Certified Key Management & Encryption

Manage lifecycle of security keys with self-defending KMS

ARCA Trusted OS provides a unique, headache-free HSM-grade key management system (KMS) and encryption that can be used across multiple locations.

Cryptographic API enables you to manage the lifecycle of security keys with self-defending KMS. Use it to perform cryptographic operations, such as generating, storing, and using cryptographic keys.

Cryptographic Primitives Functionality

& secure distribution of crypto keys between physical nodes in the cluster

Certified Cryptographic Backend (Hardware or Software)

HSM enabled by an integrated third-party technology

Crypto Service Tampering Protection

Uses robust tech, e.g. RUST, to block API call forging & connection tapping

OpenSSL

Software cryptographic backend, via gRPC protocol

Integration

containers can integrate using legacy cryptographic interfaces/native KMS gRPC interfaces (incl. JCE)

QUANTUM RESISTENT

Includes post quantum cryptography algorithms

Case studies

Geosatis, IoT electronic monitoring

Geosatis used CYSEC ARCA to meet hardware security module and key management requirements for a new, more secure product line.

Learn more >

METACO, digital asset management, fintech

METACO deployed CYSEC ARCA trusted OS, to provide the secure hardware that would protect high-value client data on their SILO platform.

Learn more >

LATEST INDUSTRY NEWS

STAY INFORMED

CONFIDENTIAL COMPUTING WITH ARCA

Encrypt data in use for more secure code execution

Confidential computing encrypts sensitive data in use, enabling you to execute code securely.

CYSEC ARCA Trusted OS offers you a hardware-based trusted execution environment (TEE) to protect data in use. If code is altered or tampered with, the TEE automatically blocks any operation.

Enclave

Built with AMD Secure Encrypted Virtualization (SEV) on AMD-virtualization architecture

Enclave

built with ARM TrustZone embedded security technology

Isolation

Executed code is isolated from external attackers as well as cloud providers and administrators

Defense-in-depth

Covers data integrity and confidentiality, code integrity and confidentiality, while in use.

Google Cloud

Compatible with confidential execution environment provided by Confidential VM

CONTROL OVER VISIBILITY AND ACCESS

Ensure data and code visibility and access is limited to the people you want

Case studies

Geosatis, IoT electronic monitoring

Geosatis used CYSEC ARCA to meet hardware security module and key management requirements for a new, more secure product line.

Learn more >

METACO, digital asset management, fintech

METACO deployed CYSEC ARCA trusted OS, to provide the secure hardware that would protect high-value client data on their SILO platform.

Learn more >

DOWNLOAD ASSETS

Secure Kubernetes

Critical workload protection platform for Kubernetes containers

Addresses the concern of runtime security, protecting against container breakout attacks and information gathering on your operating system.

ARCA is built with defense-in-depth security in mind – from minimal OS images, container image authenticity, and policy enforcement and monitoring to hardened kernel, container sandboxing, and secure cluster communication.

Minimal OS Images

Reduces the attack surface – OS includes just the software that is needed.

Hardened Kernel

Any interference leads to kernel lockdown.

Container Sandboxing

Secure-by-default deployments. Automatic isolation in case of exploit.

Read-only OS images

Hostile workloads cannot run without permission.

Secure Cluster Communication

Infiltration by rogue hosts into an existing Kubernetes cluster automatically fails.

SECURE BOOT

A trusted boot chain, RoT embedded in the motherboard’s TPM. Only trusted kernels can boot.

Case studies

Geosatis, IoT electronic monitoring

Geosatis used CYSEC ARCA to meet hardware security module and key management requirements for a new, more secure product line.

Learn more >

METACO, digital asset management, fintech

METACO deployed CYSEC ARCA trusted OS, to provide the secure hardware that would protect high-value client data on their SILO platform.

Learn more >

LATEST INDUSTRY NEWS

STAY INFORMED

SECURE HARDWARE BASE

Hardware- and software-based security protects the full stack and guarantees trust for your critical workloads running with ARCA Trusted OS.

Hardware-based security sets the root of trust of the system into a physical device (TPM), provides increased authenticity and verifiability against rogue OS, and is tamper evident.

UEFI FIRMWARE

UEFI used for secure boot of CYSEC ARCA

TPM 2.0

TPM decrypts data and partition systems when a trusted kernel is booted

AMD-SEV

A CPU with secure enclave; enables confidential computing

CERTIFIED CRYPTOGRAPHIC BACKEND

HSM/SE; FIPS-140-2 L3 HSM

SECURE ROOT OF TRUST

SE integrates Common Criteria EAL4 and certified root of trust

HARDENED KERNEL

Any interference leads to kernel lockdown

CASE STUDIES

Geosatis, IoT
electronic monitoring

Geosatis used CYSEC ARCA to meet hardware security module and key management requirements for a new, more secure product line.

Learn more >

METACO,
the fintech leader

METACO deployed CYSEC ARCA trusted OS, to provide the secure hardware that would protect high-value client data.

Learn more >

LATEST INDUSTRY NEWS

STAY INFORMED

Hardened OS
with ARCA

Protect Your Data From Hardware and Software Attacks

ARCA Trusted OS protects data from all attacks, hardware and software, giving you a high-level of confidence in the workloads deployed on our Trusted Execution Environment

Easy-button attack vectors, such as crypto-jacking and side-channel attacks, are often overlooked in a security program. CYSEC ARCA blocks these attacks and helps guarantee the security of code and data in use within the trusted execution environment.

Secure Boot

A trusted boot chain. RoT embedded in the motherboard’s TPM. Only trusted kernels can boot.

FULL DISK ENCRYPTION

Covers system and data partitions, decrypted by a TPM when a trusted kernel is booted.

DISK TAMPERING PROTECTION

Disks are encrypted and firmware is signed, blocking any efforts at tampering.

CHASSIS TAMPERING

Any rogue activity triggers an alarm, through tampering evidence switches.

HSM TAMPERING

It’s almost impossible to extract master keys. HSM is FIPS140-2 L3 certified.

MINIMAL OS IMAGES REDUCES THE ATTACK SURFACE

OS includes just the software that is needed

CASE STUDIES

Geosatis, IoT
electronic monitoring

Geosatis used CYSEC ARCA to meet hardware security module and key management requirements for a new, more secure product line.

Learn more >

METACO,
the fintech leader

METACO deployed CYSEC ARCA trusted OS, to provide the secure hardware that would protect high-value client data.

Learn more >

LATEST INDUSTRY NEWS

STAY INFORMED