industry news
Subscribe Now

Icon Labs Releases Security Management System

July 28, 2015 –  West Des Moines, Iowa — Icon Labs (www.iconlabs.com), a leading provider of embedded networking and security technology, today announced the release of its Floodgate Security Manager (FSM ), a security management software suite specifically designed to protect IoT and embedded devices against cyber-attack. FSM can be operated as either an on premise or a cloud-based security manager.

The Floodgate Security Manager provides device status monitoring, security policy management, command audit logging, and security event logging and reporting for devices running Icon Labs’ Floodgate Agent or other lightweight IoT management protocols such as COAP and MQTT.  Floodgate Security Manager provides comprehensive reporting and auditing capabilities to help achieve EDSA Certification, ISA/IEC 62443 Compliance, and/or compliance with the NIST Cybersecurity framework.

“The current approach to security management for IoT devices is to repurpose legacy security management systems.  While this solution works for some IoT gateways and other large IoT devices, it does not scale to the smallest IoT devices, especially small battery powered edge devices and sensor solutions,” says Alan Grau, President and Cofounder of Icon Labs. “Floodgate Security Manager is designed to provide the management services required by all IOT devices, including small, battery powered and mobile devices without the overhead and complexity of traditional enterprise security management systems.”

“With the IoT growing dramatically, it’s only a matter of time before hackers turn more attention toward embedded systems with limited onboard security resources,” said Steve Hoffenberg, a Director at industry analyst firm VDC Research. “New security technologies are needed not only to protect IoT device functionality and data, but also to protect conventional IT and the cloud assets to which the embedded systems are connected.”

Icon Labs products provide embedded security for IoT and Machine to Machine (M2M) solutions such as aerospace, military and space probes, industrial and medical control devices, medical systems, and consumer electronics products. The Floodgate Security Framework provides a “defense in depth” solution that protects control units and endpoint devices from cyber threats, aids in compliance with regulatory mandates and guidelines, and gathers and reports command, event and device status information for audit requirements. 

About Icon Laboratories, Inc.

Icon Labs, a 2014 Gartner “Cool Vendor” and 2015 Gartner “Select Vendor”, is a leading provider of embedded software for device security, device protection and networking management, including the award winning Floodgate Defender. Founded in 1992, Icon Labs is headquartered in West Des Moines, Iowa. For more information, visit www.iconlabs.com, send email to info@iconlabs.com, or call1.888.235.3443 (U.S. and Canada) or 515.226.3443 (International).

Leave a Reply

featured blogs
May 2, 2024
I'm envisioning what one of these pieces would look like on the wall of my office. It would look awesome!...
Apr 30, 2024
Analog IC design engineers need breakthrough technologies & chip design tools to solve modern challenges; learn more from our analog design panel at SNUG 2024.The post Why Analog Design Challenges Need Breakthrough Technologies appeared first on Chip Design....

featured video

MaxLinear Integrates Analog & Digital Design in One Chip with Cadence 3D Solvers

Sponsored by Cadence Design Systems

MaxLinear has the unique capability of integrating analog and digital design on the same chip. Because of this, the team developed some interesting technology in the communication space. In the optical infrastructure domain, they created the first fully integrated 5nm CMOS PAM4 DSP. All their products solve critical communication and high-frequency analysis challenges.

Learn more about how MaxLinear is using Cadence’s Clarity 3D Solver and EMX Planar 3D Solver in their design process.

featured paper

Designing Robust 5G Power Amplifiers for the Real World

Sponsored by Keysight

Simulating 5G power amplifier (PA) designs at the component and system levels with authentic modulation and high-fidelity behavioral models increases predictability, lowers risk, and shrinks schedules. Simulation software enables multi-technology layout and multi-domain analysis, evaluating the impacts of 5G PA design choices while delivering accurate results in a single virtual workspace. This application note delves into how authentic modulation enhances predictability and performance in 5G millimeter-wave systems.

Download now to revolutionize your design process.

featured chalk talk

SLM Silicon.da Introduction
Sponsored by Synopsys
In this episode of Chalk Talk, Amelia Dalton and Guy Cortez from Synopsys investigate how Synopsys’ Silicon.da platform can increase engineering productivity and silicon efficiency while providing the tool scalability needed for today’s semiconductor designs. They also walk through the steps involved in a SLM workflow and examine how this open and extensible platform can help you avoid pitfalls in each step of your next IC design.
Dec 6, 2023
20,221 views