Certified Key Management & Encryption
Manage lifecycle of security keys with self-defending KMS
Manage lifecycle of security keys with self-defending KMS
ARCA Trusted OS provides a unique, headache-free HSM-grade key management system (KMS) and encryption that can be used across multiple locations.
Cryptographic API enables you to manage the lifecycle of security keys with self-defending KMS. Use it to perform cryptographic operations, such as generating, storing, and using cryptographic keys.
& secure distribution of crypto keys between physical nodes in the cluster
HSM enabled by an integrated third-party technology
Uses robust tech, e.g. RUST, to block API call forging & connection tapping
Software cryptographic backend, via gRPC protocol
containers can integrate using legacy cryptographic interfaces/native KMS gRPC interfaces (incl. JCE)
Includes post quantum cryptography algorithms
Geosatis used CYSEC ARCA to meet hardware security module and key management requirements for a new, more secure product line.
METACO deployed CYSEC ARCA trusted OS, to provide the secure hardware that would protect high-value client data on their SILO platform.
Encrypt data in use for more secure code execution
Confidential computing encrypts sensitive data in use, enabling you to execute code securely.
CYSEC ARCA Trusted OS offers you a hardware-based trusted execution environment (TEE) to protect data in use. If code is altered or tampered with, the TEE automatically blocks any operation.
Built with AMD Secure Encrypted Virtualization (SEV) on AMD-virtualization architecture
built with ARM TrustZone embedded security technology
Executed code is isolated from external attackers as well as cloud providers and administrators
Covers data integrity and confidentiality, code integrity and confidentiality, while in use.
Compatible with confidential execution environment provided by Confidential VM
Ensure data and code visibility and access is limited to the people you want
Geosatis used CYSEC ARCA to meet hardware security module and key management requirements for a new, more secure product line.
METACO deployed CYSEC ARCA trusted OS, to provide the secure hardware that would protect high-value client data on their SILO platform.
Critical workload protection platform for Kubernetes containers
Addresses the concern of runtime security, protecting against container breakout attacks and information gathering on your operating system.
ARCA is built with defense-in-depth security in mind – from minimal OS images, container image authenticity, and policy enforcement and monitoring to hardened kernel, container sandboxing, and secure cluster communication.
Reduces the attack surface – OS includes just the software that is needed.
Any interference leads to kernel lockdown.
Secure-by-default deployments. Automatic isolation in case of exploit.
Hostile workloads cannot run without permission.
Infiltration by rogue hosts into an existing Kubernetes cluster automatically fails.
A trusted boot chain, RoT embedded in the motherboard’s TPM. Only trusted kernels can boot.
Geosatis used CYSEC ARCA to meet hardware security module and key management requirements for a new, more secure product line.
METACO deployed CYSEC ARCA trusted OS, to provide the secure hardware that would protect high-value client data on their SILO platform.
Hardware- and software-based security protects the full stack and guarantees trust for your critical workloads running with ARCA Trusted OS.
Hardware-based security sets the root of trust of the system into a physical device (TPM), provides increased authenticity and verifiability against rogue OS, and is tamper evident.
UEFI used for secure boot of CYSEC ARCA
TPM decrypts data and partition systems when a trusted kernel is booted
A CPU with secure enclave; enables confidential computing
HSM/SE; FIPS-140-2 L3 HSM
SE integrates Common Criteria EAL4 and certified root of trust
Any interference leads to kernel lockdown
Geosatis used CYSEC ARCA to meet hardware security module and key management requirements for a new, more secure product line.
METACO deployed CYSEC ARCA trusted OS, to provide the secure hardware that would protect high-value client data.
Protect Your Data From Hardware and Software Attacks
ARCA Trusted OS protects data from all attacks, hardware and software, giving you a high-level of confidence in the workloads deployed on our Trusted Execution Environment
Easy-button attack vectors, such as crypto-jacking and side-channel attacks, are often overlooked in a security program. CYSEC ARCA blocks these attacks and helps guarantee the security of code and data in use within the trusted execution environment.
A trusted boot chain. RoT embedded in the motherboard’s TPM. Only trusted kernels can boot.
Covers system and data partitions, decrypted by a TPM when a trusted kernel is booted.
Disks are encrypted and firmware is signed, blocking any efforts at tampering.
Any rogue activity triggers an alarm, through tampering evidence switches.
It’s almost impossible to extract master keys. HSM is FIPS140-2 L3 certified.
OS includes just the software that is needed
Geosatis used CYSEC ARCA to meet hardware security module and key management requirements for a new, more secure product line.
METACO deployed CYSEC ARCA trusted OS, to provide the secure hardware that would protect high-value client data.