Archived News

Older news articles

On this page we collect older news snippets that aren’t really news anymore. Please find current news articles on our Home page.

L4Re-based mobile security solutions nominated for German Prize for IT Security 2014
May 2014

The L4Re-based mobile security solution co-developed by TU Dresden, T-Systems, Trust2Core, and Kernkonzept has been selected as a nominee for the Fifth German Prize for IT Security 2014. The winner will be announced at a ceremony in Bochum on October 23.

L4Re-based SiMKo 3 security smartphone wins BSI approval for classified data
September 2013

The German Federal Office for Information Security (BSI) has approved T-Systems’ SiMKo 3 security smartphone for processing and transmitting classified data (up to level VS-NfD [restricted]).

SiMKo 3 is based on Kernkonzept’s L4Re microkernel and runtime environment. Kernkonzept has been working with T-Systems and Trust2Core, a T-Labs venture, on creating SiMKo 3’s secure operating system. (Deutsche Telekom press release)

Kernkonzept presents at the BSI IT security congress 2013
May 2013

Michael Hohmuth’s talk at the 13. Deutscher IT-Sicherheitskongress presented L4Re as an isolation and access-control solution for systems that need to be secure, yet user friendly and flexible. (Slides)

CeBIT 2013: T-Systems and genua present L4Re-based secure IT solutions
March 2013

At this year’s CeBIT, T-Systems and genua unveiled two exciting products that use L4Re technology.

T-Systems showed a prototype of SiMKo 3, a full-featured smartphone intended for secure communication in government applications. L4Re is used as a secure virtualization layer isolating two Android instances – an open one used for browsing the web and running user application, and a secure one intended for intranet applications and secure communication.

genua presented a prototype of vs-top, a Windows 7 laptop computer with a trustworthy remote-VPN access component. Windows runs in a isolated virtual machine on top of L4Re. The secure VPN components run in an isolated L4 compartment, unperturbed even when the entire Windows system happens to be compromised.

Follow us