Trusted products and services for embedded security. Join-us on Linkedin


A generic tamper resistant secure appliance

ProvenBox is a tamper-resistant, generic security appliance, ready to host security applications that require trust, performance and ease of use

Main features

The design of the ProvenBox combines hardware and software security features to enable it be part of the Trusted Computing Base of a computing system and to reach the highest certification levels (Common Criteria EAL 5, FIPS 140-2 Level 4 and more).  

ProvenBox offers a level of functionality that cannot be delivered by other solutions such as Hardware Security Modules (HSMs) or smart cards. 

ProvenBox supports ARM TrustZone and includes a highly secured Trusted Execution Environment (TEE) for the secure world and a Linux operating system for the normal applications. The security functions of ProvenBox can be implemented by software as either regular Linux applications or Trusted Applications.

Where to use ProvenBox?

ProvenBox is available with a range of pre-integrated ARM SoCs, including SoCs with embedded FPGAs for high-performance computing functions (AI, Machine Learning, vision, proprietary encryption, etc.). 

Its physical design enables it to operate in datacenters and office environments. 

Typical usage

  • Cloud Edge appliance
  • Security Gateway for Industrial IoT
  • Secure logging and monitoring device
  • VPN endpoint
  • Etc.

Please contact us for more details.

Challenge coverage



Security needs to be integrated at the design stage (security-by-design) and embedded in the most effective way wherever it is required in the technical infrastructure. There are many ways to embed security in systems and devices and the selected solution will be the result of a trade-off between cost, security level and performance.

More info
Trusted Computing Base

Trusted Computing Base

Security engineers define the Trusted Computing Base (TCB) as the set of hardware, firmware and software components that are critical to the security of a system. In order to limit the risk of vulnerabilities, the TCB need to be well identified, as small as possible and made-up of components that can be really trusted.

More info

Other Secure Components