List of Wind River Workbench Integrations
This is a list of platforms and tools that integrate with Wind River Workbench. This list is updated as of April 2025.
-
1
VxWorks
Wind River
Unmatched performance and security for critical embedded systems.VxWorks® stands out as a premier real-time operating system, offering essential performance, reliability, safety, and security features vital for embedded computing systems in critical infrastructure. As a preemptive and deterministic RTOS, VxWorks is specifically designed to support real-time embedded applications, boasting low latency and minimal jitter. It incorporates a variety of robust security measures that effectively tackle the evolving threats faced by connected devices, ensuring protection from boot-up through operation and even during data transfer when powered off. Furthermore, VxWorks has achieved certification in stringent safety standards such as IEC 61508, ISO 26262, and DO-178C. Its architecture is not only extensible but also future-proof, enabling organizations to swiftly adapt to changing market dynamics, evolving customer needs, and technological innovations while safeguarding their investments. This adaptability ensures that VxWorks remains a relevant and valuable asset in the fast-paced world of embedded systems. -
2
LDRA Tool Suite
LDRA
Optimize software quality and efficiency with comprehensive assurance tools.The LDRA tool suite represents the foremost offering from LDRA, delivering a flexible and comprehensive framework that integrates quality assurance into the software development lifecycle, starting from the requirements gathering stage and extending to actual deployment. This suite features an extensive array of functions, including traceability of requirements, test management, compliance with coding standards, assessment of code quality, analysis of code coverage, and evaluations of both data-flow and control-flow, in addition to unit, integration, and target testing, as well as support for certification and adherence to regulatory standards. The key elements of this suite are available in diverse configurations designed to cater to various software development needs. Moreover, a multitude of additional features is provided to tailor the solution to the specific requirements of individual projects. Central to this suite is the LDRA Testbed in conjunction with TBvision, which furnishes a powerful blend of static and dynamic analysis tools, accompanied by a visualization interface that facilitates the comprehension and navigation of standards compliance, quality metrics, and code coverage analyses. This all-encompassing toolset not only improves the overall quality of software but also optimizes the development process for teams striving for exceptional results in their initiatives, thereby ensuring a more efficient workflow and higher productivity levels in software projects. -
3
SOAtest
Parasoft
Revolutionize testing with AI-driven automation and efficiency.PARASOFT SOATEST: Harnessing AI and ML for Enhanced API and Web Service Testing Parasoft SOAtest leverages the power of artificial intelligence and machine learning to streamline functional testing for both APIs and user interfaces. This tool is particularly well-suited for Agile DevOps settings, as it incorporates continuous quality monitoring systems to oversee the integrity of change management processes. As a comprehensive API and web service testing solution, Parasoft SOAtest automates the entire functional API testing process, facilitating effortless test automation. Its sophisticated capabilities for creating functional tests cater to applications with diverse interfaces, including REST and SOAP APIs, microservices, and databases. By transforming functional testing artifacts into security and load testing equivalents, these tools not only mitigate security vulnerabilities and performance issues but also enhance the speed and efficiency of the testing process, all while enabling ongoing monitoring of any API modifications. Ultimately, this results in a more robust testing framework that keeps pace with the rapid changes in today’s development environments. -
4
Seeker
Black Duck
Revolutionize application security with insightful, proactive vulnerability management.Seeker® is a cutting-edge interactive application security testing (IAST) tool that provides remarkable insights into the security posture of your web applications. It identifies trends in vulnerabilities in relation to compliance standards such as OWASP Top 10, PCI DSS, GDPR, CAPEC, and CWE/SANS Top 25. Additionally, Seeker empowers security teams to keep an eye on sensitive data, ensuring it remains properly safeguarded and is not unintentionally logged or stored in databases without adequate encryption. Its seamless integration with DevOps CI/CD workflows enables continuous security assessments and validations for applications. Unlike many other IAST solutions, Seeker not only identifies security flaws but also verifies their exploitability, offering developers a prioritized list of confirmed issues that require resolution. By employing its patented methods, Seeker adeptly manages a substantial volume of HTTP(S) requests, nearly eradicating false positives and enhancing productivity while minimizing business risks. Furthermore, this comprehensive solution not only highlights security vulnerabilities but also plays a crucial role in effectively addressing and mitigating potential threats. -
5
wolfSSL
wolfSSL
Secure your applications with trusted, efficient SSL solutions.wolfSSL is a well-regarded open-source internet security company, primarily recognized for its wolfSSL embedded SSL Library, which is aimed at developers looking to incorporate security features into their applications and devices. The company employs a dual licensing model, akin to MySQL, allowing them to cater to both commercial entities with a paid license and the wider open-source community with a free license. To further improve user engagement, wolfSSL also offers consulting and support services. This library is particularly notable for being the premier choice for SSL/TLS security in IoT applications, as it effectively protects devices from prevalent threats, especially man-in-the-middle (MITM) attacks. In addition, it is a preferred solution in high-traffic server and cloud settings where cryptographic efficiency is crucial. Government bodies also turn to wolfSSL’s embedded SSL for its adherence to FIPS 140-2 standards. Remarkably, over 2 billion applications and devices have benefitted from wolfSSL’s offerings, showcasing the extensive trust in its effectiveness and reliability. Such widespread usage emphasizes the library's pivotal role in safeguarding security across various industries and applications. As a result, developers can confidently integrate wolfSSL into their systems, knowing they are using a trusted solution. -
6
OcNOS
IP Infusion
Transform your network with reliable, adaptable operating excellence.OcNOS serves as a robust and adaptable operating system tailored for a diverse array of Open Compute platforms provided by leading network device manufacturers. Its architecture guarantees consistent operations, boosts workflow automation, and upholds high availability, all while contributing to a significant reduction in operational expenses. Inspired by the established ZebOS product line, OcNOS features an extensive array of functionalities and reliability that have been validated across numerous customer networks over the years. It incorporates an industry-standard Command Line Interface (CLI), supports widely used Management Information Bases (MIBs), and seamlessly integrates with conventional operational and management tools. Additionally, the system includes a centralized management and provisioning framework that facilitates transaction-based configurations alongside device feature modeling. This management layer is equipped with support for Netconf and REST APIs, as well as the ability to create customized CLI commands. Consequently, network administrators can effortlessly configure, monitor, and manage an OcNOS system through a specialized Network Management System, which ensures peak performance and efficiency. Ultimately, OcNOS signifies a major leap forward in the realm of network operating systems, merging innovation with dependable performance while also allowing for future updates and extensions. This adaptability ensures it remains relevant in the ever-evolving landscape of networking technology. -
7
CyberFlood
Spirent
Optimize performance and security with realistic application traffic.CyberFlood is a powerful and intuitive testing solution that mimics realistic application traffic to assess the performance, scalability, and security of your application-aware networking devices and solutions. This tool streamlines the testing process, allowing users to enforce application traffic policies, benchmark performance and capacity, and evaluate network security effectiveness according to NetSecOPEN standards. Celebrated as the leading L4-7 testing solution worldwide, CyberFlood distinguishes itself through its remarkable scale, exceptional performance, and user-friendly interface, all of which boost productivity while creating highly realistic application traffic. Users can quickly and easily conduct tests with the latest applications on the market, ensuring they remain competitive. Furthermore, CyberFlood combines various testing functionalities within a fully virtual environment, delivering a high-performance appliance that performs app security assessments across a range of interfaces, including 10G, 25G, 40G, 50G, and 100G, all housed in a compact 1U form factor. This solution is vital for analyzing the performance of content-aware networks, security systems, and web applications, empowering organizations to optimize their network infrastructure efficiently. By adopting CyberFlood, businesses can significantly enhance their ability to manage and evaluate their network capabilities, ultimately leading to better decision-making and resource allocation.
- Previous
- You're on page 1
- Next