rity holes in network equipment are a larger threat to system down time than software bugs; therefore, designing security into a network device from the onset will provide total reliability, absolute security and maximum availability. INTEGRITY’s mature separation kernel architecture allows for fault isolation and containment – whether that fault is a bug or an attack – allowing for fast system recovery.
“The U.S. government and industry is experiencing a massive and rapidly evolving shift in the near future – from hundreds of different proprietary or specialized communications formats to IP-based networks,” said Alex Lightman, CEO of Innofone.com. “Whether you call it Net Centric Warfare for the military or Enterprise Centric Operations for commercial purposes, it means an explosion in the number of total nodes – including billions of appliances, sensors and products that will be constantly online, many of them by wireless. Because two-dimensional firewalls were never intended for such 3D networks, it will be essential to employ new generations of hardened security products from a high-end company such as Green Hills to protect these extensive networks against cyber attacks, from both internal and external sources.”