Integrity PC operating system takes advantage of new security features

Green Hills Software is extending its Integrity PC secure operating system technology to take advantage of new security features in desktop PCs powered by the latest Intel vPro processor technology. It's the first operating system to get a Common Criteria security evaluation, company says.


Santa Barbara, CA

Green Hills Software

is extending its Integrity PC secure operating system technology to take advantage of new security features in desktop PCs powered by the latest Intel vPro processor technology. According to the company, it is the first and only operating system to undergo a high assurance

Common Criteria security evaluation


“We are excited about the silicon security innovations packed into Intel’s vPro,” said David Kleidermacher, chief technology officer of Green Hills Software. “Intel has solved fundamental trust problems that have prevented secure operating systems from completing their mission on off-the-shelf PCs. With Integrity PC and Intel vPro processor technology, the PC platform can sustain applications and information requiring the highest levels of protection without sacrificing performance.”

Integrity PC works with Intel vPro processor technology to perform a secure boot in which the PC hardware, BIOS, and Integrity kernel are measured to provide trust in the execution environment. The operating system incorporates a suite of secure software components, including Green Hills Software’s Padded Cell virtualization software, which enables multiple guest operating systems, such as Windows, Linux, Solaris, and their applications to be run in secure partitions on the same computer. The resulting platform is said to allow systems designers to build the most security-critical applications and run them alongside familiar operating environments.

The platform is designed for the military, intelligence, financial, medical, and other critical infrastructure communities where PC users must manage and protect high value information. Military and intelligence communities struggle with the burden of maintaining separate computers and networks to manage information at varying sensitivity levels. Integrity PC manages information at multiple security levels, includes a cross-domain information transfer framework, provides a path for the shared keyboard and mouse devices, and includes a multi-factor authentication mechanism.

In unrelated news from Green Hills Software, the company announced Aug. 21 that an

arbitration panel denied claims brought against Green Hills Software by Express Logic


—Edited by Lisa Sutor, Control Engineering News Desk

No comments
The Engineers' Choice Awards highlight some of the best new control, instrumentation and automation products as chosen by...
The System Integrator Giants program lists the top 100 system integrators among companies listed in CFE Media's Global System Integrator Database.
The Engineering Leaders Under 40 program identifies and gives recognition to young engineers who...
This eGuide illustrates solutions, applications and benefits of machine vision systems.
Learn how to increase device reliability in harsh environments and decrease unplanned system downtime.
This eGuide contains a series of articles and videos that considers theoretical and practical; immediate needs and a look into the future.
Choosing controllers: PLCs, PACs, IPCs, DCS? What's best for your application?; Wireless trends; Design, integration; Manufacturing Day; Product Exclusive
Variable speed drives: Smooth, efficient, electrically quite motion control; Process control upgrades; Mobile intelligence; Product finalists: Vote now; Product Exclusives
Machine design tips: Pneumatic or electric; Software upgrades; Ethernet advantages; Additive manufacturing; Engineering Leaders; Product exclusives: PLC, HMI, IO
This article collection contains the 5 most referenced articles on improving the use of PID.
Learn how Industry 4.0 adds supply chain efficiency, optimizes pricing, improves quality, and more.

Find and connect with the most suitable service provider for your unique application. Start searching the Global System Integrator Database Now!

Cyber security cost-efficient for industrial control systems; Extracting full value from operational data; Managing cyber security risks
Drilling for Big Data: Managing the flow of information; Big data drilldown series: Challenge and opportunity; OT to IT: Creating a circle of improvement; Industry loses best workers, again
Pipeline vulnerabilities? Securing hydrocarbon transit; Predictive analytics hit the mainstream; Dirty pipelines decrease flow, production—pig your line; Ensuring pipeline physical and cyber security