https://store-images.s-microsoft.com/image/apps.29327.8e60639b-0adb-4413-bb03-1a23d5e4f50a.a3f8848f-33b0-4cad-bedf-98c955aa6bd4.691451e0-4df9-4c8e-b386-2be58296de5a
Cosmian Verifiable VM - RHEL 9
COSMIAN
Cosmian Verifiable VM - RHEL 9
COSMIAN
Cosmian Verifiable VM - RHEL 9
COSMIAN
Cosmian vm is the only plug-and-play VM that guarantees the integrity and security of your environment, free from complexities.
Cosmian vm is a verifiable confidential virtual machine to easily protect your data in the cloud at every stage of its life cycle: at rest, in transit, and during processing
IMPORTANT: Only use DCasv5 or DCadsv5 machinesKey Features:
Advanced confidential computing
- Memory encryption: Operating within a Trusted Execution Environment (TEE) and employing encrypted memory, our hardened VM ensures confidentiality and adds an extra layer of protection, safeguarding sensitive data even if physical memory is compromised.
- Disk encryption: The Cosmian VM feature ensures the disk is encrypted with a key that is not accessible by the cloud provider.
- End-to-end encryption: Embracing all encryption states, our solution secures data processing, ensuring protection throughout its lifecycle.
Environment verifiability
- Software installation and snapshot verification: Install any Linux software and verify smooth operation before snapshotting. The snapshot, generated by the onboard Service Agent, captures hardware, boot sequence, and installed software with unique signatures.
- Secured deployment in the cloud: Once deployed in the cloud, your machine runs securely, enabling users to access and utilize software with confidence.
- Continuous monitoring and verification: Administrators can check boot, running software integrity, and absence of unauthorized changes, maintaining machine state consistency.