Secure Linux for the Edge
RelianceOne™ offers robust Linux system-hardening and security capabilities for operationally-deployed Linux systems.
Designed using a threat model that assumes an attacker will gain root (admin) access to your system, it maintains the integrity and confidentiality of critical data and configurations while assuring operations. It also enables customers to rapidly and affordably address the majority of their technical IA / cybersecurity controls with a single product.
RelianceOne protects container contents from registry to runtime, ensuring image contents remain confidential and authentic. Policies limit damage from malicious code, and seamless integration with allowlisting enables secure updates to container workloads while automatically blocking malicious workloads.

Simplify Mandatory Access Control
RelianceOne technology protection simplifies Mandatory Access Control (MAC) policy creation, requiring only policies for protected applications, libraries, scripts and data files.
- Denies by default access to protected entities even from root-level users
- Controls and restricts direct access to system hardware resources, such as peripherals and storage devices
- Prevents malicious modifications of system BIOS and firmware
- Enables secure software updates
- Encrypts and authenticates MAC policies as part of the secure boot process
OS Hardening and Attack Surface Reduction
RelianceOne removes unnecessary OS functionality which could help an attacker analyze system configuration, execution flow and protected applications.
- Disallows unsigned module loading or process debugging
- Removes Kernel functionality and features
- Eliminates hardened configurations being modified or bypassed in the field
Remain Secure at Runtime and Rest
- Enforces runtime protections such as debug prevention, copy protection, unauthorized reading of memory and unauthenticated loading of code into protected applications
![]()
- Authenticates protected entities, verifies that they have not been altered, only decrypting files as needed
- Ensures sensitive applications, data files, and configurations are cryptographically bound to unique hardware, preventing applications from being copied and run on non-authentic or instrumented devices
- Cryptographically authenticates data and configuration files before permitting access by protected applications