Security Features
Security Features
Over the last several years, computer security has become a major concern for all users and manufacturers around the world. Sophisticated software has been written to penetrate corporate, government and military networks and servers in order to access proprietary and sensitive information, and to perform malicious and criminal attacks that compromise the integrity of, and deny legitimate access to, that information. Both internal and external attacks on data security are becoming more and more frequent, with the damage often being irreversible, and, in general, the traditional methods of protection such as firewalls and anti-virus/anti-malware software are no longer adequate. A “holistic” approach to security that ranges from user education / operational policies to containment after a breech is required to address the rapidly evolving computer security environment. For embedded computing, a “holistic” approach requires that security features at the hardware and firmware level are also present. In addition, for some defense and government agency customers, the required security features go beyond what is found in many embedded computing engines currently on the market. For these applications, additional measures have been, and are being, developed to ensure that computers with sensitive information do not fall into the hands of the enemy.
As a result of these increased computer security threats, General Micro Systems has taken the lead in implementing improved security features - from the architectural level down to the hardware level. All GMS systems are designed from the ground up to provide for the most advanced security features possible. GMS’ systems include security functions that protect against threats such as software attacks at system initialization, threats against the integrity of the system BIOS and related firmware, escalation of privilege attacks against the operating system, rootkits, physical tampering and unauthorized configuration changes, and compromise of data and mass storage devices. In addition, GMS provides architectural variants of the typical embedded computer system that provide for government approved compartmentalization of I/O resources for operation of virtual machines in computing environments with multiple security domains, and with multiple processing sub-systems in total isolation.
[widgetkit id=84]