OUR CLIENTS

  • 3Com
  • ACT/Technico
  • Adaptec
  • ADC
  • AirForce Research Labs
  • Airvana
  • Alcatel-Lucent
  • Avanex
  • Bell Mobility
  • Bravida Corporation
  • Broadcom
  • ByteMobile
  • CAW Networks
  • Chicago Stock Exchange
  • Cingular Wireless
  • Cisco
  • Coradiant
  • Cresendo Networks
  • Dot Hill Systems
  • Ennovate Networks
  • Equal Logic
  • Ericsson
  • Flextronics Software Systems
  • Force Computers
  • General Dynamics
  • Intel
  • Innovative Concepts
  • Iowa Communications Networks
  • IP Unity
  • Kazeon
  • Library of Congress
  • LightSand Communication
  • Lockheed Martin
  • Mangrove Systems
  • Maytag
  • McData
  • McGraw-Hill
  • Microware
  • Overture Networks
  • PacketFront
  • Ricoh
  • Scopus Network Technologies
  • Seranoa Networks
  • Siemens
  • Symbol Technologies
  • Talari Networks
  • Tellabs
  • Tipping Point Technologies
  • Turin Networks
  • UTStarCom
  • Vanguard
  • Vivace Networks
  • Westell
  • WindRiver
  • ZNYX Corporation

Icon Labs Products Immune to the Heartbleed SSL Bug

Icon Labs Iconfidant SSL is safe from major vulnerability impacting millions of devices.

West Des Moines, Iowa, April 18, 2014 – Icon Labs (www.iconlabs.com), a leading provider of embedded networking and security technology, today announced that its Iconfidant SSL product, a leading SSL solution for embedded devices, is not affected by the Heartbleed SSL bug. Heartbleed is a serious vulnerability in OpenSSL, a popular version of SSL—the technology that security professionals rely on to protect the most critical data exposed on the Internet. Icon Labs Iconfidant SSL is an SSL solution utilized in embedded devices that power many of the systems we use in our everyday lives.

“Heartbleed is a serious vulnerability in OpenSSL. While this vulnerability exposes millions of devices to serious security concerns, we are happy to report that our Iconfidant SSL solution is not affected by Heartbleed,” said Alan Grau, President of Icon Labs. “Designing security solutions for embedded devices means including multiple layers of protection. The Heartbleed bug highlights the importance of security for all devices connected to the Internet.”

Embedded devices require security solutions designed specifically for them – simply using a desktop security solution in an embedded device is not an answer. Icon Labs provides a full suite of security products and services for device manufacturers.

“The Heartbleed bug points out that undiscovered vulnerabilities can be lurking in places previously assumed to be safe,” commented Steve Hoffenberg, Director of M2M Embedded Software & Tools at VDC Research. “Makers and users of embedded systems are best served by proactively protecting data to the fullest extent possible, and updating the security of those systems throughout their usable lifespans.”


About Icon Laboratories, Inc.
Icon Labs is a leading provider of embedded software for device security, device protection and networking management, including the award winning Floodgate Defender. Founded in 1992, Icon Labs is headquartered in West Des Moines, Iowa. For more information, visit www.iconlabs.com, send email to info@iconlabs.com, or call 1.888.235.3443 (U.S. and Canada) or 515.226.3443 (International).

Contact:
Icon Labs:
Mark Shapiro
Tel: 619-249-7742

Icon Labs Featured as Part of Five From EELive (ECN Magazine, April 2014)

Icon Labs is featured as part of Five from EELive. Read the article here.

Icon Labs now offers a full suite of offerings to protect RTOS based devices

Floodgate products make these devices invisible to hackers and visible to the enterprise management systems which is the opposite of the current situation.

First Embedded Security Solution Designed to Integrate with Enterprise Management Systems and Security Information and Event Management systems. (SIEMs)

EELive, San Jose, CA, April 2, 2014 – Icon Labs (www.iconlabs.com), a leading provider of embedded networking and security technology, today announced a full suite of offerings that provides an umbrella of protection for RTOS based end points. This cross platform Intrusion Detection and Prevention solution runs natively in a wide range of RTOS-based devices found in military, utility, industrial, medical and consumer IoT applications.

“Currently, RTOS based devices are invisible to the enterprise management system, but visible to hackers”, said Alan Grau, CEO of Icon Labs. “Our solution turns that on its head by making these devices visible to the management system and invisible to hackers.”

In addition to protecting from a wide range of cyber-attacks, the SIEM integration provides monitoring and reporting of attacks upon the network to enable managers to help identify and track the source of the attacks.

Intrusion Detection and Prevention is provided through RTOS specific threat detection and advanced packet filtering. This set of solutions provides protection from both internal and external threats whether malicious or accidental. Capabilities include:
• Detection and reporting of authentication failures
• API that enables protection and monitoring of device specific attack vectors
• Static/rules-based filtering of ports, protocols, IP addresses, etc.
• Stateful Packet Inspection that filters packets based on the state of the connection
• Threshold-based filtering which monitors packet flows to block packet floods
• Detection of port scans and probes, which frequently indicate an impending cyber-attack
• Protocol specific deep packet inspection for industry specific application protocols

Enterprise connection is provided through optional extensions to connect and manage RTOS devices from enterprise policy management systems such as the HBSS system utilized by US Dept. of Defense. Both security events and device specific events can be captured and logged for reporting to a variety of corporate SIEM (security information and event management) systems.

For ease in integration and development, Icon Labs provides professional services capabilities to facilitate unique implementation projects and product development. User interface ranging from simple command line interfaces to web-based or corporate policy management systems can be customized to specific engineering design requirements.

About Icon Laboratories, Inc.
Icon Labs is a leading provider of embedded software for device security, device protection and networking management, including the award winning Floodgate Defender. Founded in 1992, Icon Labs is headquartered in West Des Moines, Iowa. For more information, visit www.iconlabs.com, send email to info@iconlabs.com, or call 1.888.235.3443 (U.S. and Canada) or 515.226.3443 (International).

Contact:
Icon Labs:
Mark Shapiro
Tel: 619-249-7742
Email: mshapiro@srs-techpr.com

Interview: Alan Grau On What You Should Know About Industrial Cyber-Attacks (Electronic Design, April 2014)

We are increasingly reliant upon industrial systems, many of which were designed before cyber-attacks against industrial systems were even considered. Our aging industrial control systems and vulnerable to a wide range of attacks and many new systems are being deployed with insufficient security. It is imperative that security for industrial systems be addressed. Read the full article here.

Icon Labs Announces the Availability of the Security Requirements White Paper

Security Requirements for Embedded Devices – What is Really Needed?

Icon Labs Posts new White Paper for Developers of Smart Home, IoT and M2M Devices, Networks and Solutions

West Des Moines, Iowa, March 11, 2014 – Icon Labs (www.iconlabs.com), a leading provider of embedded networking and security technology, today announced that a new white paper is available for those in the industry concerned about cyber-attacks upon industrial networks, smart home systems, automobiles, office systems, utility plants, etc. This new white paper – Security Requirements for Embedded Devices – What is Really Needed? can be downloaded here.

“Many of today’s modern embedded devices and systems are complex connected computers charged with performing critical functions,” explains Alan Grau, President of Icon Labs. “Including security in these devices is a critical design task. Security features must be considered early in the design process to ensure the device is protected from the advanced cyber-threats they will be facing. “

A security solution for embedded devices must ensure the device firmware has not been tampered with, secure the data stored by the device, secure communication and protect the device from cyber-attacks. This can only be achieved by including security in the early stages of design. There is no one one-size fits all security solution for embedded device. Security requirements must take into consideration the cost of a security failure (economic, environmental, social, etc.), the risk of attack, available attack vectors, and the cost of implementing a security solution.

This new whitepaper covers the top seven challenges for embedded security, how to stop the motivated hacker, and the top security requirements for embedded devices.

About Icon Laboratories, Inc.
Icon Labs is a leading provider of embedded software for device security, device protection and networking management, including the award winning Floodgate Defender. Founded in 1992, Icon Labs is headquartered in West Des Moines, Iowa. For more information, visit www.iconlabs.com, send email to info@iconlabs.com, or call 1.888.235.3443 (U.S. and Canada) or 515.226.3443 (International).

Contact:
Icon Labs:
Mark Shapiro
Tel: 619-249-7742
Email: mshapiro@srs-techpr.com