Welcome!

@CloudExpo Authors: Pat Romanski, Kevin Jackson, William Schmarzo, David Sprott, Elizabeth White

News Feed Item

Samsung and Green Hills Software Announce Certification for Government Networks

Samsung KNOX Hypervisor - Powered by INTEGRITY(TM) Is the First Mobile Device Solution to Achieve U.S. Government Acceptance for Dual OS Use for Sensitive/Enterprise and Internet Access

SANTA BARBARA, CA -- (Marketwired) -- 03/17/14 -- Samsung Electronics Co., Ltd, and Green Hills Software today announced that Samsung KNOX Hypervisor has been approved for use on sensitive U.S. Department of Defense enterprise networks. The Authority to Operate (ATO), performed under the auspices of the U.S. Marine Corps, includes devices from the Samsung Galaxy line of smartphones and tablets and represents a broad collaboration between Green Hills Mobile, Samsung, mobile network carriers, systems integrators, and the U.S. Department of Defense.

Samsung KNOX Hypervisor is a foundational firmware layer of data protection and isolation below the mobile operating system, enabling a level of certifiable security that enhances application-level sandbox mechanisms.

Whether devices are enterprise or personally owned, Samsung KNOX Hypervisor enables users to have complete confidence in the privacy of their photos, contacts, e-mail, and other information while enterprise and government IT administrators manage the device's business use with complete assurance in the security of enterprise information both within the device and across the enterprise network.

"This industry first for Samsung and Green Hills is further evidence that the Samsung KNOX portfolio provides the scalable security solutions that address requirements ranging from personal consumer privacy to the highest levels of government and regulated industry certifications," commented Injong Rhee, Senior Vice President of KNOX Business, IT & Mobile Communications Division at Samsung Electronics.

"For the first time, mobile enterprise users can access the open Internet and Government sensitive networks simultaneously," said Gordon Jones, Vice President of Secure Mobility, Green Hills Software. "This ATO opens up new markets for Samsung and Green Hills, delivering ultra secure mobile solutions on the most popular Android platforms."

About Samsung KNOX Hypervisor - Powered by INTEGRITY™
Samsung KNOX offers several data protection and isolation solutions including container and Hypervisor. Samsung KNOX Hypervisor is a Type-1 mobile virtualization solution (also known as "KNOX INTEGRITY") developed by Green Hills Software and integrated with the Samsung KNOX mobile enterprise solutions suite. Shipping since 2003, the INTEGRITY® hypervisor is built upon security-certified separation kernel technology that provides highly assured isolation between one or more "guest" operating systems (domains) while also providing a native open standard execution environment for security-critical tasks, including FIPS 140-2 certified and NSA Suite B compliant data encryption, user authentication, security event auditing, and remote management. As the digital world grows in complexity, no single operating system suffices. The hypervisor provides the right level of abstraction -- the virtual machine -- for flexibility, scalability, and portability, enabling elegant yet practical solutions to previously intractable computing problems.

Availability
KNOX Hypervisor is available today. Contact [email protected] for further information.

About Samsung Electronics Co., Ltd.
Samsung Electronics Co., Ltd. is a global leader in technology, opening new possibilities for people everywhere. Through relentless innovation and discovery, we are transforming the worlds of TVs, smartphones, tablets, PCs, cameras, home appliances, printers, LTE systems, medical devices, semiconductors and LED solutions. We employ 286,000 people across 80 countries with annual sales of US$216.7 billion. To discover more, please visit www.samsung.com.

About Green Hills Mobile
Green Hills Mobile is a business group within Green Hills Software, the largest independent vendor of embedded software solutions. Green Hills Mobile's Type-1 hypervisor, INTEGRITY Multivisor, is built on INTEGRITY separation kernel technology. INTEGRITY is the only separation kernel technology to be certified by the NSA to EAL 6+, High Robustness, the highest level of security ever achieved for any software product. These open architecture integrated solutions address absolute security and high-reliability applications for the consumer electronics, medical, industrial, automotive, networking, avionics and other markets that demand industry-certified solutions. Green Hills Mobile is a gold member of Samsung Enterprise Alliance Program (SEAP). Green Hills Software is headquartered in Santa Barbara, CA, with European headquarters in the United Kingdom. Visit Green Hills Mobile at www.ghs.com/mobile.

Green Hills, the Green Hills logo, INTEGRITY, Multivisor and "Powered by INTEGRITY" are trademarks or registered trademarks of Green Hills Software in the U.S. and/or internationally. All other trademarks are the property of their respective owners.

Image Available: http://www2.marketwire.com/mw/frame_mw?attachid=2543354

Add to Digg Bookmark with del.icio.us Add to Newsvine

More Stories By Marketwired .

Copyright © 2009 Marketwired. All rights reserved. All the news releases provided by Marketwired are copyrighted. Any forms of copying other than an individual user's personal reference without express written permission is prohibited. Further distribution of these materials is strictly forbidden, including but not limited to, posting, emailing, faxing, archiving in a public database, redistributing via a computer network or in a printed form.

@CloudExpo Stories
Manufacturers are embracing the Industrial Internet the same way consumers are leveraging Fitbits – to improve overall health and wellness. Both can provide consistent measurement, visibility, and suggest performance improvements customized to help reach goals. Fitbit users can view real-time data and make adjustments to increase their activity. In his session at @ThingsExpo, Mark Bernardo Professional Services Leader, Americas, at GE Digital, discussed how leveraging the Industrial Internet a...
On Dice.com, the number of job postings asking for skill in Amazon Web Services increased 76 percent between June 2015 and June 2016. Salesforce.com saw its own skill mentions increase 37 percent, while DevOps and Cloud rose 35 percent and 28 percent, respectively. Even as they expand their presence in the cloud, companies are also looking for tech professionals who can manage projects, crunch data, and figure out how to make systems run more autonomously. Mentions of ‘data science’ as a skill ...
In his session at Cloud Expo, Robert Cohen, an economist and senior fellow at the Economic Strategy Institute, will provide economic scenarios that describe how the rapid adoption of software-defined everything including cloud services, SDDC and open networking will change GDP, industry growth, productivity and jobs. This session will also include a drill down for several industries such as finance, social media, cloud service providers and pharmaceuticals.
IoT generates lots of temporal data. But how do you unlock its value? You need to discover patterns that are repeatable in vast quantities of data, understand their meaning, and implement scalable monitoring across multiple data streams in order to monetize the discoveries and insights. Motif discovery and deep learning platforms are emerging to visualize sensor data, to search for patterns and to build application that can monitor real time streams efficiently. In his session at @ThingsExpo, ...
Ixia (Nasdaq: XXIA) has announced that NoviFlow Inc.has deployed IxNetwork® to validate the company’s designs and accelerate the delivery of its proven, reliable products. Based in Montréal, NoviFlow Inc. supports network carriers, hyperscale data center operators, and enterprises seeking greater network control and flexibility, network scalability, and the capacity to handle extremely large numbers of flows, while maintaining maximum network performance. To meet these requirements, NoviFlow in...
Choosing the right cloud for your workloads is a balancing act that can cost your organization time, money and aggravation - unless you get it right the first time. Economics, speed, performance, accessibility, administrative needs and security all play a vital role in dictating your approach to the cloud. Without knowing the right questions to ask, you could wind up paying for capacity you'll never need or underestimating the resources required to run your applications.
Security, data privacy, reliability and regulatory compliance are critical factors when evaluating whether to move business applications from in-house client hosted environments to a cloud platform. In her session at 18th Cloud Expo, Vandana Viswanathan, Associate Director at Cognizant, In this session, will provide an orientation to the five stages required to implement a cloud hosted solution validation strategy.
"delaPlex is a software development company. We do team-based outsourcing development," explained Mark Rivers, COO and Co-founder of delaPlex Software, in this SYS-CON.tv interview at 18th Cloud Expo, held June 7-9, 2016, at the Javits Center in New York City, NY.
ReadyTalk has expanded the capabilities of the FoxDen collaboration platform announced late last year to include FoxDen Connect, an in-room video collaboration experience that launches with a single touch. With FoxDen Connect, users can now not only engage in HD video conferencing between iOS and Android mobile devices or Chrome browsers, but also set up in-person meeting rooms for video interactions. A host’s mobile device automatically recognizes the presence of a meeting room via beacon tech...
Ovum, a leading technology analyst firm, has published an in-depth report, Ovum Decision Matrix: Selecting a DevOps Release Management Solution, 2016–17. The report focuses on the automation aspects of DevOps, Release Management and compares solutions from the leading vendors.
Continuous testing helps bridge the gap between developing quickly and maintaining high quality products. But to implement continuous testing, CTOs must take a strategic approach to building a testing infrastructure and toolset that empowers their team to move fast. Download our guide to laying the groundwork for a scalable continuous testing strategy.
Adding public cloud resources to an existing application can be a daunting process. The tools that you currently use to manage the software and hardware outside the cloud aren’t always the best tools to efficiently grow into the cloud. All of the major configuration management tools have cloud orchestration plugins that can be leveraged, but there are also cloud-native tools that can dramatically improve the efficiency of managing your application lifecycle. In his session at 18th Cloud Expo, ...
SYS-CON Events announced today that LeaseWeb USA, a cloud Infrastructure-as-a-Service (IaaS) provider, will exhibit at the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. LeaseWeb is one of the world's largest hosting brands. The company helps customers define, develop and deploy IT infrastructure tailored to their exact business needs, by combining various kinds cloud solutions.
Amazon has gradually rolled out parts of its IoT offerings in the last year, but these are just the tip of the iceberg. In addition to optimizing their back-end AWS offerings, Amazon is laying the ground work to be a major force in IoT – especially in the connected home and office. Amazon is extending its reach by building on its dominant Cloud IoT platform, its Dash Button strategy, recently announced Replenishment Services, the Echo/Alexa voice recognition control platform, the 6-7 strategic...
UpGuard has become a member of the Center for Internet Security (CIS), and will continue to help businesses expand visibility into their cyber risk by providing hardening benchmarks to all customers. By incorporating these benchmarks, UpGuard's CSTAR solution builds on its lead in providing the most complete assessment of both internal and external cyber risk. CIS benchmarks are a widely accepted set of hardening guidelines that have been publicly available for years. Numerous solutions exist t...
Deploying applications in hybrid cloud environments is hard work. Your team spends most of the time maintaining your infrastructure, configuring dev/test and production environments, and deploying applications across environments – which can be both time consuming and error prone. But what if you could automate provisioning and deployment to deliver error free environments faster? What could you do with your free time?
Up until last year, enterprises that were looking into cloud services usually undertook a long-term pilot with one of the large cloud providers, running test and dev workloads in the cloud. With cloud’s transition to mainstream adoption in 2015, and with enterprises migrating more and more workloads into the cloud and in between public and private environments, the single-provider approach must be revisited. In his session at 18th Cloud Expo, Yoav Mor, multi-cloud solution evangelist at Cloudy...
Extreme Computing is the ability to leverage highly performant infrastructure and software to accelerate Big Data, machine learning, HPC, and Enterprise applications. High IOPS Storage, low-latency networks, in-memory databases, GPUs and other parallel accelerators are being used to achieve faster results and help businesses make better decisions. In his session at 18th Cloud Expo, Michael O'Neill, Strategic Business Development at NVIDIA, focused on some of the unique ways extreme computing is...
Qosmos has announced new milestones in the detection of encrypted traffic and in protocol signature coverage. Qosmos latest software can accurately classify traffic encrypted with SSL/TLS (e.g., Google, Facebook, WhatsApp), P2P traffic (e.g., BitTorrent, MuTorrent, Vuze), and Skype, while preserving the privacy of communication content. These new classification techniques mean that traffic optimization, policy enforcement, and user experience are largely unaffected by encryption. In respect wit...
To leverage Continuous Delivery, enterprises must consider impacts that span functional silos, as well as applications that touch older, slower moving components. Managing the many dependencies can cause slowdowns. See how to achieve continuous delivery in the enterprise.