As the embedded world looks to security solutions to protect connected critical computing functions from external threats, two software platforms have emerged.