RelianceOne Trusted Platform

Trusted and secure from the moment you power on

RelianceOne™ Trusted Platform is a flexible security architecture for building secure launch solutions. The platform starts with trusted boot and can be tailored to meet your needs, with optional defense-grade enhancements, firmware-independent key management for full-disk encryption, out-of-band runtime protections, and remote lifecycle management that can be tailored to mission requirements and budget constraints.

It prevents an attacker from subverting or interposing late-load security components, booting the OS or hypervisor only if the system’s state is cryptographically verified.

DOWNLOAD DATASHEET

SecureBoot-Process-Linux.jpg

An Adaptive Architecture for Secure Launch Requirements

Deploy the right level of assurance for each system—from baseline measured boot to defense-grade protection. RelianceOne Trusted Platform enables security engineers to integrate trust horizontally across low-level system components while also vertically extending trust through complex, modern software stacks.

  • Multiple measured boot options
  • Firmware-independent automation for data-at-rest
  • Secure remote updates with hardware-enforced rollback protection
  • Runtime protection with an out-of-band hypervisor preventing kernel exploit techniques
  • Linux kernel and initramfs can be updated without reprovisioning the secure hardware
  • Protect memory regions from probing, even after booting the kernel

RelianceOne Subscription-Capped Tiers

Formerly Star Lab Software Titanium Technology Protection

  • ESSENTIAL, PLUS
  • RelianceOne for Linux (Static Edition)

* Includes 50 runtime licenses

DISCOVER MORE

Webinar: How to Steal AI Algorithms at the Edge and Protect Them

Artificial Intelligence (AI) algorithms are increasingly deployed in edge environments, raising...

Read More

White Paper: Key Technology Considerations for Next-Gen Army Vehicles

Learn how the Army is modernizing with next-gen combat vehicles like the XM30 and RCV to achieve...

Read More

That’s classified! The history and future of NSA Type 1 encryption

The NSA Type 1 encryption program has a rich and complex history, shaped by evolving threats,...

Read More

Intercepted communications: Encryption standards for the defense edge

Encryption is a critical component of data security, providing a reliable method for ensuring the...

Read More