Industry Solutions
Overview
____
Avionics
DO-178C & FACETM: Can they co-exist?

LYNX provides avionics developers with adaptive platforms that can be tuned to manage complexity inheritance, platforms which are internally comprehensible and transparent, allowing regulatory authorities to trace and verify assurance claims down to implementation realized in silicon.  Integrate complex components as needed.  Control the inherent complexities of designs with the understanding of how those designs are realized in hardware...

LEARN MORE
Automotive
Creating Secure, Deterministic Platforms for This Decade

The automotive market’s desire to drive down cost, power and form factor is causing the next generation of electronic control units (ECUs) to be based on very high performance, heterogeneous system on chips (SoCs). It is critical to choose the right software frameworks for these platforms that can safely and securely combine the deterministic benefits of real-time applications with access to a plethora of applications that exist in the Android or Linux domains...

LEARN MORE
Industrial
The Leading Edge in Digital Transformation

To unlock the full potential of IIoT, trust must be established across a network.  That trust begins with platform security—the assurance that computing components are authentic, initialize to a well-known state, and are resilient to unauthorized changes.  Once platform security is in place, systems must incorporate network security and monitoring capabilities to ensure system-wide integrity is resilient to unauthorized changes...

LEARN MORE
IT Infrastructure
When is a System Secure?

LYNX gives the ability to IT stakeholders to precisely define the expected behavior of computer systems and to enforce polices that ensure their security technology investments are making valid assumptions based on underlying platform integrity properties.  Concurrently access public and private data on a single computing device while ensuring that private data resides within private rooms and is resilient to malicious attempts to ex-filtrate data or to subvert the underlying platform and bypass information flow policy enforcement...

LEARN MORE