Ubiquitous mobile device present an attractive target for hackers. Mobile-borne viruses, Trojans, and other subversions have been steadily increasing, exceeding the quantity of such malware found on PCs not so long ago. Mobile phones run complex multimedia operating systems – Android, Windows 7 Mobile, Linux, MacOS - containing the same types of vulnerabilities that afflict our laptops, desktops and servers.
The Green Hills Platform for Trusted Mobile Devices enables use of the latest smartphones and tablets while simultaneously meeting stringent IT management and security requirements. At the core of the platform is the INTEGRITY Multivisor, a mobile microkernel Type-1 hypervisor built on the world's only Common Criteria EAL6+, High Robustness certified microkernel technology., This proven High Rubustness solutions provides the security required to protect valuable information against sophisticated attackers.
Unlike enterprise PCs that are traditionally IT-owned and managed, handheld devices are traditionally privately owned and subject to deep personal preference and customization. Green Hills Software works with leading mobile device OEMs, integrators, and service providers to ensure that their mobile offerings can be used to access sensitivei nformation and networks while making no sacrifices in the availability, privacy, and performance relating to the personal use of multimedia, social, and Internet apps. High robustness isolation between the personal persona and the IT-managed persona is the only way to meet these disparate requirements. Personas are implemented as virtual machines under the strict control of the INTEGRITY Multivisor.
Green Hills Software has been working with leading mobile system-on-chip (SoC) processor suppliers and device manufacturers over the past decade to optimize the INTEGRITY Multivisor technology and ensure that it is seamlessly incorporated into the device manufacturing process.
The Platform also includes a software development kit (SDK) that enables device manufacturers and service providers to incorporate secure applications and manage critical data that cannot be compromised regardless of the state of the guest environments.
Cont ...