EXPLORE ARCA TRUSTED OS


SIGN UP FOR YOUR FREE TRIAL

Get access to our solution and discover how we protect your critical data. 

GET YOUR ACCESS FOR 30 DAYS

The Free Trial is limited to three options of deployments:

 🔹In a VM on Virtualbox (option called ‘ARCA Trusted OS x86’)
 🔹In a VM on Google Cloud Platform (option called ‘ARCA Trusted OS on GCP')
 🔹On Raspberry Pi 4B (option called ‘ARCA Trusted OS ARM’)

🔹To test ARCA Trusted OS on VMware vSphere, or AWS EC2, please contact us at info@cysec.com

After having subscribed to any of these free trials, you will receive:

🔹A Free Trial license
🔹An access to the technical documentation of the product
🔹Some potential additional material for the installation of the Free Trial license
🔹An access to the CYSEC support while your free trial license is active

 

Slide-1-copy-34

 

ARCA Trusted OS is a hardened Linux-based microdistribution designed to host containers orchestrated by Kubernetes.

 ARCA Trusted OS has two main security objectives: 

✅Containing the intrusion of an attacker within the container software infrastructure (OS + k8s platform)

✅Protecting the integrity and confidentiality of the data handled by this infrastructure

CYSEC's threat model considers attackers having either a physical access to your infrastructure or a remote access to at least one of your containers. In both cases, ARCA Trusted OS blocks attacks targeting the OS to later pivot towards containers orchestrated by the Kubernetes orchestrator.

 

Slide-1-copy-2 (7)

 

ARCA Trusted OS for ARM is a hardened Linux-based microdistribution designed to run containers on small footprint boards deployed at the edge. It includes only what is required to run containers and is designed to reduce the attack surface and avoid data compromission.

The ARM version of ARCA Trusted OS has been designed with the same security philosophy than the x86 version.

This family of hardened OSs ensures a continuity of IT software infrastructure from datacenter/cloud up to the edge. ARCA Trusted OS comes with cryptographic functions executed in Trusted Execution Environment (TrustZone or TPM2.0).

 

For a supported and customized free trial,  and any other request, please get in touch with us at: sales@cysec.com