RelianceOne for Linux

Secure Linux for the Edge

RelianceOne™ offers robust Linux system-hardening and security capabilities for operationally-deployed Linux systems.

Designed using a threat model that assumes an attacker will gain root (admin) access to your system, it maintains the integrity and confidentiality of critical data and configurations while assuring operations. It also enables customers to rapidly and affordably address the majority of their technical IA / cybersecurity controls with a single product.

RelianceOne protects container contents from registry to runtime, ensuring image contents remain confidential and authentic. Policies limit damage from malicious code, and seamless integration with allowlisting enables secure updates to container workloads while automatically blocking malicious workloads.

DOWNLOAD DATASHEET

Server-Lock-Secure-OS.jpg

Hacker-Mandatory-Access-Authentication.jpg

Simplify Mandatory Access Control

RelianceOne technology protection simplifies Mandatory Access Control (MAC) policy creation, requiring only policies for protected applications, libraries, scripts and data files.

  • Denies by default access to protected entities even from root-level users
  • Controls and restricts direct access to system hardware resources, such as peripherals and storage devices
  • Prevents malicious modifications of system BIOS and firmware
  • Enables secure software updates
  • Encrypts and authenticates MAC policies as part of the secure boot process
HardwareSecurity-Operating-System-Hardening-Lock.jpg

OS Hardening and Attack Surface Reduction

RelianceOne removes unnecessary OS functionality which could help an attacker analyze system configuration, execution flow and protected applications.

  • Disallows unsigned module loading or process debugging
  • Removes Kernel functionality and features      
  • Eliminates hardened configurations being modified or bypassed in the field
RuntimeProtection-Board.jpg

Remain Secure at Runtime and Rest

  • Enforces runtime protections such as debug prevention, copy protection, unauthorized reading of memory and unauthenticated loading of code into protected applications
  • Authenticates protected entities, verifies that they have not been altered, only decrypting files as needed
  • Ensures sensitive applications, data files, and configurations are cryptographically bound to unique hardware, preventing applications from being copied and run on non-authentic or instrumented devices
  • Cryptographically authenticates data and configuration files before permitting access by protected applications
Features
  • Simplify mandatory access control
  • Enable OS hardening & attack surface reduction
  • Protect sensitive data, configuration files, and executables during runtime and rest
  • Provides comprehensive certifications & compliance
  • Reduce development, integration, and maintenance costs by millions of dollars
  • Decryption as needed - decryption keys are protected and stored out-of-band from attackers

WHITEPAPER

RelianceOne Guidelines for securing Combat Systems

READ THE WHITEPAPER

BLOG

Protecting Embedded Linux From Offline Attacks

READ THE ARTICLE

WEBINAR

Software Security by Design

WATCH THE WEBINAR

DISCOVER MORE

Webinar: How to Steal AI Algorithms at the Edge and Protect Them

Artificial Intelligence (AI) algorithms are increasingly deployed in edge environments, raising...

Read More

White Paper: Key Technology Considerations for Next-Gen Army Vehicles

Learn how the Army is modernizing with next-gen combat vehicles like the XM30 and RCV to achieve...

Read More

That’s classified! The history and future of NSA Type 1 encryption

The NSA Type 1 encryption program has a rich and complex history, shaped by evolving threats,...

Read More

Intercepted communications: Encryption standards for the defense edge

Encryption is a critical component of data security, providing a reliable method for ensuring the...

Read More