https://store-images.s-microsoft.com/image/apps.29327.8e60639b-0adb-4413-bb03-1a23d5e4f50a.a3f8848f-33b0-4cad-bedf-98c955aa6bd4.691451e0-4df9-4c8e-b386-2be58296de5a

Cosmian Verifiable VM - RHEL 9

COSMIAN

Cosmian Verifiable VM - RHEL 9

COSMIAN

Cosmian vm is the only plug-and-play VM that guarantees the integrity and security of your environment, free from complexities.

Cosmian vm is a verifiable confidential virtual machine to easily protect your data in the cloud at every stage of its life cycle: at rest, in transit, and during processing

IMPORTANT: Only use DCasv5 or DCadsv5 machines

Key Features:

Advanced confidential computing

  • Memory encryption: Operating within a Trusted Execution Environment (TEE) and employing encrypted memory, our hardened VM ensures confidentiality and adds an extra layer of protection, safeguarding sensitive data even if physical memory is compromised.
  • Disk encryption: The Cosmian VM feature ensures the disk is encrypted with a key that is not accessible by the cloud provider.
  • End-to-end encryption: Embracing all encryption states, our solution secures data processing, ensuring protection throughout its lifecycle.

Environment verifiability

  • Software installation and snapshot verification: Install any Linux software and verify smooth operation before snapshotting. The snapshot, generated by the onboard Service Agent, captures hardware, boot sequence, and installed software with unique signatures.
  • Secured deployment in the cloud: Once deployed in the cloud, your machine runs securely, enabling users to access and utilize software with confidence.
  • Continuous monitoring and verification: Administrators can check boot, running software integrity, and absence of unauthorized changes, maintaining machine state consistency.