Designer
PRODUCTS FOR
SECURITY VULNERABILITIES
IN DATA ELABORATION
& SPACE COMMUNICATIONS

We ​help companies to securely deploy their applications with highly sensitive data in industries such as critical infrastructure, edge applications, healthcare, defence and newspace

Contact

Hey! Got a project in your mind? Want to work with me? Feel free to shoot me an email or catch me on one of the social links below.

Web
Discover how to protect your critical data

30 days to test ARCA Trusted OS

Arca graphics

30 DAYS OF FREE TRIAL

Web
ARCA Trusted OS

Arca Trusted OS is a hardened Linux-based operating system combined with a secure Kubernetes orchestrator to provide a trusted runtime platform for containers.

Arca graphics
previous arrow
next arrow

Introducing Confidential Computing

Confidential Computing prevents unauthorized access and modification of data & code while being executed.

Computation is performed in an isolated hardware-based enclave to protect data in memory during computation. 

It provides full data confidentiality and integrity, as well as code integrity.

Confidential computing provides businesses with more trust that their data in the cloud and in the edge is secure and private

READ MORE >>>

Cabernet Security

3 LINES OF ARCA PRODUCT

A NEW ERA OF RISK IN THE SPACE INDUSTRY

During the CYSAT ’23 conference, organized by CYSEC, in Paris, France, cybersecurity researchers from Thales, demonstrated how they seized control of a European Space Agency (ESA) satellite.

 

READ THE FULL ANALYSIS >>>

As the world is less and less safe, space becomes a whole new field of conflict. We have learned from the cyberattack on KA-SAT in 2022 that private assets can suffer from geopolitical conflicts. The latest Thales demonstration during CYSAT (organized by CYSEC) revealed just how easy it is for malicious hackers to take control of your satellite.

Securing space assets has never been more urgent.

Trusted partners:

LATEST NEWS

For more information, click on the following links below