RelianceOne Trusted Platform

Trusted and secure from the moment you power on

RelianceOne™ Trusted Platform is a flexible security architecture for building secure launch solutions. The platform starts with trusted boot and can be tailored to meet your needs, with optional defense-grade enhancements, firmware-independent key management for full-disk encryption, out-of-band runtime protections, and remote lifecycle management that can be tailored to mission requirements and budget constraints.

It prevents an attacker from subverting or interposing late-load security components, booting the OS or hypervisor only if the system’s state is cryptographically verified.

DOWNLOAD DATASHEET

SecureBoot-Process-Linux.jpg

An Adaptive Architecture for Secure Launch Requirements

Deploy the right level of assurance for each system—from baseline measured boot to defense-grade protection. RelianceOne Trusted Platform enables security engineers to integrate trust horizontally across low-level system components while also vertically extending trust through complex, modern software stacks.

  • Multiple measured boot options
  • Firmware-independent automation for data-at-rest
  • Secure remote updates with hardware-enforced rollback protection
  • Runtime protection with an out-of-band hypervisor preventing kernel exploit techniques
  • Linux kernel and initramfs can be updated without reprovisioning the secure hardware
  • Protect memory regions from probing, even after booting the kernel
Secure Boot Features
  • Reduce integration time by 90%, using built-in tools
  • Static/dynamic trust measurements
  • Deliver boot keys
  • Verify boot components
  • Start OS/hypervisor
  • Works with any hypervisor or distributor of Linux including Wind River Linux, RedHat Linux, RedHawk, CentOS, and Ubuntu on a host using legacy BIOS or UEFI boot

WHITEPAPER

RelianceOne Secure Boot vs UEFI Secure Boot

READ THE WHITEPAPER

WEBINAR

Software Security by Design

WATCH THE WEBINAR

BLOG

Achieving Airborne Radar Processing System Superiority

READ THE ARTICLE

DISCOVER MORE

Webinar: How to Steal AI Algorithms at the Edge and Protect Them

Artificial Intelligence (AI) algorithms are increasingly deployed in edge environments, raising...

Read More

White Paper: Key Technology Considerations for Next-Gen Army Vehicles

Learn how the Army is modernizing with next-gen combat vehicles like the XM30 and RCV to achieve...

Read More

That’s classified! The history and future of NSA Type 1 encryption

The NSA Type 1 encryption program has a rich and complex history, shaped by evolving threats,...

Read More

Intercepted communications: Encryption standards for the defense edge

Encryption is a critical component of data security, providing a reliable method for ensuring the...

Read More