Suppliers United States Red Balloon Security
This profile is not managed yet, if you would like to manage
this profile, please contact us at team@iotone.com
Red Balloon Security Logo

Red Balloon Security

United States
New York
2011
Private
< $10m
11 - 50
Open website
Red Balloon Security is exclusively focused on the development of robust security solutions for embedded device systems across all major industries, including consumer electronics, automobiles, manufacturing/industrial systems, building Controllers, homeland security, military, etc. Founded by Ang Cui, Red Balloon Security's core technology is Symbiote Defense, a universally-compatible, OS-agnostic, real-time host-based intrusion defense system which is capable of protecting any embedded device from Malware and malicious commands. Symbiote is a patented technology that already protects millions of devices around the world, and has logged more than 15 billion hours of runtime without a single recorded failure. It is currently under contract for use by the US government, as well as critical infrastructure and consumer devices, like HP LaserJet printers.
Read More
The First Universal Embedded Defense for all embedded devices
Symbiote is a platform-independent, OS-agnostic, real-time, host-based intrusion defense that works by layering specific defense modules and diverting unused CPU cycles for defense. Symbiote is designed to protect any and all embedded devices, from printers to PLCs. It can be applied to any device regardless of OS, CPU type, or hardware.

Borrowing from strategies seen in nature, like defense through diversification and defensive mutualism, Symbiote Defense keeps embedded systems safe against a wide variety of attacks. It defends devices without requiring any code change from the vendor, any additional or upgraded hardware, and all without impacting the functionality of the device. Red Balloon Symbiote Defense is interlaced into the binary code and data of the host it protects. It is injected into the Firmware in a randomized fashion. Once injected, it operates alongside the host program during runtime and continuously ensures that the code and data of the host device is untampered and never modified without permission. Symbiote Defense starts protecting the host the instant the host turns on, and will detect any unauthorized attempts to modify the firmware’s code or data within a fraction of a second, regardless of whether the device is in sleep mode, or busy servicing requests.
Read More
Red Balloon Security is a provider of Industrial IoT cybersecurity and privacy technologies.
Technologies
Cybersecurity & Privacy
Endpoint Security
Red Balloon Security’s Technology Stack maps Red Balloon Security’s participation in the cybersecurity and privacy IoT technology stack.
  • Application Layer
  • Functional Applications
  • Cloud Layer
  • Platform as a Service
    Infrastructure as a Service
  • Edge Layer
  • Automation & Control
    Processors & Edge Intelligence
    Actuators
    Sensors
  • Devices Layer
  • Robots
    Drones
    Wearables
  • Supporting Technologies
  • Analytics & Modeling
    Application Infrastructure & Middleware
    Cybersecurity & Privacy
    Networks & Connectivity
Technological Capability
None
Minor
Moderate
Strong
Number of Similar Suppliers6
DarkTrace
DarkTrace
Darktrace, a global leader in cyber security AI, delivers world-class technology that protects over 6,500 customers worldwide from advanced threats, including ransomware and cloud and SaaS attacks. The company’s fundamentally different approach applies Self-Learning AI to enable machines to understand the business in order to autonomously defend it. Headquartered in Cambridge, UK, the company has 1,500 employees and over 30 offices worldwide. Darktrace was named one of TIME magazine’s ‘Most Influential Companies’ for 2021
Grovf
Grovf
Grovf is an engineering company aimed to develop hardware and software products to assist Industrial Internet of Things (IIoT) and Big Data problems. Here at Grovf we help our industrial customers to solve IoT generated Big Data storage problems using hardware (FPGA) implementation of DB functionality in order to close the gap between IoT generated data throughput and software database transaction speed, resulting 20x faster transactions and power saving.
Virgil Security
Virgil Security
Virgil Security provides easy-to-deploy and easy-to-use cryptographic software and services for use by developers and end-users. Virgil Security's Encryption libraries and services, along with an accompanying public key management infrastructure, ease the pain of developing, deploying, and using strong Cryptography. Virgil Security enables a new generation of enhanced privacy and security for applications, cloud services, and the Internet of Things.
Olympus Sky Technologies
Olympus Sky Technologies
We help IoT vendors to get more revenue through enhancing their products with the best-in-class security layer.We bring certainty and peace of mind to owners of smart factories, smart buildings, smart vehicles, that they won't lose money because of being hacked.Olympus Sky is an R&D company that developed a holy grail of security in the world of the IoT. We work with startups, gov agencies, automotive and the big industry, bringing protection to their connected devices and their networks.
Sternum
Sternum
With a mission to secure the future and enable life-saving applications, Sternum has built a holistic, scalable and first of its kind on-device security and visibility solution that prevents attacks in real-time while providing insights into any connected device. Sternum was founded in 2018, by a team of highly experienced research, development and business leaders with a mission to fundamentally change the world of IoT Security. Bringing profound knowledge in embedded systems, the joint perspectives of the defender and the attacker, and an aspiration to alleviate the medical security standard, Sternum not only set out to build uncompromising innovative technology but also to create true impact.
Download PDF Version
test test