Kasper­sky Launch­es Unhack­able’ OS: 4 Things to Know


Kaspersky Labs have come out with another solution to the cybersecurity worries of the netizens worldwide — the Kaspersky OS, which was in the making for over 14 years and has finally been released commercially.

Kaspersky Os 1

The secure OS was first announced in November 2016 and the company has rolled out the product commercially now. It works for Internet of Things, network devices such as in telecommunications, connected cars and industrial control systems.

The Moscow-based anti-virus and cyber security company claim that their OS ‘is ahead of any competition’.

Talking about the Kaspersky OS and debunking its myths, Eugene Kaspersky, CEO of the company said, “OS has not a single Linux code, is based on a microkernel architecture and allows customers to examine the source code to make sure it has no undocumented capabilities.”

The company claims that the robust build of the OS is in itself enough to protect a system from malicious code, viruses and hacker attacks.

Kaspersky’s new security product is customisable based on application and comprises of three major components: the Operating System (Kaspersky OS), KSH — a standalone secure hypervisor — and KSS, which is a system meant for secure interaction among OS components.

“When security has to be guaranteed, we have to build something new. Something that is secure by design,” he added.

Since the secure OS isn’t an out-of-box ready product, it’s pricing will depend on its usage and application.

Codename 11-11: Key Features

Kaspersky Os

The Kaspersky OS was codenamed 11-11 by its developers because the idea of such an OS — which would help render their own security products obsolete — was conceptualised on November 11.

Independent Secure Engine

Kaspersky OS has been designed from scratch on a modular lightweight microkernel, which can be implemented on several platforms — giving one freedom to modify it, including with another kernel too.

The independent security engine of the OS allows users to dictate the policy which goes well with their security requirements. The security policy can be customised for individual applications as well.

Application Features and Security Functions are Separated

In addition to separating security domain for groups of applications, the KOS’ security application is such that it separates the security features of an application from its domain logic — making it easier to configure security specification as well as developing an application quicker.

Compulsory Application Labelling and Identification

No application in the Kaspersky OS is allowed to be installed without configuring its security first. Hardware and software such as files, databases, network ports and more, all have to be labelled with their security attributes — else these resources won’t be accessible.

Option to Use any OS as Guest OS

The security components of the Kaspersky OS includes a secure hypervisor, which allows users to port a third-party code and use any other OS as a Guest OS on their system.

The OS can be used on systems with the following configurations:

  • KasperskyOS for x86/x64 CPU: Pentium II or higher with 8MB RAM or more.
  • Ethernet: Realtek RTL8139, Intel i82580
  • For ARM CPU: ARMv7 or higher with 8MB RAM or more.


Even though the Russian security firm claims that Kaspersky OS is the most secure solution to today’s cyber security problems, they maintain that anything can be hacked and there is ‘no perfect answer’.

“The very essence of cyber security is to make cybercrooks’ lives as difficult as possible, and make cyber attacks so costly that they become an unprofitable business,” Eugene Kaspersky concludes.

While this might not be an apt solution for those looking to use heavy duty application such as hi-graphic games or hi-resolution video editing, it sure seems like a secure solution for the IoT, connected cars and telecommunications which are being used routinely by people and can prove useful in securing their lives a bit better and also protecting services against DDoS attacks.

The above article may contain affiliate links which help support Guiding Tech. However, it does not affect our editorial integrity. The content remains unbiased and authentic.

Also See
#internet #security

Join the newsletter


Written By


Bike enthusiast, traveller, ManUtd follower, army brat, word-smith; Delhi University, Asian College of Journalism, Cardiff University alumnus; a journalist breathing tech these days.