TRENTOS SDK - Evaluation Purpose

Early Bird discount (until 30.04.2021)

7.450,00 excl. VAT

Easy Access To seL4

HENSOLDT Cyber offers you the unique opportunity to easily access and explore the security advantages of the seL4 microkernel first hand through our Trusted Entity Operating System, TRENTOS. Our Software Development Kit contains operating system components which you can use to develop your own applications based on seL4 and CAmkES (Component Architecture for microkernel-based Embedded Systems). Benefit from our extensive documentation and explore our operating system components, by using our Demos and Docker containers for building and testing.

Take the benefit from our Early Bird Discount and pre-order now!
Available: Start 2021

 In order to pre-order the TRENTOS SDK please view the product on desktop browser. 

Technical Specifications

Architecture  Microkernel 
Microkernel  seL4 
Operating System  TRENTOS 
Version  v.1.2 
Docker Container  Custom 
Documentation  included 
Minimum System Requirements   
Operating System  Linux 64 bit 
Component Overview   
CAmkES Software Components and Libraries 

Storage Handling and Filesystem 

Crypto, Keys and Certificate Handling 

Network Stack 




Tools and scripts 


Emulated target environment 

Supported Platforms   
QEMU / ZYNQ7000 

RaspberryPi 3B+ 

Boundary Devices Nitrogen6 SoloX 

Boundary Devices Sabrelite BD-SL-i.MX6 



This product is provided for an intended use in Research & Development with evaluation purpose, whereas this means:

Evaluation Version

Intended use-case

Evaluation any non-academic, commercially acting company, institution or user using the TRENTOS is dealt with as a commercial customer. They gain access to TRENTOS Evaluation by purchasing an evaluation license to evaluate and test the program software for customer´s internal evaluation purposes only.

Specific license terms:

The program software can be installed on any personal computer within the organization purchasing the license. Each installation requires one license.Binaries generated by the LICENSED SOFTWARE do not require runtime licenses given that they are used temporarily for the purpose of evaluation and testing. With each license a maximum number of three devices may be used with binaries at any given time in parallel. The program software shall only be used within the organization purchasing the license. Binaries generated by the LICENSED SOFTWARE may not be distributed outside of the organization purchasing the license.

Maintenance & Support – the commercial customer will not be entitled to receive Updates free of charge.

Further details can be found in the TRENTOS End-User License Agreement (EULA).

Add-on Point Blank

About Point Blank TLS

pbTLS is the embedded TLS security solution developed by Steen Harbach AG. The pbTLS library is a TLS & cipher middleware for small 32-bit embedded MCU applications. It is primarily optimised for bare metal and RTOS based implementations and applications. pbTLS is an innovative Transport Layer Security Library – Made in Germany, developed to secure device-to-device communication on the smallest network appliances for maximum security of the overall system. The pbTLS library is based on strong, reliable and efficient crypto elements (cipher suites) all coded from scratch in C99 and automotive MISRA standard.

Communication secured by TLS has the following major features:

  • Authenticity
  • Integrity
  • Privacy


The pbTLS Library is best fit for applications with small 32-bit ARM Cortex MCUs. We deliver pbTLS as a static library including all required crypto components. The underlying & supported toolchains are ARM GCC and Keil µVision v5, but the code is portable to other toolchains as well.

About Point Blank

After its founding in 1988, Steen Harbach AG has positioned itself in the innovative market of IT Technology. The company is of one the leading service providers in various fields of information technology. Starting with the development of individual applications, followed by the provisions of managed services as well as the management of high complex IT business projects the portfolio of Steen Harbach AG covers the complete range of modern requirements. Under the brand “PointBlank Security” the company has developed worldwide novel solutions in the sense of consistent security architectures such as IoT, based on its continuous enterprise experience. In addition to secure hardware in the smallest format, PointBlank’s solutions are used for the implementation of cloud-centric processes with the principle of “Security by Design” in mind. Those workflows rely on strong components such as PKI, two-way TLS and the efficient implementation of cryptographic schemes and algorithms

For further details check the Point Blank website.

Add-On DataOS

About DataOS certificate management

The DataOS certificate management provides the perfect approach to the increasing number of connected devices and scarce ressources in the field of IT (securityadministrators. The distribution of certificates is handled within the DataOS ecosystem that comprises all connected devices and applies robust, light-weighted as well as state-of-the art technologies for secure transmission of configuration and certificate details. 

Software robots perform updates as well as revocations of certificates so that expiration is eliminated for connected devices. This reduces manual efforts and eliminates human-triggered errors.

About DataOS

Based on a patented process, DataOS brings automation to the field of security administration. All relevant aspects in the configuration of security settings, distribution, renewal, withdrawal and monitoring of certificates as well as patch , access management and log export management can be integrated into one device management platform. Repetitive tasks are automated and performed by software robots – for the sake of time & place independency as well as being fault-free and fail-proof.

Within the TRENTOS ecosystem, DataOS is an addon for all network and system administrator tasks. The embedded PKI enables a centralized management of decentralized devices – with a robust and stable security configuration right from the start.

For further details check the DataOS website.

Cyber Community & Support

After purchasing the product, you get direct access to:

      • Knowledge Base and Documentation
      • Community
      • Tutorials