Exein Runtime
End-to-end security solution with AI integration and machine learning for IoT devices and embedded systems. On-device security that guarantees an ongoing threat monitoring and detection even without an internet connection. Written entirely in Rust, its core is built to be flexible, extensible, and easy to use.
Our brands
Our brands
Related articles
Cyber Resilience Act approved – Call to Action
On 10 October 2024, a new legislation, aimed at manufacturers, distributors and importers of hardware and software, was adopted by the Council of the European Union, aiming to ensure that...
Read more
Exein Partners with Logic Technology
Read more
eBook – Securing embedded & IoT systems
Read more
6 types of security testing for embedded and IoT systems
Read more
4 proven strategies for secure embedded and IoT devices
Read more
Exein Runtime
Exein Runtime is a state-of-the-art runtime threat detection and incident response solution for IoT systems, built on top of the open source IoT runtime security framework we have created.
The Exein Runtime Security solution provides many security features, including: deep observability on the network stack, file system access blocking and edge AI-based process behavior anomaly detection.
Exein Runtime includes a hardened distribution of Exein Pulsar, adds advanced observability and security workflows, and comes with 24/7 enterprise-grade support.
Designed for IoT
With technology designed for IoT and edge computing, Exein Runtime is optimized for performance and edge security.
The Runtime core agent is the heart of Exein Runtime system, and it is written entirely in Rust, a modern and secure language that allows for high performance even in constrained environments.
The modular design of the underlying Exein Runtime technology makes it extremely easy to customize the solution based on the specific use-case requirements, choosing the optimal trade off between observability and runtime cost.
Edge AI security
Exein Runtime leverages the fine-grained access to system activity (down to the syscall level) and our unique expertise in delivering Machine Learning based solutions on the Edge to detect and isolate anomalies in the behavior of each individual running process.
The proprietary process-anomaly module allows to protect the device from any statistically significant deviation of the process activity, securing the host device from both known and unknown threats.
Complete security observability
Block suspicious filesystem activity
Exein Runtime lets you track filesystem activity and block access to files with path based rules. In this way, you are always on top of suspicious activity inside the filesystem by monitoring all new files created, ELF opened or sensitive files deleted.
Detect suspicious network connections
By tracking connections, watching socket operations and parsing packets for DNS messages, Exein Runtime allows you to discover and immediately block any network threat.
Real Time Response
The threat-response module can block any malicious process in real time, without the need for external connectivity or further action, ensuring the device is always self-protected.
The threat response actions are completely customisable and defined based on the appropriate threat model: from process termination to dynamic firewalling, alerting and logging.
Built on open foundations
We believe security needs to be open and transparent in order to be truly effective.
That’s why we have open sourced the core technology underpinning Exein Runtime - the Exein Pulsar framework.
Open sourcing the key technological components of Exein Runtime guarantees that you know exactly what you are installing on your devices and ensures that the source code is maintained and controlled actively every day by a community of IoT security experts.
Integrations ecosystem
Integrating Exein Runtime inside pre-existing IoT management systems is easy and fast, enabling advanced runtime protection for your devices in days, instead of months.
With native support for the most commonly used SIEM and SOAR systems, Exein Runtime allows you to export rich identity-aware events to your preferred destination without sacrificing performance and valuable compute resources. Flexible filtering gives you full control over what data to export and how much bandwidth you use.
Technical requirements
Memory and storage
Depending on the underlying security engine used, Exein Runtime requires 15 MB of available memory and 2 MB of free hard disk space.*
Architectures
Exein Runtime supports the most common embedded Linux distributions and hardware architectures, including X86_64, X86, Aarch64, RiscV64, ARM and MIPS, with more platforms to come.
Minimum kernel version
A minimum kernel version of 3.0 is required
to run the Exein Runtime security framework.**
* For the best performance, we recommend 90 MB of free memory and 22 MB of hard disk space.
So that more security modules can be enabled.
** A minimum kernel version of 5.5 with BPF and BTF enabled is required to run some
of the advanced security modules.
Gevorg Melikdjanjan
Security | Reliability | Data Solutions
Be CRA Compliant
The Cyber Resilience Act forces device manufacturers to produce secure products. Our software solution meets these requirements and more!
Free Consultation