Skip to the main content.

2 min read

A good surprise (to me) at lynx: The secure laptop opportunity

I have now passed the ninety-day tenure milestone at Lynx Software Technologies. I was reflecting today as to what the biggest surprise has been since joining from a marketing perspective. Somewhat obviously, the arrival and impact coronavirus has provided on physical events is by far and away the biggest challenge we have faced. My thoughts are, first and foremost, with any families with people that have been diagnosed with this disease. At a more mundane (i.e. not life and death) level, we attended a very different Embedded World 2020 and now face a period of uncertainty as to which events will go ahead and which will be canceled. Like many marketing teams, we now have two programs for each show; one assuming the event is held as planned, the other looking at how to repurpose content and demos to be sharable via other channels.

The big positive surprise for me has been the interest that customers have in using our technology for securing laptops in Enterprise, Government and Defense environments. A study by Ponemon Institute that was published in January 2020 highlighted that attacks against endpoints are growing at the same time that detection is getting harder. An average of 80% of successful breaches are new or unknown "zero-day attacks." According to the CISOs that were surveyed, the average time to apply, test, and fully deploy patches to endpoints is 97 days. In many cases, endpoint detection and response technology were not in use.

Our discussions with potential end customers and supporting partners have caused us to look as how LynxSecure can:

  • Reduce reliance on traditional laptop security software products
  • Enforce mandatory data transmission through the corporate server or cloud security provider
  • Provide strong encryption for attached devices so in the case of physical computer loss or theft, the data is unreadable
  • Ensure protected Windows only connect via VPN, while the user’s unprotected Win10 can have normal web access

Secure Laptop LYNX

The heritage of this separation kernel hypervisor is of course from the mission critical safety systems where equipment like helicopters, aircraft and vehicles simply must continue to operate in a safe and deterministic way whatever is thrown at them. From a laptop point of view, the Lynx technology enables the system to boot securely and delivers immutable, boot-time-defined, hardware partitioning. This strict isolation ensures that

  • One guest cannot access another guest’s resources
  • LynxSecure cannot access a guest’s resources
  • DMA-capable devices cannot access a guest’s resources

System security is enforced as being on all the time. Data encryption is always on. VPN functionality is enabled at all times and USB device insertion is always disabled. The enterprise can establish very specific access permissions. As an example

  • No hypervisor/management console login
  • No unprotected OS denial of service against secure OS
  • No dynamic system modification

We are working through more of the specifics with some lead customers and will be sharing more here and in this area of our website in due course. We look forward to hearing your feedback directly. Is this an area which you see as not being properly addressed by incumbent suppliers? What use case are we missing? Please email us here.

Lynx's Strategic Leap: Unveiling New Capabilities and Vision for Defense-Optimized Software Solutions

Lynx's Strategic Leap: Unveiling New Capabilities and Vision for Defense-Optimized Software Solutions

Strategic Expansions and Future Capabilities in MilAero Market In December, we unveiled Lynx’s acquisition of Timesys, our first major growth since ...

Read More
Embracing Innovation, Collaboration, & Growth with Acquisition of Timesys

Embracing Innovation, Collaboration, & Growth with Acquisition of Timesys

I joined Lynx in June 2022 as a result of the acquisition of Lynx by OceanSound Partners. One of my first priorities was a collaborative effort...

Read More
C2 Server: What Is It? What Can Be Done to Thwart Them?

C2 Server: What Is It? What Can Be Done to Thwart Them?

what is a c2 server Cybersecurity attacks are on the rise across a diverse set of markets. Behind the more intentional attacks is a desire to extract...

Read More