Secure64 Software Corporation is a software development company headquartered in
Fort Collins
A fortification is a military construction or building designed for the defense of territories in warfare, and is also used to establish rule in a region during peacetime. The term is derived from Latin ''fortis'' ("strong") and ''facer ...
,
CO, USA, building server applications.
History
Secure64 was founded in 2002 and began full-scale development in 2005. Its founders include Bill Worley, CTO, a former chief scientist of
Hewlett Packard
The Hewlett-Packard Company, commonly shortened to Hewlett-Packard ( ) or HP, was an American multinational information technology company headquartered in Palo Alto, California. HP developed and provided a wide variety of hardware components ...
and lead developer of
PA-RISC
PA-RISC is an instruction set architecture (ISA) developed by Hewlett-Packard. As the name implies, it is a reduced instruction set computer (RISC) architecture, where the PA stands for Precision Architecture. The design is also referred to a ...
and PA-WideWord technologies. Secure64 has filed for several
patent
A patent is a type of intellectual property that gives its owner the legal right to exclude others from making, using, or selling an invention for a limited period of time in exchange for publishing an sufficiency of disclosure, enabling disclo ...
s.
[{{Citation
, last=Clark
, first=Don
, title=Chips' Security Capabilities Expand
, newspaper=The Wall Street Journal
, date=March 22, 2007
]Secure64 builds DNS appliance with Itanium server – Network World
/ref>
Technology
SourceT Micro OS
The SourceT Micro OS executes on standard Itanium
Itanium ( ) is a discontinued family of 64-bit Intel microprocessors that implement the Intel Itanium architecture (formerly called IA-64). Launched in June 2001, Intel marketed the processors for enterprise servers and high-performance comp ...
server hardware, and provides the foundation for Secure64 software application
Software is a set of computer programs and associated documentation and data. This is in contrast to hardware, from which the system is built and which actually performs the work.
At the lowest programming level, executable code consists ...
s. Secure64 uses the term "micro OS" to describe SourceT, because, although it shares attributes of traditional microkernel
In computer science, a microkernel (often abbreviated as μ-kernel) is the near-minimum amount of software that can provide the mechanisms needed to implement an operating system (OS). These mechanisms include low-level address space management, ...
s and monolithic kernel
A monolithic kernel is an operating system architecture where the entire operating system is working in kernel space. The monolithic model differs from other operating system architectures (such as the microkernel architecture) in that it alone d ...
s, it does not fit the classical definition of either.
Like microkernels, SourceT adheres to the principles that minimal code should execute in kernel mode (currently less than 4,000 lines of code in SourceT), and that all applications and operating system services such as File system
In computing, file system or filesystem (often abbreviated to fs) is a method and data structure that the operating system uses to control how data is stored and retrieved. Without a file system, data placed in a storage medium would be one lar ...
, device drivers
In computing, a device driver is a computer program that operates or controls a particular type of device that is attached to a computer or automaton. A driver provides a software interface to hardware devices, enabling operating systems and o ...
and protocol stack
The protocol stack or network stack is an implementation of a computer networking protocol suite or protocol family. Some of these terms are used interchangeably but strictly speaking, the ''suite'' is the definition of the communication protoco ...
s should not execute in kernel mode. However, like monolithic kernel architectures, SourceT's operating system services are accessed through system service calls rather than through interprocess communication
In computer science, inter-process communication or interprocess communication (IPC) refers specifically to the mechanisms an operating system provides to allow the processes to manage shared data. Typically, applications can use IPC, categoriz ...
with user-mode servers.
Unlike general-purpose operating system
An operating system (OS) is system software that manages computer hardware, software resources, and provides common daemon (computing), services for computer programs.
Time-sharing operating systems scheduler (computing), schedule tasks for ef ...
s, which are designed to execute on a wide variety of hardware platforms, SourceT was specifically designed to take advantage of some of the unique security and performance features of the Itanium microprocessor to create a high performance, highly secure architecture. These unique Itanium features include:
*Completely independent read/write/execute privileges on memory pages
*Hardware controlled memory compartments with protection IDs
*Separation of control information from data on system stacks
*Inability to execute code from system stacks
*High performance from instruction-level parallelism
Instruction-level parallelism (ILP) is the parallel or simultaneous execution of a sequence of instructions in a computer program. More specifically ILP refers to the average number of instructions run per step of this parallel execution.
Dis ...
Self-Protecting Network Stack
Secure64 has a patent pending for the queued, non-blocking and self-protecting communications architecture used by SourceT. Designed from the ground up with a queued, scalable architecture that differs significantly from a traditional Berkeley sockets
Berkeley sockets is an application programming interface (API) for Internet sockets and Unix domain sockets, used for inter-process communication (IPC). It is commonly implemented as a library of linkable modules. It originated with the 4.2BS ...
architecture, the network stack accelerates network I/O performance and automatically detects and drops malformed or flooding packets, such as those received as the victim of a Denial-of-service attack
In computing, a denial-of-service attack (DoS attack) is a cyber-attack in which the perpetrator seeks to make a machine or network resource unavailable to its intended users by temporarily or indefinitely disrupting services of a host conn ...
s.
Products
Secure64 DNS products are security" \n\n\nsecurity.txt is a proposed standard for websites' security information that is meant to allow security researchers to easily report security vulnerabilities. The standard prescribes a text file called \"security.txt\" in the well known locat ...
-hardened commercial DNS
The Domain Name System (DNS) is a hierarchical and distributed naming system for computers, services, and other resources in the Internet or other Internet Protocol (IP) networks. It associates various information with domain names assigned to ...
appliances, deployed on a proprietary 64-bit
In computer architecture, 64-bit integers, memory addresses, or other data units are those that are 64 bits wide. Also, 64-bit CPUs and ALUs are those that are based on processor registers, address buses, or data buses of that size. A comp ...
operating system
An operating system (OS) is system software that manages computer hardware, software resources, and provides common daemon (computing), services for computer programs.
Time-sharing operating systems scheduler (computing), schedule tasks for ef ...
running on Intel
Intel Corporation is an American multinational corporation and technology company headquartered in Santa Clara, California, Santa Clara, California. It is the world's largest semiconductor chip manufacturer by revenue, and is one of the devel ...
Itanium
Itanium ( ) is a discontinued family of 64-bit Intel microprocessors that implement the Intel Itanium architecture (formerly called IA-64). Launched in June 2001, Intel marketed the processors for enterprise servers and high-performance comp ...
hardware. Some of these products include:
* Authoritative DNS server, Secure64 DNS Authority
* Caching DNS server, Secure64 DNS Cache
* DNS Network Management, Secure64 DNS Manager
* DNSSEC, Secure64 DNS Signer
* DNS-based Network Security, Secure64 DNS Guard
References
See also
* Comparison of DNS server software
This article presents a comparison of the features, platform support, and packaging of many independent implementations of Domain Name System (DNS) name server software.
Servers compared
Each of these DNS servers is an independent implementat ...
Software companies established in 2002
Software companies based in Colorado
Companies based in Fort Collins, Colorado
Server appliance
DNS software
Software companies of the United States