Industrial Solutions
Laying the Foundation
For the Digital Transformation
Leading Edge in Digital Transformation (DX)

The Industrial Internet of Things (IIoT) introduces inter-connectivity at all levels of the automation pyramid—from executive resource planning down to field devices, forming a nearly omnipotent digital network that extends the practical limits of data acquisition and control by an order of magnitude from current plant design standards.

The full potential of the technology unlocks disruptive business options for vendors to adapt to almost any limitation.  Subscription and pay-as-you-go terms for platform as a service (PaaS) and data as a services (DaaS) models are early examples of IIoT benefits that vendors have already deployed.  Looking slightly ahead, the promise in model driven data analytics can take automation to an even higher level—from the automation of product manufacturing to the automation of running a business.

High Risks, Staggering Rewards

Being able to extend executive resource planning (ERP) into the cloud—analyzing real-time data and automating business processes at the global level—is tremendously valuable.  The first organizations to realize the concept will gain an incredible market advantage.   The risks, however, are formidable.

Market stakeholders are fully aware of the benefits, but these benefits depend on the assurance of the underlying technology.  Trusting globally connected cyber-physical systems to automate the control of product manufacturing and financial processes involves trusting a state machine of unfathomable complexity, forcing the question of security to the forefront.

Point Security Solutions Lack Precision

The status quo security position of product vendors is to offer best in class cyber security solutions—firewalls, patching servers, IDS, etc.  It is fair to question the accuracy and precision of such a position when said IT point solutions have proven to fail in epic proportions, which will keep many of the high valued projections of the IIoT parked at the launchpad.

Digital Transformation - Intelligent Computing - Interconnectivity
Request Evaluation Version
What to Expect When Filling Out This Form
The information you provide will help Lynx to better understand your requirements at the high level and we will be able to do research on your behalf and be well prepared for our next interaction.
Your information is always considered completely confidential and is not shared with anyone outside of Lynx Software Technologies without your expressed permission. We respond to these form inputs within 1-2 business days.
Industrial Internet Security Framework

Industrial standard organization such as the Industrial Internet Consortium  attest that point solutions are not enough.  The success of the IIoT depends on a holistic view of the system and requires a comprehensive framework for managing the vast complexities of the pyramid.  The IIC published Industrial Internet Security Framework surpasses typical recommendations of security controls,  documenting stakeholder viewpoints and concerns to ensure proposed solutions are rooted in requirements that comprehensively solve the problem.  Coverage Includes:

  • Threat Vectors
  • Embedded Software Design
  • Real-time Requirements
  • Legacy Compatibility
  • Global Connectivity
A Holistic Approach to Robust Security

Adopting any digitization security technology requires careful technical scrutiny to claims of assurance, interoperability with legacy systems, and life cycle maintenance costs.  Lynx MOSA.icTM provides a pragmatic path of adoption that addresses both technical and business challenges.

Industrial Reference Architecture 01
Building a Network of Trust with Lynx MOSA.icTM

To unlock the full potential of IIoT, trust must be established across a network.  That trust begins with platform security—the assurance that computing components are authentic, initialize to a well-known state, and are resilient to unauthorized changes.  Once platform security is in place, systems must incorporate network security and monitoring capabilities to ensure system-wide integrity is resilient to unauthorized changes.

Point solutions tend to address symptoms of engineering flaws—e.g patching, updating whitelists, malware signatures, etc.  However, reactionary approaches lose effectiveness at scale and fail at catching the first exploit. Lynx MOSA.icTM gives product suppliers the ability to build in assurance with the knowledge that their device is precisely designed to execute securely in enterprise or control networks without having to rely on layers of firewalls, IDS, and patching systems. 

The architecture configuration language of Lynx MOSA.icTM allows developers to design in security properties of system devices that must be trusted and need to survive in hostile environments.  Examples of relevant security designs include:

  • Boot Security
  • Data Protection:   Data-In-Transit, Data-At-Rest
  • Data and Control Plane Separation
  • Separation of Enterprise and  Control Networks
  • Read-only Monitoring

With Lynx MOSA.icTM, evaluators of security properties such as government authorities or safety managers can trace configurations down to processor hardware control, providing formal evidence of robustness.

Download Lynx MOSA.icTM Brochure
Legacy Interoperability & Incremental Deployment

Ground zero of the IIoT starts with raw compute power featuring intelligent microprocessor and sophisticated software platforms at all levels of the automation pyramid.  Modern plants are distributed computing systems containing thousands of widely diverse embedded components comprised of new and legacy processing and software designs. 

The underlying processor partitioning technology of Lynx MOSA.icTM preserves application binary compatibility and system interoperability.  The technology can be applied to a broad set of computing devices.  Designs can accommodate remote update capabilities while providing room for adaptive design changes that can incrementally adapt through modular construction.  With Lynx MOSA.icTM, purpose-built security layers can be commonly applied to enterprise and real-time devices across business and control networks to recoup investments on security model engineering. 

"For truly complex sets of requirements, complexity can still be managed with a combination of sound composable architectures, hierarchically layered and horizontally distributed abstraction, sensible modularity together with encapsulation, stark subsetting for critical subsystems by removal of unnecessary functionality, proactively evolvable but well-conceived conceptually simple interfaces that mask local complexity, and principled software engineering. As a result, inherently complex systems can be reduced to relatively simple interconnections of relatively simple components with relatively simple interfaces and relatively simple exception conditions."
Achieving Principled Assuredly Trustworthy Composable Systems and Networks
—Peter G. Neumann
Senior Principal Scientist Computer Science Lab, SRI International
DARPA CHATS Principle Investigator

Validation in Research

Lynx MOSA.icTM is an embedded development framework inspired from holistic composable security approach research and government initiatives that aim to manage the complexities in securing massive-scale cyber-physical systems.  The holistic approach is a well explored concept in the government defense market that faces parallel technical challenges and failure implications to industrial systems.

Research projects and government  initiatives, including DARPA CHATS - Composable High-Assurance Trustworthy Systems, DARPA HACMS - High-Assurance Cyber Military Systems, DoD MOSA Modular Open Systems Approach initiative, validate that managing globally connected critical infrastructure requires a pragmatic, disciplined plan for incrementally managing changes to vital architectural components with mathematical precision.

General Inquiries