Secure64
   HOME

TheInfoList



OR:

Secure64 Software Corporation is a software development company headquartered in
Fort Collins A fortification is a military construction or building designed for the defense of territories in warfare, and is also used to establish rule in a region during peacetime. The term is derived from Latin ''fortis'' ("strong") and ''facere'' ...
, CO, USA, building server applications.


History

Secure64 was founded in 2002 and began full-scale development in 2005. Its founders include Bill Worley, CTO, a former chief scientist of
Hewlett Packard The Hewlett-Packard Company, commonly shortened to Hewlett-Packard ( ) or HP, was an American multinational information technology company headquartered in Palo Alto, California. HP developed and provided a wide variety of hardware components ...
and lead developer of
PA-RISC PA-RISC is an instruction set architecture (ISA) developed by Hewlett-Packard. As the name implies, it is a reduced instruction set computer (RISC) architecture, where the PA stands for Precision Architecture. The design is also referred to as ...
and PA-WideWord technologies. Secure64 has filed for several
patent A patent is a type of intellectual property that gives its owner the legal right to exclude others from making, using, or selling an invention for a limited period of time in exchange for publishing an enabling disclosure of the invention."A p ...
s.{{Citation , last=Clark , first=Don , title=Chips' Security Capabilities Expand , newspaper=The Wall Street Journal , date=March 22, 2007 Secure64 builds DNS appliance with Itanium server – Network World
/ref>


Technology


SourceT Micro OS

The SourceT Micro OS executes on standard
Itanium Itanium ( ) is a discontinued family of 64-bit Intel microprocessors that implement the Intel Itanium architecture (formerly called IA-64). Launched in June 2001, Intel marketed the processors for enterprise servers and high-performance computin ...
server hardware, and provides the foundation for Secure64
software application Software is a set of computer programs and associated documentation and data. This is in contrast to hardware, from which the system is built and which actually performs the work. At the lowest programming level, executable code consists ...
s. Secure64 uses the term "micro OS" to describe SourceT, because, although it shares attributes of traditional
microkernel In computer science, a microkernel (often abbreviated as μ-kernel) is the near-minimum amount of software that can provide the mechanisms needed to implement an operating system (OS). These mechanisms include low-level address space management, ...
s and
monolithic kernel A monolithic kernel is an operating system architecture where the entire operating system is working in kernel space. The monolithic model differs from other operating system architectures (such as the microkernel architecture) in that it alone ...
s, it does not fit the classical definition of either. Like microkernels, SourceT adheres to the principles that minimal code should execute in kernel mode (currently less than 4,000 lines of code in SourceT), and that all applications and operating system services such as
File system In computing, file system or filesystem (often abbreviated to fs) is a method and data structure that the operating system uses to control how data is stored and retrieved. Without a file system, data placed in a storage medium would be one larg ...
,
device drivers In computing, a device driver is a computer program that operates or controls a particular type of device that is attached to a computer or automaton. A driver provides a software interface to hardware devices, enabling operating systems and ot ...
and
protocol stack The protocol stack or network stack is an implementation of a computer networking protocol suite or protocol family. Some of these terms are used interchangeably but strictly speaking, the ''suite'' is the definition of the communication protoco ...
s should not execute in kernel mode. However, like monolithic kernel architectures, SourceT's operating system services are accessed through system service calls rather than through
interprocess communication In computer science, inter-process communication or interprocess communication (IPC) refers specifically to the mechanisms an operating system provides to allow the processes to manage shared data. Typically, applications can use IPC, categori ...
with user-mode servers. Unlike general-purpose
operating system An operating system (OS) is system software that manages computer hardware, software resources, and provides common services for computer programs. Time-sharing operating systems schedule tasks for efficient use of the system and may also in ...
s, which are designed to execute on a wide variety of hardware platforms, SourceT was specifically designed to take advantage of some of the unique security and performance features of the Itanium microprocessor to create a high performance, highly secure architecture. These unique Itanium features include: *Completely independent read/write/execute privileges on memory pages *Hardware controlled memory compartments with protection IDs *Separation of control information from data on system stacks *Inability to execute code from system stacks *High performance from
instruction-level parallelism Instruction-level parallelism (ILP) is the parallel or simultaneous execution of a sequence of instructions in a computer program. More specifically ILP refers to the average number of instructions run per step of this parallel execution. Discu ...


Self-Protecting Network Stack

Secure64 has a patent pending for the queued, non-blocking and self-protecting communications architecture used by SourceT. Designed from the ground up with a queued, scalable architecture that differs significantly from a traditional
Berkeley sockets Berkeley sockets is an application programming interface (API) for Internet sockets and Unix domain sockets, used for inter-process communication (IPC). It is commonly implemented as a library of linkable modules. It originated with the 4.2BSD Un ...
architecture, the network stack accelerates network I/O performance and automatically detects and drops malformed or flooding packets, such as those received as the victim of a
Denial-of-service attack In computing, a denial-of-service attack (DoS attack) is a cyber-attack in which the perpetrator seeks to make a machine or network resource unavailable to its intended users by temporarily or indefinitely disrupting services of a host connect ...
s.


Products

Secure64 DNS products are
security Security is protection from, or resilience against, potential harm (or other unwanted coercive change) caused by others, by restraining the freedom of others to act. Beneficiaries (technically referents) of security may be of persons and social ...
-hardened commercial
DNS The Domain Name System (DNS) is a hierarchical and distributed naming system for computers, services, and other resources in the Internet or other Internet Protocol (IP) networks. It associates various information with domain names assigned to ...
appliances, deployed on a proprietary
64-bit In computer architecture, 64-bit Integer (computer science), integers, memory addresses, or other Data (computing), data units are those that are 64 bits wide. Also, 64-bit central processing unit, CPUs and arithmetic logic unit, ALUs are those ...
operating system An operating system (OS) is system software that manages computer hardware, software resources, and provides common services for computer programs. Time-sharing operating systems schedule tasks for efficient use of the system and may also in ...
running on
Intel Intel Corporation is an American multinational corporation and technology company headquartered in Santa Clara, California. It is the world's largest semiconductor chip manufacturer by revenue, and is one of the developers of the x86 seri ...
Itanium Itanium ( ) is a discontinued family of 64-bit Intel microprocessors that implement the Intel Itanium architecture (formerly called IA-64). Launched in June 2001, Intel marketed the processors for enterprise servers and high-performance computin ...
hardware. Some of these products include: * Authoritative DNS server, Secure64 DNS Authority * Caching DNS server, Secure64 DNS Cache * DNS Network Management, Secure64 DNS Manager * DNSSEC, Secure64 DNS Signer * DNS-based Network Security, Secure64 DNS Guard


References


See also

*
Comparison of DNS server software This article presents a comparison of the features, platform support, and packaging of many independent implementations of Domain Name System (DNS) name server software. Servers compared Each of these DNS servers is an independent implementati ...
Software companies established in 2002 Software companies based in Colorado Companies based in Fort Collins, Colorado Server appliance DNS software Software companies of the United States