Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


05:20 PM
Dark Reading
Dark Reading
Products and Releases

IDF Rolls Out Secure Type-1 Hypervisor

Secure hypervisor will enable secure virtualization technology for enterprises and government agencies

Santa Barbara, CA (September 14, 2010) – INTEGRITY Global Security, LLC , a wholly-owned subsidiary of Green Hills Software, Inc. and the leading provider of high-robustness IT security solutions for government and commercial enterprises, today released the world’s first EAL 7 certifiable Type-1 Hypervisor. Based on the same high assurance technology and development process that resulted in the world’s first and only EAL 6+ High Robustness certification for Green Hills Software’s INTEGRITY-178B Separation Kernel, the INTEGRITY Secure Type-1 Hypervisor delivers a unique secure virtualization capability not possible with traditional Type-1 hypervisors. The INTEGRITY Secure Type-1 Hypervisor simplifies IT implementation and management for enterprises and government agencies by reducing the need for an administrator to manage multiple platforms and by ensuring that the virtualization technology itself does not require complex management models and training. The INTEGRITY solution provides centralized, remote provisioning, in both thin-and thick-client form factors. The result is a more efficient computing infrastructure, with reduced costs for hardware, maintenance, and energy.

Takes Advantage of Intel vPro Technology Because it divides a computer into multiple “virtual computers”, the hypervisor must be built from the ground up for absolute security to prevent malicious or unintended data leakage or denial of service between virtual machines. INTEGRITY Global Security has worked closely with Intel to ensure the application of each company’s respective technology; INTEGRITY Global Security is the only company to utilize EAL 7 processes and correctly take advantage of the Virtualization and Trusted Execution Technology features within Intel Core vPro processors. “Intel Core vPro processors provide a sophisticated and powerful hardware platform for virtualized client environments,” said Michael Liacko, EVP at INTEGRITY Global Security. “However, not all hypervisors are created equal, and next-generation deployment models demand security between workloads, users and networks. INTEGRITY is the only company that can provide the highest level of security assurance demanded in these environments. ” “The integration of Intel Core vPro processors and INTEGRITY’s Secure Type-1 Hypervisor enables businesses to benefit from the security and performance of hardware-assisted virtualization,” said Lisa Watts, director, Ecosystem Development, Intel Business Client Platform Division. “Enterprises can now receive high levels of security assurance and performance possible with INTEGRITY and vPro technologies.” Examples of organizations that require Secure Type-1 virtualization include governments with multiple classified or compartmentalized networks; healthcare providers that must isolate sensitive patient information systems from corporate intranets and the Internet; outsourced call centers that must keep individual customer data and networks separated; corporations which must manage highly sensitive intellectual property; and critical infrastructure such as electric power, oil, nuclear, and financial. Built with INTEGRITY The INTEGRITY Secure Type-1 Hypervisor leverages the INTEGRITY-178B real-time separation kernel, the only software that runs in the computer’s most privileged mode. In contrast to other Type-1 hypervisors, which can only host virtual machines, the separation kernel provides a unique ability to run trusted applications as well as virtual machines. This enables the deployment of critical functionality, such as multi-level security (MLS), which cannot be entrusted to a general-purpose guest operating system. Traditional Type 1 hypervisors are certifiable to EAL 4, a standard deemed suitable only for protection against casual and inadvertent attempts to breach security. In contrast, the INTEGRITY-178B separation kernel is certified against the U.S. Government Protection Profile for Separation Kernels in Environments Requiring High Robustness, which outlines the requirements – including NSA penetration testing and formal mathematical proof of security - for the protection of high-valued resources against well-funded and sophisticated attackers.

For additional technical and purchasing information, please visit www.integrityglobalsecurity.com .

About INTEGRITY Global Security, LLC INTEGRITY Global Security, a wholly owned subsidiary of Green Hills Software, is the leading expert in providing the highest-certified IT security solutions for government, military and commercial enterprises. The foundation of INTEGRITY Global Security is the INTEGRITY-178B Separation Kernel, the first and only operating system to be evaluated by the NSA and certified by NIAP to EAL6+ High Robustness for the protection of classified and high value information against well-funded sophisticated attackers. INTEGRITY Global Security is headquartered in Santa Barbara, CA, with European headquarters in the United Kingdom. INTEGRITY Global Security™, Secured with INTEGRITY™ and Making Computing Secure™ are trademarks or registered trademarks of INTEGRITY Global Security, LLC. All other trademarks are the property of their respective owners. To learn more about how INTEGRITY Global Security can make computing secure for your organization please visit www.integrityglobalsecurity.com

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
Manchester United Suffers Cyberattack
Dark Reading Staff 11/23/2020
As 'Anywhere Work' Evolves, Security Will Be Key Challenge
Robert Lemos, Contributing Writer,  11/23/2020
Cloud Security Startup Lightspin Emerges From Stealth
Kelly Sheridan, Staff Editor, Dark Reading,  11/24/2020
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2020-11-28
In Eclipse Jetty version 9.4.0.RC0 to 9.4.34.v20201102, 10.0.0.alpha0 to 10.0.0.beta2, and 11.0.0.alpha0 to 11.0.0.beta2, if GZIP request body inflation is enabled and requests from different clients are multiplexed onto a single connection, and if an attacker can send a request with a body that is ...
PUBLISHED: 2020-11-27
blosc2.c in Blosc C-Blosc2 through 2.0.0.beta.5 has a heap-based buffer overflow when there is a lack of space to write compressed data.
PUBLISHED: 2020-11-27
npm package systeminformation before version 4.30.5 is vulnerable to Prototype Pollution leading to Command Injection. The issue was fixed with a rewrite of shell sanitations to avoid prototyper pollution problems. The issue is fixed in version 4.30.5. If you cannot upgrade, be sure to check or sani...
PUBLISHED: 2020-11-27
In Crafter CMS Crafter Studio 3.0.1 an unauthenticated attacker is able to inject malicious JavaScript code resulting in a stored/blind XSS in the admin panel.
PUBLISHED: 2020-11-27
In Crafter CMS Crafter Studio 3.0.1 an unauthenticated attacker is able to create a site with specially crafted XML that allows the retrieval of OS files out-of-band.