TmaxGooroom


An Open-Source OS That Everyone Can

Use Freely,

Offering Safety and Convenience

An Open-Source OS with Strong Security and User-Friendly Features


TmaxGooroom is an open-source operating system that combines Tmax’s proprietary technology with a security module from the National Security Research Institute.


It can be used as a GuestOS in isolated network environments, and it supports work and development environments requiring Linux.

An Open-Source OS with Strong Security and User-Friendly Features


TmaxGooroom is an open-source operating system that combines Tmax’s proprietary technology with a security module from the National Security Research Institute.


It can be used as a GuestOS in isolated network environments, and it supports work and development environments requiring Linux.

Key features of TmaxGooroom


Robust Security

   
The OS incorporates security technologies and is equipped with a five-level security module from the National Security Research Institute for enhanced protection.


                                     

                        

    User-Friendly UI/UX

   
Provides an intuitive UI/UX with a simple and convenient interface, making it accessible even for first-time users.

                                                       

                        

Optimized for Work Environments

   
Can be used as a major VDI GuestOS both domestically and internationally, offering an optimized environment for existing workflow.

                                                        

                        

Key Features of TmaxGooroom


Robust Security


The OS incorporates security technologies and is equipped with a five-level security module from the National Security Research Institute for enhanced protection.



User-Friendly UI/UX


Provides an intuitive UI/UX with a simple and convenient interface, making it accessible even for first-time users.




Optimized for Work Environments


Can be used as a major VDI GuestOS both domestically and internationally, offering an optimized environment for existing workflow.


Security Module from the National Security Research Institute
The application of a five-level security module reinforces security and safety.

    

     Trusted Boot

   
     The OS verifies the integrity of the kernel 
     during boot-up, preventing booting 
     if the kernel has been tampered with.


                                                      

                        

    

     Full Disk Encryption

   
     Minimizes the risk of data theft in case of device 
     loss or theft.


                                                          

                        

    

     Executable File Protection

   
     Prevents indiscriminate execution of files by 

     allowing only signed files to run.


                                                      

                        

    

     Browser Protection

   

     Differentiates between trusted and untrusted 

     sites and applies security measures accordingly 

     for each browser.


                                                     

                        

    

     Operating System Protection

   
     Monitors the OS in real-time for infections and 
     shuts down immediately if an infection is 

     detected.


                                                      

                        

Security Module from the National Security Research Institute

The application of a five-level security module reinforces security and safety.


    Trusted Boot

 

      The OS verifies the integrity of the kernel during boot-up, preventing booting 
      if the kernel has been tampered with.


                                                                                                                 



    Full Disk Encryption

 

     the risk of data theft in case of device loss or theft.


                                                                               

                                                                                                                     



    Executable File Protection

 

     Prevents indiscriminate execution of files by 
     allowing only signed files to run.

                                                              

                                                                                                                                                              



    Browser Protection

 

     Differentiates between trusted and untrusted 
     sites and applies security measures accordingly 

     for each browser.

                                                                                                                                                           



    Operating System Protection

 

      Monitors the OS in real-time for infections and 
      shuts down immediately if an infection is  

      detected.

                                                                                          

                                                               


Utilizing TmaxGooroom as a Guest OS

Enhanced security and safety with the application of a five-level security module


Expected Benefits of Implementing TmaxGooroom


    01  

     

      Enhanced Work Environment  


  • Provides a secure network separation that prevents information leakage and minimizes security breaches.
  • Maintains business continually with a single PC
    for both work and internet use.



    02 

     

      Strengthened Security Environment 


  • TmaxGooroom, an open-source OS validated by the open-source community.

  • Equipped with a security module from the
    National Security Research Institute.



    03

     

       User-Optimized Environment 


  • Offers convenience with a user-friendly UI/UX.

  • Reduces Total Cost of Ownership (TCO) with reasonable licensing and maintenance costs compared to traditional OS options.


Cases of TmaxGooroom Implementation 



  

           

           
      Client Companies 


       National Health Insurance Service

 

       Project Details

       

        Used as a GuestOS for virtual PCs on the 
        internet network during network separation.


                                                                 

   

     
            

      
      Client Companies 


       Korea Post 

 

       Project Details 

       

       Used as a GuestOS for virtual PCs on the 
       internet network during network separation.
 


                                                                 

 
    
         

           
      
      Client Companies 


       LG Display

 

       Project Details 


        Educational institutions utilize it as a 
        replacement for existing OS in computer labs.


                                                                 


Ready for Digital Transformation?

Get answers to all your product and business-related inquiries from TmaxCloud experts.