The developers, manufacturers and suppliers of hardware/software solutions tend to provide customers with a customized product that meets as many functionality requirements as possible. For us, every project is unique because we adapt to our partner’s solution. Our experts provide partner training dedicated to Kaspersky Lab’s embedded protection, as well as services to help our partners identify any weak points in the security of their solutions. They then develop an SDK that conforms as closely as possible with all the partner’s needs. And, finally, our experts are always ready to offer support in securing products and technologies.
With MILS it’s possible to create IT systems and solutions that take functional and information security requirements into consideration. This is particularly important in terms of ensuring an appropriate level of trust in computer systems that are part of a critical information infrastructure.
Eltex and Kaspersky Lab have combined efforts to create a trusted solution for telecommunications. The solution is based on hardware and software products by Eltex and Kaspersky Security System – a special security module from Kaspersky Lab.
Kaspersky Lab and ANCUD have cooperated on a technological project to create a trusted integrated security solution for corporate networks. The solution consists of ANCUD’s Crypton Lock trusted boot hardware module and the Kaspersky Security System software platform.
AVL and Kaspersky Lab proudly present a new and innovative carrier of embedded automotive diagnostic features in synergy with reliable security solutions – as one of many possible examples of automotive connectivity.
Kaspersky Lab and BE.services have developed Embedded Security Shield (ESS) to protect industrial control systems that use CODESYS-based programmable logic controllers (PLCs) from cyberattacks. ESS is based on Kaspersky Security System.
Kraftway and Kaspersky Lab have combined efforts to create a trusted solution. The solution is based on KasperskyOS that protects the system’s software and data from malicious code activity and hacker attacks, including undeclared behavior by any part of the system.