Capabilities > Trusted Systems
We provide trusted tools and operational expertise to facilitate trusted access, cross domain access and trusted computing for critical networks. Our technological capabilities include multi-core architectures development, reverse engineering, secure workstation development, virtualization, cross domain solutions, secure hypervisor research and firmware development. We leverage these technologies to provide assurance for a trusted and safe computing environment.
Our research and development for secure computer architectures, hypervisors and attestation techniques push cross domain technology limits. Our expertise in cross domain has resulted in the SABI and TSABI accredited product, SecureView®, and our cutting edge single domain access solution, Beam™.
Our patented work in virtual machine introspection allows us to fully monitor or control execution in a virtual or cloud environment, providing novel methods for reverse engineering, debugging, enforcing access controls, security policies and software configuration.
Our research and services can help you make important pre-manufacturing design decisions that provide you with concrete data for proper risk decision making. Our embedded device assessment services will also identify possible security vulnerabilities and mitigation strategies so you can deploy your systems with confidence.
Our focus is on secure and reliable computing devices using diverse methods for attestation, secure execution environments and measurement techniques at all levels. Our major technology applications include multi-domain security on mobile and embedded devices, pre-boot malware protection, virtual machine introspection and mitigations.
We are always looking for next-level team members. Try our challenges to find out if you’re one of us.