// Symbiote

Embedded Device & Firmware Security Solutions

Developed through world-class, award-winning research and proven over millions of devices, Red Balloon Security’s solutions provide firmware-level protection to embedded systems in our most critical industries.

// Symbiote

Detect Firmware-Level Attacks on
Embedded Devices and Respond in Real Time

Protecting embedded devices in operational technology (OT) systems is a major challenge for equipment manufacturers and users in many industries. The number and impact of attacks on these devices are rising, which threatens both productivity and safety. These attacks can include not just harmful commands from the control room, but also malicious updates, control-flow hijacking, and memory corruption of the devices themselves. Red Balloon’s Symbiote Defense helps secure these devices by continuously checking the integrity of their code and memory at the firmware level. This solution ensures that only authorized software runs on the system and can detect and report any unusual behavior. 

FIRMWARE HARDENING

Autotomic Binary Reduction (ABR), Binary Structure Randomization (BSR) and our FRAK appliance work together to remove unused features in device firmware, randomize code layout and support our runtime protection solution — and harden device defenses.

RUNTIME DEFENSE

Our Symbiote Defense keeps embedded devices safe by continuously checking the integrity of the code and memory at the firmware level and prevents unauthorized codes or commands from executing.

RUNTIME MONITORING

Red Balloon Security’s Symbiote Suite can provide real-time insights into a network of embedded devices while providing operators with unified monitoring, alerts, and forensic analysis.

ON-CALL CONSULTING

The security researchers who developed the Red Balloon Security Symbiote Suite can offer their experience and expertise regarding embedded devices in commercial or government-based deployments. 

Compatible Across All Systems. Symbiote Is:

OS-agnostic:

We support any Operating System — and even systems with no operating system. Existing deployments include but are not limited to: Linux, Android, Windows CE, VxWorks, QNX, Cisco IOS, Nuttx, Nucleus, ThreadX, RTA-OS, LynxOS.

Device platform independent:

Existing Instruction Set Architecture (ISA) deployments include: ARM, ARM 64, ARM Thumb Mode, MIPS, PowerPC VLE, x86, x64, AVR, and MSP430. Additional ISAs can be supported.

THE REST OF THE RBS OFFER: OUR EXPERTS

We can help you build out and maintain our security solutions — or provide back-up support when installation is straightforward. With over 10 years’ experience in the field and a reputation for pioneering research that elevates industry and government standards, our world class team’s input will accelerate your security evolution — and help you realize a powerful market advantage.

DEFEND FROM WITHIN