19" rackable computers (Air- and Conduction-cooled), CPU boards for:
The main threats are linked to confidentiality, integrity and availability.
Kontron answers digital security requirements with hardware enforced root of trust (secure elements), and software only techniques such as Secure Boot.
Highly sensitive Embedded Applications can beneﬁt from secure elements available on COTS CPU Boards to build a robust digital security solution. Distributing a secret in different circuits significantly lowers the risk of a successful attack, reduces the impact of the discovery of vulnerability and streamlines the security rules associated with the provisioning of the keys.
Discover how standard hardware security mechanisms on COTS CPU boards can be leveraged to build a distributed security scheme with critical keys stored in distinct secure elements.Read the application note
Essential elements for a lightweight, user-configurable, continuous system monitoring
A CBIT service example reporting alerts in the system journal and maintaining health information in memory objects. This information is periodically written to a XML file.
Visit the CBIT dashboards of live systems and explore their health sensor views
For a guided demo, please contact us through the form Request Live Presentation
Streamlining development to deployment
COBALT mission computers selected by Safran Electronics & Defense for the Patroller Unmanned Aerial Vehicle (UAV)
Cobalt 901-based HM200 Satellite Modem delivered to Hughes Network Systems
VX6090 successfully integrated and tested by Thales in a radar application
Herrick Technologies Labs is integrating Kontron’s new I/O Intensive VX305C-40G SBC
Control and Monitoring for Mission Computers: Embedded Computers take care of our world. So computers must first take care of themselves.