Benefits
-
Real-Time anomaly detection and incident response
-
Defense against Zero-Day exploits
-
Low Overhead, High Performance
Built for Device Developers and Operators
- Embedded Linux device manufacturers
- Integrators and operators managing connected fleets
- Product teams releasing new features and security patches
Real-Time Threat Detection and Incident Response
- Continuous monitoring
- Zero-day defense
- Memory protection
-
- Firmware integrity check
- Intrusion detection system
- Featherlight agent footprint
- Compliance reporting
Frequently Asked Questions
Here are answers to common questions. If you need more information, please get in touch.
-
How does IoT Core Security protect against zero-day and unknown attacks?
Boldwark IoT Core Security uses real time process event monitoring at the Linux kernel level to observe the behavior of processes and detect abnormal activities from running processes.
For example, Boldwark IoT Core Security can detect when a new process is started without a backing executable file in the filesystem, or for example a remote outbound connection to a previously unknown destination.
-
Can IoT Core Security stop exploits relying on memory corruption attacks like buffer overflows?
Boldwark IoT Core Security can stop exploits from being used on your devices by immediately terminating the hijacked process and reporting the event. The detection of hijacked processes is done by monitoring their activities.
-
Does IoT Core Security require an agent?
Yes, the Boldwark agent needs to be embedded in your device.
-
What is the performance impact (CPU/Memory overhead) of the agent?
The Boldwark IoT Core Security agent is implemented in Rust and relies on eBPF probes to provide high performance in-kernel process monitoring. This allows us to do most of the filtering in kernel-space thus reducing the CPU and Memory impact of the agent.
-
Does IoT Core Security require custom kernel patches?
No, Boldwark IoT Core Security relies on eBPF programs that are loaded into the kernel to implement its process monitoring capabilities. Being implemented in eBPF also ensures that the Boldwark IoT Core Security agent does not compromise or introduce unnecessary vulnerabilities into the Linux kernel thanks to the kernel eBPF program verifier.
-
Does this solution support our current embedded operating system?
We currently only support Linux based operating systems.
-
How can I integrate IoT Core Security into my devices?
Boldwark IoT Core Security can be integrated in your devices by packaging it as a service running inside your Linux based firmware.
We provide the full source code of the agent as well as Yocto layers, Debian and RPM packages to integrate the Boldwark IoT Core Security agent into your firmware.