Hardened OS
with ARCA
Protect Your Data From Hardware and Software Attacks
Protect Your Data From Hardware and Software Attacks
ARCA Trusted OS protects data from all attacks, hardware and software, giving you a high-level of confidence in the workloads deployed on our Trusted Execution Environment
Easy-button attack vectors, such as crypto-jacking and side-channel attacks, are often overlooked in a security program. CYSEC ARCA blocks these attacks and helps guarantee the security of code and data in use within the trusted execution environment.
A trusted boot chain. RoT embedded in the motherboard’s TPM. Only trusted kernels can boot.
Covers system and data partitions, decrypted by a TPM when a trusted kernel is booted.
Disks are encrypted and firmware is signed, blocking any efforts at tampering.
Any rogue activity triggers an alarm, through tampering evidence switches.
It’s almost impossible to extract master keys. HSM is FIPS140-2 L3 certified.
OS includes just the software that is needed
Geosatis used CYSEC ARCA to meet hardware security module and key management requirements for a new, more secure product line.
METACO deployed CYSEC ARCA trusted OS, to provide the secure hardware that would protect high-value client data.