Solution Overview

Securing Compute Infrastructure

privatecore-cloud-confidenceSophisticated attack techniques exploit resources underneath the virtual machine layer, opening the possibility of compromising the virtual machines running on server infrastructure.  For example, physical access to servers allows data to be accessed through relatively simple attack vectors.  Servers in remote locations are touched by a variety of people including service providers, administrators, contractors, suppliers, and government agencies. Unauthorized physical access to servers can result in unauthorized data access with the consequence of compromised intellectual property, damaged reputations, breach reporting costs and lost revenues. Data can also be compromised without your knowledge as a service provider responds to lawful government requests for data.

The vCage Solution

Through innovative advancements in attestation, virtualization and cryptography, PrivateCore can validate the integrity of remote servers as well as protect data-in-use. PrivateCore vCage Manager software can remotely attest the integrity of Linux servers while vCage Host software transparently protects any application while in use on commodity x86 servers, combining the security of on-premise with the flexibility of the cloud. For the first time, enterprises and cloud service providers can verify the integrity of remote servers and securely execute applications on servers outside their physical control.