Join the 1500 companies using G2 Track to manage SaaS spend, usage, contracts & compliance.

LynxOS RTOS

LynxOS is a deterministic, hard real-time operating system that provides POSIX-conformant APIs in a small-footprint embedded kernel. LynxOS provides symmetric multi-processing support to fully take advantage of multi-core/multi-threaded processors. LynxOS 7.0 includes new tool chains, debuggers and cross-development host support.

Work for LynxOS RTOS?

Learning about LynxOS RTOS?

We can help you find the solution that fits you best.

Find the Right Product

LynxOS RTOS Reviews

Chat with a G2 Advisor
Write a Review
Filter Reviews
Showing 0 LynxOS RTOS reviews
LinkedIn Connections

What IoT Security solution do you use?

Thanks for letting us know!

There are not enough reviews of LynxOS RTOS for G2 to provide buying insight. Below are some alternatives with more reviews:

1
Google Cloud IoT Core Logo
Google Cloud IoT Core
4.8
(5)
Google Cloud IoT Core is a fully managed service that allows users to easily and securely connect, manage, and ingest data from millions of globally dispersed devices.
2
Azure Sphere Logo
Azure Sphere
3.3
(2)
Azure Sphere is a new solution for creating highly-secured, Internet-connected microcontroller (MCU) devices. It provides a foundation of security and connectivity that allows you to create the intelligent products and experiences that customers love—and get them to market quickly—at a price point that enables the Internet of Things (IoT) at scale.
3
ioTrust IoT Security Logo
ioTrust IoT Security
4.5
(1)
Establish a connected ecosystem that is secure by design from device manufacturing through the entire IoT lifecycle. Accelerate IoT deployment and time-to-value by enabling a secure and trusted ecosystem of people, applications and things.
4
Symantec Critical System Protection Logo
Symantec Critical System Protection
4.0
(1)
Symantec Critical System Protection is a lightweight security client designed to secure the Internet of Things (IoT) by protecting the endpoint and embedded devices. It offers manufacturers and asset owners of embedded systems robust signatureless, host-based protection in managed and unmanaged scenarios, without compromising device performance.
5
Astek Logo
Astek
(0)
Astek is an IoT software that works closely with clients. It solves the internet of things (IoT) security issue.
6
Verizon IoT Security Credentialing Logo
Verizon IoT Security Credentialing
(0)
IoT Security Credentialing platform provides flexible tools and services for a comprehensive approach to maintain the security of your IoT apps and devices.
7
Spartan Logo
Spartan
(0)
SPARTAN is a family of digital authentication software modules for authenticating IoT endpoints, enabling anti-counterfeiting and anti-cloning. The SPARTAN products utilize Intrinsic ID's patented SRAM PUF technology to give microcontrollers and other semiconductors unique identities, which serve as the foundation for a security subsystem. SPARTAN is built on top of Intrinsic I's flagship BROADKEY software and enables a software approach for providing hardware-based security that can be implemented on virtually any CPU.
8
IoT Security Logo
IoT Security
(0)
To instill trust in the diverse IoT infrastructure, ZingBox invented the IoT personality-based approach to secure IoT. Each IoT device exhibits certain limited set of functions, flow and vulnerabilities regardless of where it is deployed, a.k.a IoT personality. This approach discerns each device's behaviors and detects any unusual activities to enforce trust amongst connected devices. Traditional security solutions focus on data protection; ZingBox goes further to provide service protection for business continuity.
9
Asavie Moda Logo
Asavie Moda
(0)
Control Mobile Data Securely on Cellular and Wi-Fi
10
Mocana Logo
Mocana
(0)
Mocana provides mission-critical IoT security solutions for embedded systems and the Internet of Things. Our software is used by hundreds of companies to secure millions of IoT endpoints, controllers and gateways. Our comprehensive device-to-cloud platform is designed to operate across complex, multi-vendor environments where performance and security are mission-critical.
Show more
Kate from G2

Learning about LynxOS RTOS?

I can help.
* We monitor all LynxOS RTOS reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. Validated reviews require the user to submit a screenshot of the product containing their user ID, in order to verify a user is an actual user of the product.