Now is the Time to BedRock Your Critical Infrastructure and Applications

A formally verified, secure Trusted Computing Base (TCB) and BedRock Active SecurityTM with real time introspection for continuous monitoring protects mission critical environments and data. Critical infrastructure and applications are facing unprecedented security challenges due to increasing connectivity and the use of software defined data centric perimeter-less architectures. The rapid adoption and availability of virtualization […]
Build Applications on BedRock and Not Sand

BedRock Systems Inc. delivers an unbreakable foundation for formally secured computing. No one would build a skyscraper on a pile of sand, yet most corporations run their business applications on computing infrastructure riddled with flaws, flaws that slow down application development, increase maintenance costs, and are open to intrusion. Why? Frankly, they had no other […]
How to BedRock™ Your System

A nation’s infrastructure is worth protecting. There are 16 critical infrastructure sectors whose assets, systems, and networks, whether physical or virtual, are considered so vital to the United States that their incapacitation or destruction would have a debilitating effect on security, national economic security, national public health or safety, or any combination thereof. Presidential Policy […]
An Introduction to Virtual Machine Introspection

Virtual machine introspection (VMI) is a term coined by Garfinkel and Rosenblum in 2003 in their paper “A Virtual Machine Introspection Based Architecture for Intrusion Detection” and they describe VMI as the “approach of inspecting a virtual machine from the outside for the purpose of analyzing the software running inside it”. VMI and its capabilities […]