Defense & Intelligence
It is no surprise that the defense and intelligence communities face some of the biggest and potentially most damaging cyber threats. Cybersecurity is a constant struggle between new attacks from bad actors and those charged with protecting critical systems. Systems that are not secure, are also not Safe and can’t protect the nation and the people. BedRock Systems provides the resiliency and survivability the defense and intelligence users require.
Defense & Intelligence Use Cases
Command and Control Information Systems
Command and Control Information Systems (CCIS) rely heavily on automation, with electronic equipment and computer networks as their primary components. A truly secure CCIS requires both integrity and availability. The BedRock Hypervisor provides these through software-defined architectures and cloud-like backend systems.

Drones
Be it for border control and surveillance, or to protect the airspace over airports and public events, highly autonomous drones have become the only viable option. Because of their high criticality and need to assure and protect the mission and its data, they need to be impenetrable and fail operational even when under cyber attack. Their highly sophisticated software for machine learning and advanced sensing, usually based on vulnerable stacks such as Linux, needs active security and monitoring to keep them on mission. BedRock provides both impenetrable safety and security against attacks to devices and CCIS, as well as active security with policy enforcement to protect the vulnerable applications, OS and containers, without the need to change them.
Ultra Secure Mobile
Ultra Secure Mobiles, like dual persona devices, allow for two separate, independent user environments on a single device. The BedRock Hypervisor ensures security conscious mobile devices, even in “bring your own device” scenarios. Availability and integrity are guaranteed, down to the resource partitioning of hardware devices involved in securing the different operating modes of the device. Active Security Policy ensures the defined behavior and protection of data based on a formally secure foundation.

Secure Workstation
Intelligence requires absolute security, guaranteed separation, and a defined flow of information. This is easily achieved with the BedRock Hypervisor. Formally proven separation and resource and communication policy can be managed and archived at the hypervisor level, assuring a secure workstation from any location.
Secure Cloud Infrastructure
As decentralized financial services heavily rely on cloud infrastructure, they accept the associated risk. The BedRock Hypervisor minimizes this risk, ensuring the confidentiality, integrity, and availability of all information stored on a government cloud infrastructure. Applications can run securely, even on untrusted or compromised cloud infrastructure, ensuring maximum objective security. Our formally verified, trusted computing base allows for innovation even while under attack.
Virtualization in the cloud and on the edge can reduce operational expenses and make information sharing easier. It also puts applications at risk of exposure if not executed with care. The BedRock Hypervisor enables organizations to run critical applications and securely store data on the cloud, even if cyber-attacks are attempted.





Ultra Secure Mobile
Ultra Secure Mobiles, like dual persona devices, allow for two separate, independent user environments on a single device. The BedRock Hypervisor ensures security conscious mobile devices, even in “bring your own device” scenarios. Availability and integrity are guaranteed, down to the resource partitioning of hardware devices involved in securing the different operating modes of the device. Active Security Policy ensures the defined behavior and protection of data based on a formally secure foundation.
Secure Workstation
Intelligence requires absolute security, guaranteed separation, and a defined flow of information. This is easily achieved with the BedRock Hypervisor. Formally proven separation and resource and communication policy can be managed and archived at the hypervisor level, assuring a secure workstation from any location.
Secure Government Cloud Infrastructure
As more government agencies and departments extend their information to the cloud, they accept the associated risk. The BedRock Hypervisor minimizes this risk, ensuring the confidentiality, integrity, and availability of all information stored on a government cloud infrastructure. Applications can run securely, even on untrusted or compromised cloud infrastructure, ensuring maximum objective security. Our formally verified, trusted computing base allows for innovation even while under attack.
Internet of Battlefield Things (IoBT)
The increasing capability in the instrumentation of the physical world, connectivity and compute at both the edge and cloud are making their way to the battlefield in what is known as the Internet of Battlefield Things (IoBT). By leveraging advancements in embedded systems, artificial intelligence, and machine learning warfighters have the ability to use “smart technologies” for improving situational awareness, response time, and achieving superior mission performance.
Like the Internet of Things, our increasing reliance on interoperability within these interconnected digital systems and platforms requires that their foundation is robust against vulnerabilities and attacks. With the IoBT however, there are other equally important characteristics that are critical to providing superior mission performance. Bedrock Systems formally proven unbreakable trusted virtualization with Active Security™ plays a key role to achieving these as well. Some examples include:
- The reduction of footprint (size, weight, and power) for improved mobility and mission performance
- A trusted interoperability / integration framework for agile force modernization and reduction of total life cycle cost
- Isolation and security laterally (i.e. Peer to Peer), vertically, and in multi-domain environments
- Enhancement of zero trust via the implementation of least functionality including the ability to secure your current software and operating systems against known and unknown attacks