We develop a high security Linux build - Confidence OS™
Designed for usage in hostile network environments. Security is the primary design factor. Security elements are built in from the earliest stage of development and employed when system is installed. Custom security policies can always be added to further strengthen system security, however core protections cannot be removed or disabled.
Confidence OS is the platform on which our products are built.
Physical or Virtual
Mandatory Access Controls (via SELinux)
FIPS Mode enforced
Custom watchdogs
Security Policy (DISA STIG, custom)
No privileged root access
File Integrity / IDS
Restricted prompt driven CLI
Secure Dynamic Firewall
In 2011 we recognized that building a highly secure operating system required an equally secure management framework. One of the key challenges faced with many products was managing them across worldwide networks and providing access to a variety of technicians, analysts, and engineers. Designed exclusively to support Confidence OS, our network management framework uses encrypted communication to securely manage multiple systems easily.
Hierarchical management framework
Fault tolerant design
Secure central management
Supports stand alone or High Availability configurations
Encrypted communication between systems
High performance DNS Proxy
A security focused appliance that targets critical DNS services. Our proxy is designed to work with your existing DNS infrastructure.
Key design features:
Supports:
DNS
DNS over TLS (DoT)
DNS over HTTPS (DoH)
Query and response logging
Response Policy Zones (RPZ)
DNS Filtering
DNS Proxy is built on our high security Confidence OS platform.
Virtual appliance
Mandatory Access Controls
FIPS Mode enforced
Custom watchdogs
Security Policy (DISA STIG, custom)
No privileged root access
File Integrity / IDS
Restricted prompt driven CLI
Secure Dynamic Firewall
A cloud-based service that monitors key aspects of your public facing infrastructure.
Critical data points:
WHOIS Domain Registration data
Critical Domain Name System (DNS) Data
Name Servers
Select TXT, anti-spam records
Security Certificates
Secondary data points:
Look-alike domains
Typo-squatters
Cousins
IDN Homographs
Alerting and reporting