Skip to the main content.

2 min read

A good surprise (to me) at lynx: The secure laptop opportunity

I have now passed the ninety day tenure milestone at Lynx Software Technologies. I was reflecting today as to what the biggest surprise has been since joining from a marketing perspective. Somewhat obviously, the arrival and impact coronavirus has provided on physical events is by far and away the biggest challenge we have faced. My thoughts are, first and foremost, with any families with people that have been diagnosed with this disease. At a more mundane (i.e. not life and death) level, we attended a very different Embedded World 2020 and now face a period of uncertainty as to which events will go ahead and which will be canceled. Like many marketing teams, we now have two programs for each show; one assuming the event is held as planned, the other looking at how to repurpose content and demos to be sharable via other channels.

The big positive surprise for me has been the interest that customers have in using our technology for securing laptops in Enterprise, Government and Defense environments. A study by Ponemon Institute that was published in January 2020 highlighted that attacks against endpoints are growing at the same time that detection is getting harder. An average of 80% of successful breaches are new or unknown "zero-day attacks." According to the CISOs that were surveyed, the average time to apply, test, and fully deploy patches to endpoints is 97 days. In many cases, endpoint detection and response technology was not in use.

Our discussions with potential end customers and supporting partners have caused us to look as how LynxSecure can be used to:

  • Reduce reliance on traditional laptop security software products
  • Enforce mandatory data transmission through the corporate server or cloud security provider
  • Provide strong encryption for attached devices so in the case of physical computer loss or theft, the data is unreadable
  • Ensure protected Windows only connect via VPN, while the user’s unprotected Win10 can have normal web access

Secure Laptop LYNX

The heritage of this separation kernel hypervisor is of course from the mission critical safety systems where equipment like helicopters, aircraft and vehicles simply must continue to operate in a safe and deterministic way whatever is thrown at them. From a laptop point of view, the Lynx technology enables the system to boot securely and delivers immutable, boot-time-defined, hardware partitioning. This strict isolation ensures that

  • One guest cannot access another guest’s resources
  • LynxSecure cannot access a guest’s resources
  • DMA-capable devices cannot access a guest’s resources

System security is enforced as being on all of the time. Data encryption is always on. VPN functionality is enabled at all times and USB device insertion is always disabled. The enterprise can establish very specific access permissions. As an example

  • No hypervisor/management console login
  • No unprotected OS denial of service against secure OS
  • No dynamic system modification

We are working through more of the specifics with some lead customers and will be sharing more here and in this area of our website in due course. We look forward to hearing your feedback directly. Is this an area which you see as not being properly addressed by incumbent suppliers? What use case are we missing? Please email us here.

FACE TIM/MOSA Summit: September 2023

FACE TIM/MOSA Summit: September 2023

I am certain that there will be some formal write-ups in the coming days from esteemed journalist channels like Military Embedded, but we thought we...

Read More
Lynx Product Directions: The Three Horizons

Lynx Product Directions: The Three Horizons

We have defined three fundamental horizons that have become a framework of everything that we are doing at Lynx. The first horizon is what I will...

Read More
Embedded Complexity

Embedded Complexity

THROUGH THE LENS OF ENGINEERING Recently I read a McKinsey article on “Cracking the complexity code in embedded systems development”, a brilliant...

Read More