UEI CYBERSECURITY TOOLS

(65) 6747 7234
sales@tmesystems.net
Account 0

UEI CYBERSECURITY TOOLS

Enquiry Item

At the heart of our tool suite is the UEI-SAT security automation configurator that takes the engineering and guesswork out of implementing your algorithms, security technical implementation guide (STIG) items, controls, and security protocols. UEI also provides a Secure Linux Toolkit preloaded with libraries to springboard your security development. And when you secure your hardware and software with UEI-SAT, you can add-on the ability to continuously monitor your system to ensure no malicious activity occurs. It's our mission to provide you with the right hardware, tools and support you need during your cybersecurity development and implementation stages.


Share

This product is temporarily out of stock. You may opt-in our waiting list and we'll notify you once the product is restocked.

Product Overview

UEI HAS THE RIGHT CYBERSECURITY SOLUTIONS TO KEEP YOUR DATA SECURE

 

 

 

WE OFFER A SUITE OF CYBERSECURITY TOOLS TO HELP YOU ON YOUR PATHWAY TO NIST 800.213 COMPLIANCE. THIS INCLUDES SECURE BOOT, FIPS 140.2 ENCRYPTION, AND 100% CONTROL OF YOUR HARDWARE AND SOFTWARE.

At the heart of our tool suite is the UEI-SAT security automation configurator that takes the engineering and guesswork out of implementing your algorithms, security technical implementation guide (STIG) items, controls, and security protocols. UEI also provides a Secure Linux Toolkit preloaded with libraries to springboard your security development. And when you secure your hardware and software with UEI-SAT, you can add-on the ability to continuously monitor your system to ensure no malicious activity occurs. It's our mission to provide you with the right hardware, tools and support you need during your cybersecurity development and implementation stages.

 

 

 

CYBERSECURITY PRODUCTS OVERVIEW

Product Features

THE RIGHT FEATURES FOR SYSTEM CONTROL AND LOCKDOWN

 

26b2df67-6e55-45c1-acbe-1554beb4906d

  • Authenticated and encrypted boot for RTOSes or Linux

  • Generation of public and private keys for RSA (Rivest–Shamir–Adleman public-key cryptosystem) digital signatures

  • Support for up to 4096-bit keys for resilience against quantum computing attacks

  • Signing of application binaries with RSA signatures

  • SHA-256 (Secure Hash Algorithm 2) hashing for authentication of public keys

  • Generation of AES keys up to 256 bits in length

  • AES-CCM (Advanced Encryption Standard-Counter with CBC-MAC) encryption for bootable code stored in flash memory

  • Use of immutable Hardware Assisted Boot (HAB) stored in ROM

  • Use of AES and SHA-256 hardware accelerators

  • Secure UART, USB, JTAG interfaces, and other I/O ports

  • Download the secure binaries to flash memory

  • Support for on-board TPM for key generation and storage

 

LEARN MORE ABOUT UEI-SAT

 

UEI CYBERSECURITY HARDWARE SOLUTIONS

UEI offers flexible, rugged, high-performance systems that are configurable to a variety of application requirements. Each system chassis can house a selection of I/O boards custom-selected for your application. UEI cybersecurity features are available on both SoloX ARM and ZYNQ UltraScale+ CPU options.

 

For complete processor information: SOLOX ARM PROCESSOR       ZYNQ ULTRASCALE+ PROCESSOR

 

 

UEI CYBERSECURITY PLATFORM OPTIONS

All hosted (PowerDNA) and embedded (UEIPAC) systems are available in SoloX ARM (-11 and -12) configurations. Zynq UltraScale+ based (-33 and -3A) is only available on embedded (UEIPAC) solutions. UEI-SAT offers 3 cybersecurity level options based on the SoloX ARM or Zynq processor selected by the user.

Screenshot 2024-01-24 175725

Product Benefits

 

UEI’S HARDWARE IS DESIGNED WITH THE LATEST TOOLS TO KEEP YOUR DATA SAFE AND SECURE. UEI OFFERS EASY-TO-USE CYBERSECURITY SOLUTIONS THAT ADDRESS KEY FEATURES IN FPGAS AND PROCESSORS.

4b8d8618-a1ba-4f2f-b0d7-448e05607f15

a311b7bb-52e1-47a6-9c64-38fc59c75cf4

 

UEI'S SUPPORTS NIST SP 800.213: HOW THE CYBERSECURITY FRAMEWORK CONTROLS RELATIONSHIPS

The National Institute of Standards and Technology (NIST) has put forth special publication NIST SP 800.53 as a list of specific controls and recommendations to support the design/development and use of secure government IT systems -- outlining how to manage availability, confidentiality, and integrity of data. United States federal/government contractors and agencies must comply with NIST SP 800.53 (Fig. 1). Some state/local governments, and private organizations are adopting these NIST security practices as well.

An integral part of the 800 NIST series is the special publication NIST SP 800.213 and its cybersecurity governance over embedded devices.

Fig.1 - UEI compliance with NIST 800.213 and NIST 800.213A

 

1fa12aa5-acc2-46a7-ae48-a4b5774fda54

For reference:

  • NIST SP 800.171: A special publication that outlines recommended requirements for protecting the confidentiality of controlled unclassified information (CUI). Defense contractors must implement the recommended requirements contained within to protect covered defense information included in their defense contracts, as required by DFARS clause 252.204-7012.

  • NISTIR 8259: A series of reports that provides guidance for manufacturers and supporting third parties as they design, develop, test, sell, and support embedded devices. It consists of three final documents and one draft document.

  • ISO/IEC 27002: An information security standard that provides best practice recommendations on information security controls for use by those developing and implementing information security management systems (ISMS). Revised in 2022.


 

UEI-SAT BENEFITS:

  • Easy to Implement

  • No Need to Hire Additional Cybersecurity Experts

  • Provide Security Against a Wide Range of Threats

  • Conforms to NIST Best Practices

  • Secure Boot of Applications, OSs & Loader

  • Quickly Transition from Engineering to Deployment

  • And so much more!

 

 

EASILY CONFIGURE AND CONTROL SECURITY CAPABILITIES IN A STEP-BY-STEP PLATFORM -- NO CYBERSECURITY EXPERIENCE IS NEEDED!

UEI-SAT makes it easy to configure cybersecurity options with no need to trade-off product schedules. Quickly configure and deploy with confidence that security is done right without having to hire additional experts. All security features provide necessary and important protection. With UEI-SAT, you also get:

  • Enablement of your NIST SP 800.213 and 800.213A Features

  • Secure Boot Configuration

  • Secure Key Management

  • And much more

 

 

 

SET UP SECURITY WITH CONFIDENCE

  • Customized GUI (Fig. 2)

  • Key Generation

  • Uboot/Linux Authentication

  • Linux Kernal and Rootfs Encryption

  • Peripheral and Code Execution Security

  • UEI Hardware Fully Supported

e5fd51c4-04eb-4722-ab14-7499ccff3c4d

 

Video

LEARN MORE IN OUR CYBERSECURITY VIDEO