UEI CYBERSECURITY TOOLS
At the heart of our tool suite is the UEI-SAT security automation configurator that takes the engineering and guesswork out of implementing your algorithms, security technical implementation guide (STIG) items, controls, and security protocols. UEI also provides a Secure Linux Toolkit preloaded with libraries to springboard your security development. And when you secure your hardware and software with UEI-SAT, you can add-on the ability to continuously monitor your system to ensure no malicious activity occurs. It's our mission to provide you with the right hardware, tools and support you need during your cybersecurity development and implementation stages.
This product is temporarily out of stock. You may opt-in our waiting list and we'll notify you once the product is restocked.
Product Overview
UEI HAS THE RIGHT CYBERSECURITY SOLUTIONS TO KEEP YOUR DATA SECURE
WE OFFER A SUITE OF CYBERSECURITY TOOLS TO HELP YOU ON YOUR PATHWAY TO NIST 800.213 COMPLIANCE. THIS INCLUDES SECURE BOOT, FIPS 140.2 ENCRYPTION, AND 100% CONTROL OF YOUR HARDWARE AND SOFTWARE.
At the heart of our tool suite is the UEI-SAT security automation configurator that takes the engineering and guesswork out of implementing your algorithms, security technical implementation guide (STIG) items, controls, and security protocols. UEI also provides a Secure Linux Toolkit preloaded with libraries to springboard your security development. And when you secure your hardware and software with UEI-SAT, you can add-on the ability to continuously monitor your system to ensure no malicious activity occurs. It's our mission to provide you with the right hardware, tools and support you need during your cybersecurity development and implementation stages.
Product Features
THE RIGHT FEATURES FOR SYSTEM CONTROL AND LOCKDOWN
-
Authenticated and encrypted boot for RTOSes or Linux
-
Generation of public and private keys for RSA (Rivest–Shamir–Adleman public-key cryptosystem) digital signatures
-
Support for up to 4096-bit keys for resilience against quantum computing attacks
-
Signing of application binaries with RSA signatures
-
SHA-256 (Secure Hash Algorithm 2) hashing for authentication of public keys
-
Generation of AES keys up to 256 bits in length
-
AES-CCM (Advanced Encryption Standard-Counter with CBC-MAC) encryption for bootable code stored in flash memory
-
Use of immutable Hardware Assisted Boot (HAB) stored in ROM
-
Use of AES and SHA-256 hardware accelerators
-
Secure UART, USB, JTAG interfaces, and other I/O ports
-
Download the secure binaries to flash memory
-
Support for on-board TPM for key generation and storage
UEI CYBERSECURITY HARDWARE SOLUTIONS
UEI offers flexible, rugged, high-performance systems that are configurable to a variety of application requirements. Each system chassis can house a selection of I/O boards custom-selected for your application. UEI cybersecurity features are available on both SoloX ARM and ZYNQ UltraScale+ CPU options.
For complete processor information: SOLOX ARM PROCESSOR ZYNQ ULTRASCALE+ PROCESSOR
UEI CYBERSECURITY PLATFORM OPTIONS
All hosted (PowerDNA) and embedded (UEIPAC) systems are available in SoloX ARM (-11 and -12) configurations. Zynq UltraScale+ based (-33 and -3A) is only available on embedded (UEIPAC) solutions. UEI-SAT offers 3 cybersecurity level options based on the SoloX ARM or Zynq processor selected by the user.
Product Benefits
UEI’S HARDWARE IS DESIGNED WITH THE LATEST TOOLS TO KEEP YOUR DATA SAFE AND SECURE. UEI OFFERS EASY-TO-USE CYBERSECURITY SOLUTIONS THAT ADDRESS KEY FEATURES IN FPGAS AND PROCESSORS.
UEI'S SUPPORTS NIST SP 800.213: HOW THE CYBERSECURITY FRAMEWORK CONTROLS RELATIONSHIPS
The National Institute of Standards and Technology (NIST) has put forth special publication NIST SP 800.53 as a list of specific controls and recommendations to support the design/development and use of secure government IT systems -- outlining how to manage availability, confidentiality, and integrity of data. United States federal/government contractors and agencies must comply with NIST SP 800.53 (Fig. 1). Some state/local governments, and private organizations are adopting these NIST security practices as well.
An integral part of the 800 NIST series is the special publication NIST SP 800.213 and its cybersecurity governance over embedded devices.
For reference:
-
NIST SP 800.171: A special publication that outlines recommended requirements for protecting the confidentiality of controlled unclassified information (CUI). Defense contractors must implement the recommended requirements contained within to protect covered defense information included in their defense contracts, as required by DFARS clause 252.204-7012.
-
NISTIR 8259: A series of reports that provides guidance for manufacturers and supporting third parties as they design, develop, test, sell, and support embedded devices. It consists of three final documents and one draft document.
-
ISO/IEC 27002: An information security standard that provides best practice recommendations on information security controls for use by those developing and implementing information security management systems (ISMS). Revised in 2022.
UEI-SAT BENEFITS:
|
|
---|
EASILY CONFIGURE AND CONTROL SECURITY CAPABILITIES IN A STEP-BY-STEP PLATFORM -- NO CYBERSECURITY EXPERIENCE IS NEEDED!
UEI-SAT makes it easy to configure cybersecurity options with no need to trade-off product schedules. Quickly configure and deploy with confidence that security is done right without having to hire additional experts. All security features provide necessary and important protection. With UEI-SAT, you also get:
-
Enablement of your NIST SP 800.213 and 800.213A Features
-
Secure Boot Configuration
-
Secure Key Management
-
And much more
SET UP SECURITY WITH CONFIDENCE
|
|
Video
LEARN MORE IN OUR CYBERSECURITY VIDEO