Secure Embedded Data Management for a Connected World

Embedded developers across a range of industries rely on ITTIA’s database software development kit (SDK) to develop reliable, scalable, and secure systems. ITTIA has a rich history of innovation and organic growth as a data management company. The company’s platform-independent, safe, secure database software for embedded and Internet-of-Things MCUs and MPUs offer industry-leading benefits, including exceptional technical support, scalability, efficiency, excellent performance, and low total cost of ownership. ITTIA offers products for two different device classes: ITTIA DB SQL and ITTIA DB IoT.

ITTIA’s next generation embedded database technology, ITTIA DB SQL, delivers capabilities culminated from decades of database evolution in a compact, self-managing package. It is used in applications such as medical devices, industrial automation, portable data terminals, consumer electronics, network appliances, and automotive systems. It has enabled manufacturers to leverage enterprise data management features on embedded systems and IoT edge devices across product lines with desired operating systems and hardware.

ITTIA DB IoT for MCUs is a time series embedded database for data processing and data management on devices running real time operating systems (RTOS). This database technology is suitable for device applications that require fast response to process data, such as events and alarms, that both push and pull updates. ITTIA DB IoT offers developers to benefit from their existing database familiarity with traditional database systems.

Everything you need in a time-series database to create embedded DataOps applications

ITTIA DB Is the Secure Time Series Embedded Database for Developers

The ITTIA DB product family includes ITTIA DB IoT and ITTIA DB SQL.ITTIA DB IoTis a small footprint embedded database for real-time resource-constrained 32-bit microcontrollers (MCUs) andITTIA DB SQLis a high-performance time-series embedded database for single or multicore microprocessors (MPUs) that enable devices to monitor, process, and store real-time data.

ITTIA database, the leading smart edge data management platform, provides best-in-class security, performance and ease of development.

INDUSTRIES

Products

Stream, Store, and Make Sense of Embedded Systems’ Time-Series Data

ITTIA DB SQL is a high-performance time-series embedded database for single or multicore microprocessors (MPUs) that enable embedded systems and the Internet of Things, IoT, devices to monitor, process, and store real-time data. This secure embedded database for edge computing combines capabilities such as real-time data storage and management, data streaming, high-level security, and high availability.

ITTIA DB SQL data processing empowers the developers of applications for mission-critical embedded systems to overcome latency and bandwidth performance constraints. From the ground up, ITTIA DB SQL is designed to provide database capabilities to C/C++ application developers for embedded systems and devices, without requiring complex installation or administration tools.

The ITTIA DB Real-Time Event Streaming Engine Is Built for Secure Data Aggregation

ITTIA DB SQL is efficient and offers filtering and processing of real-time embedded systems data. One of its advantages is integrated device data processing with data management, for embedded systems applications to filter and process data originating from a complex flow of data events. Its special data processing capabilities empower sensors and devices to make sense of every bit of raw data, identify alarming events, and store meaningful information.

With a massive volume of data flowing in real-time, ITTIA DB SQL data processing capabilities enable edge applications to analyze data, perform continuous SQL queries, and configure data distribution. ITTIA DB SQL is scalable to any number of edge devices, so edge applications can capture data flows from multiple sources, analyze data, and emit valuable findings as events.

ITTIA DB SQL data management capabilities offer benefits in its modular architecture that enables developers to create highly optimized and reliable systems to store, manage, and distribute data.

TTIA SDL is Conformant to the Principles of IEC/ISO 62443

ITTIA security practices and features assist manufacturers of IoT edge devices with advanced and integrated software development methods, infused by a secure development life cycle based on zero trust principles, enabling makers of IoT edge devices to mitigate unpredictability. From product conception to end-of-life, ITTIA adheres to a secure-by-design development methodology, and ITTIA DB offers a complete solution to secure data on IoT devices.

ITTIA DB SQL security protocols are the ideal protection for embedded systems data. Security offering includes support for encryption, and authentication, Security Expert Agent Library, known as DB SEAL monitors and safeguards database responsibilities, input, and data metrics in real-time. ITTIA SDL is Conformant to the Principles of IEC/ISO 62443.

Easy to prototype, Easy to Build and Easy to Deploy

ITTIA DB Console is a modern database cockpit interface for developers to design, manage, and monitor embedded database and data processing activities. Software designers benefit from an intuitive visual dashboard to prototype table schemas, generate experimental data in real time, and test SQL queries on desired target MCUs and MPUs from the convenience of any modern web browser.

With ITTIA DB Console, developers can: execute SQL statements and queries, monitor schema definitions, describe tables and sequences, monitor table structures and content (columns, fields, indexes, etc.), monitor status of the buffer manager, CPU overhead, and memory overhead, monitor and configure replication settings for both databases and tables, and import and export data in XML and JSON formats.

Applications developed with ITTIA DB Console experience fast time-to-market. Before writing a single line of source code, developers use ITTIA DB Console to familiarize themselves with the data management and processing capabilities of the target environment.

Embedded Database Feature, APIs & More

ITTIA DB SQL with multiversion concurrency control (MVCC) offers modern concurrent database access, real-time multithreading, and multiprocessing, as well as a variety of other advanced capabilities, such as:

  • Time Series
  • Data Streaming
  • Database for MPUs
  • Database for MCUs
  • DB Console Web Cockpit
  • Import/Export Utilities
  • Real-time Scalability
  • SQL
  • Embeddable
  • Security
  • Data Concurrency
  • ACID Compliance
  • Disaster Recovery
  • Database Security Agent
  • AES Encryption
  • Authentication
  • Secure Remote Access
  • Referential Integrity
  • High Availability
  • On-Disk and In-Memory Storage
  • Multi-Version Concurrency Control
  • Cross-platform for RTOS
  • Strong Data Type Support
  • Advanced BLOB Support
  • Unicode Support
  • Alter Schema
  • Data Replication

Cross Platform Freedom for Single and Multicore Support?

ITTIA DB SQL is a reliable database for a variety of mission-critical systems. Products built with it are fast and scalable and run on modern operating systems, or even with a custom file system and no operating system.

The IoT-focused architecture of ITTIA DB SQL offers data processing and management for single and multicore processors of embedded systems. ITTIA DB SQL supports embedded and real-time applications that use either Asymmetrical Multiprocessing (AMP) or Symmetrical Multiprocessing (SMP). With ITTIA DB SQL, developers of embedded system applications can select the single or multiprocessing that is right for their application.

Database Support for a Variety of Processors and Boards

ITTIA databases support various hardware architectures, including Arm, Intel, and PowerPC. With support for industry-leading commercial off-the-shelf (COTS) Board Support Packages (BSP), ITTIA DB SQL builds and supports different package requirements. ITTIA DB SQL is cross-platform and supports processor families from leading manufacturers, including Altera, AMD, ARM, Broadcom, Intel, NXP, Renesas, STMicroelectronics, Texas Instruments, and Xilinx.

Technical Support and Consulting

The ITTIA Technical Support team provides dependable, world-class support. To ensure that our customers are successful with long-term development and deployment, ITTIA offers continuous access to software patches, enhancements, upgrades, and experienced risk management advice.

Many of the world’s most recognized organizations rely on ITTIA technical assistance to save development time and cost when building mission-critical systems. Customer success and satisfaction are ITTIAs number one goal.

Are you ready to experience the full potential of ITTIA DB SQL?

Monitor, Store, and Act on Real-Time Data Metrics, Logs, and Events

ITTIA DB IoT for MCUs is a time series data management platform for real time IoT data processing and management. IoT devices benefit from ITTIA DB IoT stream processing capabilities to gain rapid insights from large volumes of raw data, separate and store valuable information, and act. This modern data management technology is suitable for device applications that require a fast response to process data, such as events and alarms, that both push and pull updates. ITTIA DB IoT is architected for sensors to process streams of time-series data and enables devices to separate valuable information from massive raw data by monitoring, collecting, processing, and running embedded continuous queries.

Advantages of ITTIA DB IoT include stream data processing and real-time data management for edge applications, to filter and process data originating from a complex flow of data events. Its special data processing capabilities empower smart sensors and devices to make sense of every bit of raw data and identify alarming information.

With a massive volume of data flowing in real-time, ITTIA DB IoT data processing capabilities enable edge applications to analyze data and perform continuous analysis. ITTIA DB IoT is scalable to any number of edge devices, so edge applications can capture data flows from multiple sources, analyze data, and emit valuable findings as events.

The ITTIA DB IoT Real-Time Event Streaming Engine Is Designed for Secure Data Aggregation

ITTIA DB IoT is a powerful tool for aggregating, filtering and processing data from real-time embedded systems. One of its unique advantages is integrated device data processing to aggregate raw data originating from a complicated flow of events. Sensors and devices can make sense of every bit of raw data, identify alarming occurrences, and save relevant data.

ITTIA SDL is Conformant to the Principles of IEC/ISO 62443

ITTIA security practices and features assist manufacturers of IoT edge devices with advanced and integrated software development methods, infused by a secure development life cycle based on zero trust principles, enabling makers of IoT edge devices to mitigate unpredictability. From product conception to end-of-life, ITTIA adheres to a secure-by-design development methodology, and ITTIA DB offers a complete solution to secure data on IoT devices.

ITTIA DB IoT security protocols are the ideal protection for embedded systems data. Security offering includes support for encryption and authentication, Security Expert Agent Library, known as DB SEAL monitors and safeguards database responsibilities, input, and data metrics in real-time. ITTIA SDL is Conformant to the Principles of IEC/ISO 62443.

Small Memory Footprint?Database for Constrained IoT Devices

Embedded systems generally have limited memory, and ITTIA DB IoT is designed to minimize both ROM and RAM memory overhead to assure devices experience the best performance. ITTIA DB IoT is scalable for various MCUs and its modular architecture enables developers to create highly optimized and reliable systems with a low memory footprint.

Time Series Database for MCUs

With ITTIA DB IoT high-performance embedded database inside, even low-frequency microcontroller devices can ingest tens of thousands of sensor data points per second, directly onto local flash media. With such a fast ingestion rate, embedded IoT systems are able to rapidly monitor, query, and analyze data to identify interesting and alarming information right where it originates. This precision in data processing and management makes ITTIA DB IoT an ideal choice for various markets, including industrial automation, automotive, medical devices, robotics, and smart machines.

Secure MCU Data

Physical assaults that directly target the device data, as well as communication attacks between IoT devices and attacks on the database, all require attention. ITTIA DB IoT data security offers data protection against malicious attacks and is the ideal protection for embedded systems and connected IoT devices because it offers unique real-time data protection through encryption and authentication.

Support for a Variety of Processors and Boards

ITTIA DB IoT offers portable APIs across the most desired real-time operating systems and hardware. ITTIA supports a variety of 32-bit Arm cores from major semiconductor vendors and selected 64-bit Arm cores. Instead of writing fresh code for each port, database code is reusable, which saves development time and maintenance costs.

Technical Support and Consulting

The ITTIA Technical Support team provides dependable, world-class support. To ensure that our customers are successful with long-term development and deployment, ITTIA offers continuous access to software patches, enhancements, upgrades, and experienced risk management advice.

Many of the world’s most recognized organizations rely on ITTIA technical assistance to save development time and cost when building mission-critical systems. Customer success and satisfaction are ITTIAs number one goal.

ITTIA SDL Is Conformant to the Principles of IEC/ISO 62443

ITTIA DB security shields edge devices; manufacturers thrive under certainty

ITTIA security practices and features assist manufacturers of IoT edge devices with advanced and integrated software development methods, infused by a secure development life cycle based on zero trust principles, enabling makers of IoT edge devices to mitigate unpredictability. From product conception to end-of-life, ITTIA adheres to a secure-by-design development methodology, and ITTIA DB offers a complete solution to secure data on IoT devices.

ITTIAs Solution for Data Management Threats

In general, devices must be open to data collecting and sharing, and this is where the danger lies. Because embedded system security mandates the protection of sensitive data throughout the device’s life cycle, secure storage and transmission become vital. As a result, a multi-dimensional security technique is required for device internal data management, data protection risks, attack taxonomy, and system vulnerabilities.

Data encryption, authentication, ITTIA DB Security Expert Agent Library (DB-SEAL), and consulting to support hardware security modules are among the security features offered by ITTIA. From a business standpoint, ITTIA is open to communicate its confidential data security policies and practices with customers.

SQL injections are one of the most prevalent database attacks. The injection of malicious code into the device and the execution of malicious queries are two examples. SQL control hijacking is a form of attack that diverts the normal control flow of the programs running on the device, usually resulting in the hacker injecting SQL code.

SQL code execution is a method by which attackers feed code to an embedded device, such as web scripts and SQL injections, that is not native to the device’s application. These attacks result in a variety of issues, including integrity violations, which are a regular side effect of new codes on a device’s database. This assault could result in changes to configuration settings, data, or even firmware updates that aren’t legal. In extreme situations, the effect may even result in the disclosure of sensitive information.

ITTIA Secure Development Lifecycle Overview

In the embedded world, it is vital that organizations can deploy their solutions knowing that the technology they rely on is developed with security at the forefront. To help ensure this level of confidence, ITTIA has embedded security awareness and practices throughout product development. This is achieved through the ITTIA Secure Development Lifecycle (ITTIA SDL.)

  • Security Planning Security planning and training
  • Threat Model Identify and prioritize product security risks
  • Secure Design Security considerations are built in by design
  • Secure Coding Static analysis and coding standards
  • Security Testing Vulnerability and penetration testing
  • Incident Response Vulnerability handling and communication

Security Planning

The planning phase is critical to gain an overview of security needs for products, development environment, and personnel. Security planning encompasses developertrainingon best practices for secure design and coding. It also includes defining overall productsecurityrequirementsspanning across features, validation, and tools. Clearrolesare established, ensuring separation between security development vs. validation activities. Lastly, part of the planning is to validate system and developmentinfrastructuremeets stringent security requirements.

Threat Model

Security threat modeling allows us to identify potential security risks and gives us a better understanding of the products attack surface and threat boundaries. The threat model evolves as capabilities are added, modified, or removed in product releases.

Our developers leverage the use ofthreat modeling toolsto generate information around security risks. This information allows us to create and implement strategies to address these risks and reduce the product attack surface. It also serves as the reference to continuously adapt the security testing aspects of the product.

Secure Design

Product security is enhanced significantly when security considerations are reviewed and identified in the earliest phase of feature development. All new product requirements include a review of security impacts andbest practices.

It is critical to protect sensitive data in a data management system from unintended disclosure and alteration. We use and provide a variety ofencryptionstandards to protect against unauthorized access and modification of the data. Our proprietarysecurity expert agentcan also be used to train the system on normal device data management behavior before deployment. The system is then able to react and stop any unfamiliar attempt in accessing the data.

We enforce stringent criteria when considering the use of anythird-party softwarein our products. Any proposed third-party software usage is reviewed before selection to ensure they meet the security requirements of the system. Third-party software is also covered by our security incident response policy.

Secure Coding

We usestatic analysistools during development to analyze weaknesses in the code that might lead to vulnerabilities. Examples include dangerous inputs and buffer overflows, among others. Our product APIs are designed to enforce safe practices in application code that uses our software libraries. The APIs check that the application binds the right size buffers for each database type. We follow updatedcoding standardsfor the programming languages used in the product. These standards are checked through code analysis tools. All development is performed and stored insecured source controlrepositories. This also allows our software developers to perform peer reviews that help strengthen the quality and security of the code.

Security Testing

Our securityvulnerability testingenhances the resiliency of our products against potential attacks. We combine feature robustness testing with the use of tools that test for common attacks and scans. Our securitypenetration testingteam performs various scenarios, leveraging various tools, to simulate the actions of potential attackers. The objective is to uncover coding and operational weaknesses in the products.Fuzz testingis used to ensure our capabilities and interfaces are resilient when injected with invalid, malformed, or unpredictable inputs and stress.

Incident Response

A critical component to any secure development lifecycle is having a well-documented security incident response policy that is followed. Our security incident response policy ensures customers and organizations canreportpotential vulnerabilities to us. We also activelymonitor and assesswell-known vulnerabilities that are publicly reported. In the case our products are confirmed to be vulnerable to a security incident, our security response team will strive to providecorrective actionas quickly as possible. The team will also ensure effectivecommunicationof incident status and remediation through all appropriate channels.

Reporting a Security Vulnerability

In the event where a security vulnerability is found in any of our products, we ask that you report to us as soon as possible. ITTIA has established an email address that should be used to report vulnerabilities. Please send a full description of the vulnerability, instructions to reproduce, and product information tosecurity@ittia.com. Please include all relevant details as far as software and hardware configuration.

Getting Started

During the software development process, ITTIA DB professionals help customers identify and prioritize the required edge device data security relevant to individual applications, as well as offer training on ITTIA DB security features and security practices.

THE NEXT GENERATION OF EMBEDDED SYSTEMS DATA MANAGEMENT

Data processing and data management are changing rapidly as embedded systems evolve and gain intelligence. Are you familiar with the new data management and data security threats for developing new embedded systems in the IoT and digital transformation era? Our goal with our next webinar is to provide developers working on mission-critical embedded systems with important data management and security knowledge and expertise.

TIME SERIES DATABASE FOR STM32 MCUS

Mission-critical applications built on MCU hardware face many data processing and data management challenges, from performance optimization and scalability to security and data maintenance costs. Our modern joint solution, a compact, high-performance database engine, solves these obstacles on supported STM32 MCUs and reduces total cost of ownership (TCO.) In this thirty minute session, learn how manufactures are enabled to meet these challenges and monitor, process and manage a large volume of time series data quickly and efficiently, in real time, directly on IoT nodes.

HOW TO BUILD INDUSTRIAL IOT EDGE DEVICE DATA MANAGEMENT

Industrial Automation systems run on data and manufacturers that drive new innovations must embrace data processing, and data management. IIoT systems need to collect, monitor, and understand massive raw data to capture important events for autonomous actions. In this live webinar demonstration, you will learn software development options for industrial edge device data management to retain competitive differentiation.