Services that enable trusted computing

Leverage off the shelf technology

The Trusted Computing Group devised the Opal specifications for Self Encrypting Drives to protect user data-at-rest. Many drive manufacturers now offer products which support it. But without an integrated software solution an Opal compliant SED lacks credential recovery, key management and cannot securely awaken from certain sleep modes (e.g. S3). Similar issues arise when deploying other hardware security solutions on a mass scale. Developing secure yet non-intrusive solutions that are also cost effective to deploy and manage is one of the most important services we provide.

Explore several of our custom solutions

  • UEFI based pre-boot authentication and full disk encryption driver with execution context switching between Linux and Windows
  • TCG Opal embedded Linux pre-boot authentication with Smart Card support and cross-platform CLI based recovery tool.
  • Security at the point of entry with an embedded Linux cargo inspection solution that integrates Web management


We offer competitive rates with discounts for extended engagements. Development is usually billed on an hourly basis, but alternate arrangements are available for specific tasks and deliverables.

Turn-key solution

Project oversight is a key benefit of our negotiated Turn-key solutions. Hybrid hardware/software products require a prime contractor that can understand and oversee an often diverse supply chain.

Contact Us