Redwall Technologies Announces Data Security and ‘Resilient Operating System Environment’ Award from the U.S. Marine Corps through the Federal Small Business Innovation Research (SBIR) Program
Beavercreek, OH, November 29, 2019 – Redwall Technologies, the leading ISV for multi-modal endpoint device security, today announced that it has been awarded a grant by the United States Marine Corps to participate in a SBIR program aimed at securing communications and data across a multitude of operating systems used by Marine Corps Systems Command (MARCORSYSCOM). Dozens of Independent Software Vendors (ISVs) submitted for the Data Integrity and Confidentiality SBIR (N175-105) for MARCORSYSCOM in a highly-competitive bid for the award, and only three vendors were selected. Redwall was invited to submit a request for proposal based on prior knowledge by the U. S. Government of Redwall’s innovative data security technology from previous federal engagements with the Ohio-based ISV.
"We are honored to be awarded this Federal R&D work by SBIR," said John Rosenstengel, Redwall president and CEO. "Redwall is sort of like the BASF of data security throughout pockets of the Federal Government. We don’t make the devices that secure field operations for some military units and first responders, but we do make them more secure through our unique approach to securing mobile data."
The uniqueness of Redwall Mobile® resides in securing devices at the kernel, the intermediary code between device hardware and software. This approach is a departure from many competing security tools that operate at the application layer using a "sandbox" methodology to isolate applications and data within the operating system. A secure sandbox, or container, is created where corporate (or government) data and apps reside, while personal data and apps remain intact and unchanged. This dual-persona smartphone security method allows one smartphone to be used for both personal and business use.
The issue with the containerized, dual-mode method is the data left in memory on the device that is still accessible in both sandbox and personal-use mode. In this instance, true app/data isolation is not achieved because of the memory leakage.
The Redwall Mobile® method of hardening the smartphone at the kernel layer creates a purer and completely segmented system with multiple personas for both personal and business use. Redwall Mobile® uses cryptographic keys to isolate data and apps for each persona so that when the user changes from one persona to the next, there is no data leakage to memory; it is removed when the user leaves that persona.
"We are seeing more interest within Government agencies in our unique approach to data security," said Redwall Chief Technology Office Eric Üner. "With attackers now comprising military units of U.S. enemies, our cyber defense must now repel foreign enemy states in addition to rogue hackers. Through the SBIR, the Government is looking to the most innovative minds, and the commercial ISV community is a great start. We are honored with the invitation to submit a proposal for this work."
About Redwall Technologies LLC
Redwall Technologies was founded in 2013 by a group of defense and intelligence practitioners who had a common desire to secure mobile points of intrusion into government datacenters. Rather than looking at signatures of viruses already in circulation, Redwall founders developed their product on the premise of what would keep us from hacking into a device? Redwall founders leveraged their offensive expertise into a proactive approach to prevent their own white-hat hacker team from compromising a mobile device. This led to their development team building device-hardening tools for smartphones, tablets, and other connected devices such as those found in SCADA, CANBus, and similar networks
Redwall's unique, patented technology is typically installed at organizations whose users rely heavily on the highest levels of device performance and availability, while ensuring military-grade security. The prototypical Redwall Technology user is a first responder in a disaster zone or member of a military operations team engaging in matters of national security, whose field communications require adapting to fast-changing environments and threat landscapes. For more information on Redwall Technologies, please visit www.redwall.us.
For archived releases, or for press and media-related inquires, please contact firstname.lastname@example.org.
- Redwall Mobile security policies are field-updatable, but can also enforce minimal, immutable settings.
- Redwall's technology is not ITAR or CCI restricted, and we welcome inquiries from all US allies.
- Redwall Mobile security policies are simple to create, and can be edited using the policy server or with any JSON editing tool.
- Interested in partnering? Redwall frequently partners with both defense primes and other small businesses.
- Redwall works with industry partners to offer a variety of 8(a) contract vehicles.