Tactical Network Solutions Unveils Firmware Evaluation Services

save
Share and earn Cybytes
Facebook Twitter LinkedIn Email

Companies afraid of IoT hacks can proactively protect their devices.

COLUMBIA, MD: The current state of IoT security seems bleak. Story after story about IoT hacks on insecure connected devices, including security cameras, teddy bears, pacemakers, lightbulbs and routers continue to make the headlines. Companies – and their customers – fear these hacks with good reason. They can lead to untold physical, data, psychological, and intellectual property losses. With an increasing number of devices entering the market daily, the stakes continue to skyrocket.

In early April 2017, Tactical Network Solutions (TNS) officially unveiled its firmware evaluation services to its clients and prospects. TNS seeks to assist as many companies as possible in order to secure as many devices as possible. They believe that true IoT security can be a reality for developers and manufacturers. The evaluation services are priced at an initial, introductory rate to allow companies to take advantage of the service.

“We want to help companies evaluate their compiled firmware images just before production to ensure the highest level of security possible,” notes Terry Dunlap, Founder & CEO of TNS. “In the evaluations, we don’t look at source code. Rather, we reverse engineer the compiled images to find all vulnerabilities, including those compilers may have introduced that are often revealed in the libraries and other parts of the binaries.”

To date, TNS firmware evaluations, performed for government and other private customers, have revealed thousands of hidden attack vectors on IoT and other connected devices. Companies rely on the audits to continuously uncover erroneously placed private crypto keys, insecure binaries with highly vulnerable function calls and other rampant security holes in embedded firmware.

About Tactical Network Solutions: Fortune 500 companies and governments around the world come to Tactical Network Solutions for our reverse engineering training programs, firmware evaluations and cyber risk mitigation strategies. TNS discovers hidden attack vectors in IoT and other connected devices using the Centrifuge IoT Security Platform to rapidly conduct firmware evaluations and mitigate cyber risks.

 

More about Firmware Evaluation Services for Risk Mitigation…

Share this post and earn Cybytes
Facebook Twitter LinkedIn Email
Follow
100 Followers
About Tactical Network Solutions
Are you concerned about risky, vulnerable embedded firmware in IoT devices, connected medical devices, automotive ECUs and industrial control systems? You're not alone. Since 2007, Fortune 500 companies and governments around the world have sought out Tactical Network Solutions for reverse engineering training programs, firmware evaluations, and cyber risk mitigation strategies. Clients are excited to leverage our automated firmware evaluations and consulting performed with the proprietary Centrifuge IoT Security Platform. The evals are completed with NO access to source code on compiled images containing a Linux-based root filesystem compiled for either MIPS, ARM, or X86. We also support QNX (a real-time operating system) and Docker containers. TNS evaluations have revealed thousands of hidden attack vectors including erroneously placed private crypto keys, insecure binaries with highly vulnerable function calls and other rampant security holes on embedded firmware. Our community of clients includes firmware developers, underwriters, law firms, governments and intelligence agencies worldwide who share a common goal: to discover hidden attack vectors in IoT and connected devices.
Promoted Content
TNS Issues a Sample IoT Security Report Showing Backdoors in a Connected Device
First, the good news: The extremely high number of connected devices rapidly coming to market has consumers and manufacturers excited. The new IoT devices often include advancements, more effective data collection and greater ease of use. Now, the bad news: When the devices are not built securely, they also bring unnecessary exposure, vulnerabilities, and danger.

Our Revolution

We believe Cyber Security training should be free, for everyone, FOREVER. Everyone, everywhere, deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is a free community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

Cybrary On The Go

Get the Cybrary app for Android for online and offline viewing of our lessons.

Get it on Google Play
 

Support Cybrary

Donate Here to Get This Month's Donor Badge

 
Skip to toolbar

We recommend always using caution when following any link

Are you sure you want to continue?

Continue
Cancel