How to BedRock Your Traditional and Distributed Energy Resources

Formal Methods Defined from an Academic POV

Now is the Time to BedRock Your Critical Infrastructure and Applications

A formally verified, secure Trusted Computing Base (TCB) and BedRock Active SecurityTM with real time introspection for continuous monitoring protects mission critical environments and data. Critical infrastructure and applications are facing unprecedented security challenges due to increasing connectivity and the use of software defined data centric perimeter-less architectures. The rapid adoption and availability of virtualization […]
Build Applications on BedRock and Not Sand

BedRock Systems Inc. delivers an unbreakable foundation for formally secured computing. No one would build a skyscraper on a pile of sand, yet most corporations run their business applications on computing infrastructure riddled with flaws, flaws that slow down application development, increase maintenance costs, and are open to intrusion. Why? Frankly, they had no other […]
Trusted Computing Base Edge to Cloud for Government

A Foundation for Cyber Resilience & Zero Trust
BedRock Systems Announces the Launch of its Unbreakable Foundation for Formally Secured Computing

The new products, BedRock HyperVisor™ and BedRock Active Security™, are a foundational shift in computing and usher in a new era of safety and security to improve overall security posture, and protect mission critical workloads with an unbreakable foundation. (San Mateo, CA, October 14, 2020) — BedRock Systems announced today the launch of the first […]
How to BedRock™ Your System

A nation’s infrastructure is worth protecting. There are 16 critical infrastructure sectors whose assets, systems, and networks, whether physical or virtual, are considered so vital to the United States that their incapacitation or destruction would have a debilitating effect on security, national economic security, national public health or safety, or any combination thereof. Presidential Policy […]
An Introduction to Virtual Machine Introspection

Virtual machine introspection (VMI) is a term coined by Garfinkel and Rosenblum in 2003 in their paper “A Virtual Machine Introspection Based Architecture for Intrusion Detection” and they describe VMI as the “approach of inspecting a virtual machine from the outside for the purpose of analyzing the software running inside it”. VMI and its capabilities […]