Sternum Introduces Embedded Security and Observability for the Zephyr Project IoT Ecosystem
April 05, 2023
Share this

Sternum joins the Zephyr Project as its first embedded runtime security partner.

As part of the Linux Foundation, Zephyr is a scalable, open-source real-time operating system (RTOS) delivering one of the world's most popular infrastructures for connected resource-constrained devices.

The partnership enables Zephyr’s community of IoT developers and device manufacturers - including innovators like Google, Intel, and NXP - to easily take advantage of secure OS, advanced runtime protection and threat detection, and continuous device monitoring for RTOS-based, low-resource devices.

The increasing risk of cybersecurity threats for the growing global number of connected devices did not go unnoticed by government and regulatory bodies. The US government, the EU government, NIST, FDA, and more have recently underlined the need for more advanced security controls - not only for new products that enter the market but also for legacy devices already in the field.

These new regulations and growing customer needs are a wake-up call for IoT manufacturers - many of which still rely on constant reactive security patching, lacking the on-device resources needed to deploy proactive endpoint defenses (e.g., EPP or XDR) that are considered the norm in other IT sectors.

Sternum enables IoT manufacturers to address rapidly evolving customer demands and market needs with a full-stack platform built for universal support of all Linux and RTOS devices. The platform offers a full suite of security solutions for embedded devices:

- Agentless runtime protection: Embedded Identity Verification (EIV™) is Sternum’s patented low-footprint technology that deterministically prevents exploit attempts, known attacks, unpatched vulnerabilities, zero-day assaults, and software supply chain threats.

- Continuous Monitoring: Sternum provides device and fleet-level insights that raise the bar for IoT observability, offering product, security, and engineering teams ready access to live and historical data, anomaly detection capabilities, advanced log management, and tools for remote debugging and contextual root cause analysis.

- Threat Detection: Sternum introduces XDR-like capabilities that triage data from mitigated attacks with device-level telemetry and AI-based insights to alert about ongoing attacks, emerging threats, malicious behavior, security blindspots, and suspicious activities.

“Sternum’s platform is a valuable addition to Zephyr’s partner ecosystem,” said Kate Stewart, Vice President of Dependable Embedded Systems at the Linux Foundation. “Sternum’s runtime security model enhances Zephyr's built-in security features by providing embedded developers and device manufacturers with additional security and monitoring capabilities, which they can implement with minimal complexity and zero performance compromises.”

“Zephyr is already the platform of choice for some of our largest customers, allowing us a clear view of how it’s being used to power medical devices, payment devices, gateways, and industrial infrastructure,” says Natali Tshuva, CEO and Co-Founder of Sternum. “We see growing demand from device manufacturers for advanced security controls, post-market surveillance capabilities, and threat mitigation that go beyond perpetual security patching. Our built-in support for the Zephyr operating system and toolchains allows us to address these needs and offer an easy way to bring our patented technology to all Zephyr-based devices.”

Share this

The Latest

April 25, 2024

The use of hybrid multicloud models is forecasted to double over the next one to three years as IT decision makers are facing new pressures to modernize IT infrastructures because of drivers like AI, security, and sustainability, according to the Enterprise Cloud Index (ECI) report from Nutanix ...

April 24, 2024

Over the last 20 years Digital Employee Experience has become a necessity for companies committed to digital transformation and improving IT experiences. In fact, by 2025, more than 50% of IT organizations will use digital employee experience to prioritize and measure digital initiative success ...

April 23, 2024

While most companies are now deploying cloud-based technologies, the 2024 Secure Cloud Networking Field Report from Aviatrix found that there is a silent struggle to maximize value from those investments. Many of the challenges organizations have faced over the past several years have evolved, but continue today ...

April 22, 2024

In our latest research, Cisco's The App Attention Index 2023: Beware the Application Generation, 62% of consumers report their expectations for digital experiences are far higher than they were two years ago, and 64% state they are less forgiving of poor digital services than they were just 12 months ago ...

April 19, 2024

In MEAN TIME TO INSIGHT Episode 5, Shamus McGillicuddy, VP of Research, Network Infrastructure and Operations, at EMA discusses the network source of truth ...

April 18, 2024

A vast majority (89%) of organizations have rapidly expanded their technology in the past few years and three quarters (76%) say it's brought with it increased "chaos" that they have to manage, according to Situation Report 2024: Managing Technology Chaos from Software AG ...

April 17, 2024

In 2024 the number one challenge facing IT teams is a lack of skilled workers, and many are turning to automation as an answer, according to IT Trends: 2024 Industry Report ...

April 16, 2024

Organizations are continuing to embrace multicloud environments and cloud-native architectures to enable rapid transformation and deliver secure innovation. However, despite the speed, scale, and agility enabled by these modern cloud ecosystems, organizations are struggling to manage the explosion of data they create, according to The state of observability 2024: Overcoming complexity through AI-driven analytics and automation strategies, a report from Dynatrace ...

April 15, 2024

Organizations recognize the value of observability, but only 10% of them are actually practicing full observability of their applications and infrastructure. This is among the key findings from the recently completed Logz.io 2024 Observability Pulse Survey and Report ...

April 11, 2024

Businesses must adopt a comprehensive Internet Performance Monitoring (IPM) strategy, says Enterprise Management Associates (EMA), a leading IT analyst research firm. This strategy is crucial to bridge the significant observability gap within today's complex IT infrastructures. The recommendation is particularly timely, given that 99% of enterprises are expanding their use of the Internet as a primary connectivity conduit while facing challenges due to the inefficiency of multiple, disjointed monitoring tools, according to Modern Enterprises Must Boost Observability with Internet Performance Monitoring, a new report from EMA and Catchpoint ...