Download PDF
Suppliers > United States > Red Balloon Security
Red Balloon Security Logo

Red Balloon Security

Overview
HQ Location
United States
Year Founded
2011
Company Type
Private
Revenue
< $10m
Employees
11 - 50
Website
Twitter Handle
Company Description
Red Balloon Security is exclusively focused on the development of robust security solutions for embedded device systems across all major industries, including consumer electronics, automobiles, manufacturing/industrial systems, building Controllers, homeland security, military, etc. Founded by Ang Cui, Red Balloon Security's core technology is Symbiote Defense, a universally-compatible, OS-agnostic, real-time host-based intrusion defense system which is capable of protecting any embedded device from Malware and malicious commands. Symbiote is a patented technology that already protects millions of devices around the world, and has logged more than 15 billion hours of runtime without a single recorded failure. It is currently under contract for use by the US government, as well as critical infrastructure and consumer devices, like HP LaserJet printers.
IoT Solutions
The First Universal Embedded Defense for all embedded devices
Symbiote is a platform-independent, OS-agnostic, real-time, host-based intrusion defense that works by layering specific defense modules and diverting unused CPU cycles for defense. Symbiote is designed to protect any and all embedded devices, from printers to PLCs. It can be applied to any device regardless of OS, CPU type, or hardware.

Borrowing from strategies seen in nature, like defense through diversification and defensive mutualism, Symbiote Defense keeps embedded systems safe against a wide variety of attacks. It defends devices without requiring any code change from the vendor, any additional or upgraded hardware, and all without impacting the functionality of the device. Red Balloon Symbiote Defense is interlaced into the binary code and data of the host it protects. It is injected into the Firmware in a randomized fashion. Once injected, it operates alongside the host program during runtime and continuously ensures that the code and data of the host device is untampered and never modified without permission. Symbiote Defense starts protecting the host the instant the host turns on, and will detect any unauthorized attempts to modify the firmware’s code or data within a fraction of a second, regardless of whether the device is in sleep mode, or busy servicing requests.
IoT Snapshot
Red Balloon Security is a provider of Industrial IoT cybersecurity and privacy technologies.
Technology Stack
Red Balloon Security’s Technology Stack maps Red Balloon Security’s participation in the cybersecurity and privacy IoT Technology stack.
  • Devices Layer
  • Robots
    Drones
    Wearables
  • Edge Layer
  • Automation & Control
    Processors & Edge Intelligence
    Actuators
    Sensors
  • Cloud Layer
  • Platform as a Service (PaaS)
    Infrastructure as a Service (IaaS)
  • Application Layer
  • Functional Applications
  • Supporting Technologies
  • Analytics & Modeling
  • Application Infrastructure & Middleware
  • Cybersecurity & Privacy
  • Networks & Connectivity
Technological Capability:
None
Minor
Moderate
Strong

Similar Suppliers.

Twitter Feeds.

Contact us

Let's talk!

* Required
* Required
* Required
* Invalid email address
By submitting this form, you agree that IoT ONE may contact you with insights and marketing messaging.
No thanks, I don't want to receive any marketing emails from IoT ONE.
Submit

Thank you for your message!
We will contact you soon.