Confidence OS

We develop a high security Linux build - Confidence OS

Designed for usage in hostile network environments. Security is the primary design factor. Security elements are built in from the earliest stage of development and employed when system is installed. Custom security policies can always be added to further strengthen system security, however core protections cannot be removed or disabled.


Confidence OS is the platform on which our products are built.


  • Physical or Virtual

  • Mandatory Access Controls (via SELinux)

  • FIPS Mode enforced

  • Custom watchdogs

  • Security Policy (DISA STIG, custom)

  • No privileged root access

  • File Integrity / IDS

  • Restricted prompt driven CLI

  • Secure Dynamic Firewall

Confidence OS™ Network Management

In 2011 we recognized that building a highly secure operating system required an equally secure management framework. One of the key challenges faced with many products was managing them across worldwide networks and providing access to a variety of technicians, analysts, and engineers. Designed exclusively to support Confidence OS, our network management framework uses encrypted communication to securely manage multiple systems easily.


  • Hierarchical management framework

  • Fault tolerant design

  • Secure central management

  • Supports stand alone or High Availability configurations

  • Encrypted communication between systems


Confidence OS™ DNS Proxy

Confidence OS™ DNS Proxy

High performance DNS Proxy


A security focused appliance that targets critical DNS services. Our proxy is designed to work with your existing DNS infrastructure.


Key design features:

      • Supports:

        • DNS

        • DNS over TLS (DoT)

        • DNS over HTTPS (DoH)

      • Query and response logging

      • Response Policy Zones (RPZ)

      • DNS Filtering


DNS Proxy is built on our high security Confidence OS platform.


  • Virtual appliance

  • Mandatory Access Controls

  • FIPS Mode enforced

  • Custom watchdogs

  • Security Policy (DISA STIG, custom)

  • No privileged root access

  • File Integrity / IDS

  • Restricted prompt driven CLI

  • Secure Dynamic Firewall

Nanoano Domain Monitoring Service


A cloud-based service that monitors key aspects of your public facing infrastructure.

    • Critical data points:

      • WHOIS Domain Registration data

      • Critical Domain Name System (DNS) Data

        • Mail

        • Name Servers

        • Select TXT, anti-spam records

      • Security Certificates

    • Secondary data points:

      • Look-alike domains

        • Typo-squatters

        • Cousins

        • IDN Homographs

  • Alerting and reporting