Securing Critical Automotive Systems

Critical Automotive Systems

Alexander Damisch, Cofounder and VP Products at BedRock Systems   In 2015, the driver of a Jeep Cherokee lost control of the vehicle in the middle of a highway. Ten miles away, two hackers had taken over, turning the air conditioning on, changing the radio station, engaging the windshield wipers and eventually cutting the transmission. Thankfully, […]

Time for Critical Industry to BedRock its Infrastructure

Critical Infrastructure

Barely a week passes by without worrying news of an attack on the infrastructure we rely so heavily on. Who would have thought that the availability of the most essential foundations for life on this planet are at risk? While experts have warned for decades that we need to take action, the recent incident in […]

Formal Methods Address the Deficiencies Of the Traditional Development Processes

Formal Methods

Traditionally, software design relies on inefficient, ineffective, informal techniques to ensure that the software operates as intended. Consequently, bugs slip through the quality assurance process and companies spend a great deal of time and money trying to fix them. Formal methods techniques provide an alternative (but complementary) means to ensure quality. Using these techniques, developers build mathematical models of the systems and use logic to reason precisely about them.

Not All Hypervisors are Created Equally


BedRock HyperVisor™ or BHV™ is built with leading edge materials: a formally verified trusted computing base with a precise specification, so confidential data is protected and applications behave exactly as specified.

Build a Trusted Computing Base for Your Business Applications

critical infrastructure energy and utilities

New design ensures that company data is safe and applications perform as expected. By Osman Ismael Merriman-Webster defines trust as “one in which confidence is placed”. Nowadays, businesses have difficulty placing their trust in their computer systems because they constantly fall victim to attack. The problem is traditional hypervisor design is outdated. A hypervisor based […]

Now is the Time to BedRock Your Critical Infrastructure and Applications

Critical infrastructure

A formally verified, secure Trusted Computing Base (TCB) and BedRock Active SecurityTM with real time introspection for continuous monitoring protects mission critical environments and data. Critical infrastructure and applications are facing unprecedented security challenges due to increasing connectivity and the use of software defined data centric perimeter-less architectures.  The rapid adoption and availability of virtualization […]

Build Applications on BedRock and Not Sand

formally secured computing.

BedRock Systems Inc. delivers an unbreakable foundation for formally secured computing. No one would build a skyscraper on a pile of sand, yet most corporations run their business applications on computing infrastructure riddled with flaws, flaws that slow down application development, increase maintenance costs, and are open to intrusion. Why? Frankly, they had no other […]