Analysis
Green Hills Software and SafeNet, Inc. Announce Security Technology Collaboration Agreement
Green Hills Software and SafeNet, Inc. have announced a new alliance focused on the creation of trusted platform solutions for the embedded and mobile markets. The integrations include the support and integration of SafeNet portable smart card-based devices with Green Hills Software’s INTEGRITY Multivisor™ technology, and the use of SafeNet Hardware Security Modules (HSMs) with Green Hills Software’s managed security services offerings. The integrations enable secure communications, data protection, and authentication on embedded and mobile devices, such as smartphones.
ThisThe integration of SafeNet’s and Green Hills Software’s solutions provides a flexible and powerful technology solution for some of the world’s most challenging security problems such as Bring Your Own Device: a consumer handheld that can be used in the enterprise, guaranteeing both enterprise data protection as well as consumer privacy. In contrast, other handheld security mechanisms run on top of the mobile OS at application-level and hence are inherently insecure.
“Green Hills Software’s secure operating system and Multivisor technologies are being integrated with SafeNet’s encryption technologies to provide a compelling offering to protect mobile government communications,” said Kirk Spring, vice president of technology, SafeNet, Inc. “This collaboration will ensure that the government can meet its future missions in ever changing environments with flexibility, and without sacrificing the security of its confidential and high value information.”
“SafeNet’s cryptographic solutions provide physical security protections that are not otherwise possible in most commercial, off-the-shelf embedded and mobile systems, which are currently exposed to sophisticated attackers who move beyond the software attack surface,” commented David Kleidermacher, CTO, Green Hills Software. “The combination of our security kernel and SafeNet’s hardware protections show the world that absolute security is not only possible on off-the-shelf devices but can be deployed at the speed of consumer hardware churn and without increasing user cost.”