal and maintaining health information in memory objects. This information is periodically written to a XML file.
Visit the CBIT dashboards of live systems and explore their health sensor views
For a guided demo, please contact us through the form Request Live Presentation
Streamlining development to deployment
Accelerating development with pre-integrated systems that meet expanding defense system needs. As a pre-validated solution, COBALT provides a modular building block solution that offers established system profiles
View ProductsVPX-based rugged mission computer for data processing, video, graphics and AI
View ProductCOBALT mission computers selected by Safran Electronics & Defense for the Patroller Unmanned Aerial Vehicle (UAV)
Cobalt 901-based HM200 Satellite Modem delivered to Hughes Network Systems
VX6090 successfully integrated and tested by Thales in a radar application
Herrick Technologies Labs is integrating Kontron’s new I/O Intensive VX305C-40G SBC