Security and up-to-dateness of edge devices in the field
KontronOS guarantees the highest level of security and up-to-dateness of embedded hardware devices in the field - over the entire product life cycle.
The requirements for embedded devices with an existing IoT connection go far beyond security updates in the field. Whether it is the reliability and modifiability of the software, delta updates or low data consumption: With KontronOS, we deliver a hardened Linux®-based operating system for the reliable operation of customer applications in embedded devices that meets all these requirements.

KontronOS creates the necessary space for you to focus on your core competencies for your end products and applications: The fully automatic update function guarantees that the operating system is always up to date and secure - without the need for any intervention.
KontronOS has several possible integration levels that enable smooth interaction between the operating system and application. This includes not only the containerization of the software, but also separate partitions for the customer application and the integration of specific runtimes in smaller systems.

Digital security for embedded PCs
Digital security is of enormous importance for Embedded PCs: the growing number of autonomous devices without operators offers hackers a considerable attack surface. Different user groups have different needs and security requirements.
With KontronOS, we provide a customized Linux®-based operating system that is tailored to the individual requirements of your software and hardware. Especially for large numbers of devices, we guarantee that all devices in the field have the same software version despite different schedules and threat scenarios.

Managed service for secure and customized hardware configurations
By providing KontronOS as a managed service, we cover a wide range of hardware configurations for the most diverse requirements. In each case, various basic properties can be configured via a customizable web interface with the aim of minimizing service times. Automated penetration tests provide the necessary security.
In the event of zero-day exploits, vulnerabilities or threats, the system updates itself within a very short time. To avoid downtime in the event of any problems, it is possible to switch back to the last functioning version on the passive partition at any time. On this basis, KontronOS allows you to create a customized and secure operating system for your company's digital business cases.

Remoting - simple and efficient solution for digital remote access and maintenance
With Remoting, we offer the option of carrying out maintenance for industrial IoT systems around the clock - remotely and without fixed on-site appointments.
A networked working environment with low downtimes often requires direct access by specialists on site. With Remoting, we offer an integrated remote maintenance solution that does not require any additional software. The connection between the target machine and technician is established via a mobile device such as a smartphone or tablet, regardless of location. This means you receive immediate and uncomplicated support at all times.
Thanks to the direct integration of remoting into the products of the Kontron susietec®® toolset, we guarantee the appropriate rights and device management with the comprehensive KontronGrid fleet management solution. This ensures that only authorized persons have access to your devices. This function offers manufacturers greater security and control, especially when working with local service providers.

Managed service for secure, custom-built hardware configurations
Regardless of whether you want to test a new version of your container-based application or check your individually trained AI network:
Remoting provides direct access via the SSH console, the remote desktop or the configuration interface.
Our goal is to optimize your support and thus reduce costs for your end customers. Whether a simple debugging or the export of important data: Remoting is available to your service department around the clock for the maintenance of devices in the field.

Hardware
The most important questions about KontronOS
-
What are the potential risks of a network-based cyberattack?
At the heart of KontronOS is a read-only sector that cannot be changed. Access to the operating system is managed by assigning user and user rights. Each application is assigned specific user rights, which are very limited and restricted to only the necessary functions. In the production version, the bootloader and the operating system are hardened and reduced to the essentials.
-
Are there means and measures that prevent the user from accessing the underlying operating system from accessing the underlying operating system?
The KontronOS core is a read only sector that cannot be changed. Access to the operatingsystem is managed by assigning user user and user rights. Each application is assigned specific user rights, which are very limited and restricted to only the necessary functions. In the production version, the bootloader and the operating system are hardened and reduced to the essentials.
-
What are the risks if the web panel software is not maintained?
We maintain and service the. Webpanel software and KontronOS in general by releasing newupdates with corrections, security updates and functional improvements four times a year. If our customer does not use this updated software, he cannot benefit from the security updatesand other improvements. The risk is that security vulnerabilities are exploited and devices are compromised. Also, future regulations such as CRA (Cyber Resilience Act) may not becomplied with.
-
Are security patches recommended and provided? How are they installed? Support until when? What are the costs?
We strongly recommend that you install the security updates. Updates with integrated security patches are released published four times a year and provided as delta updates to reduce the data volume for LTE connections. The updates can be installed from the cloud or locally using a USB stick, for example. The update of our standard image runs via a service fee. Customer-specific adaptations or developments are offered separately.
-
Does the device have protection against network-based cyber attacks?
Yes, a firewall prevents uncontrolled access to the system. In addition, the system is protected by regular penetration tests against external attacks. These tests reveal possible security gaps in the system. We assess the risks and eliminate the critical security security problems in our KontronOS.
-
What are the potential risks of a network-based cyberattack?
If attackers gain access to the corporate network through devices, they can either encrypt corporate data and hold it for ransom, steal data, or perform negative actions such as disabling systems.
Your contact to our specialists for the susietec® toolset
Do you have questions about the susietec® service portfolio or need support in the analysis, planning and implementation of your digitalization strategy?
The susietec® experts accompany you step by step on the way to the digital transformation of your company - customer-specific, solution-oriented, success-oriented. We look forward to hearing from you!
Please contact us