BedRock Founders Perspective

As we progress into the third decade of the twenty-first century, our reliance on the digital infrastructure of computing and communications is growing dramatically. At the same time, computing infrastructure itself has been undergoing a major architectural transformation, in the form of the transition to public and private cloud computing, along with billions of internet-connected devices and general-purpose computing elements that connect to these clouds and perform critical operations. The trend of moving services online to the internet and using the cloud and internet devices to access these services has been underway for close to a decade now.

formal methods

Developing with Formal Methods at BedRock Systems, Inc.

The BedRock HyperVisorTM is a commercial, highly concurrent, verified virtualization platform that employs formal methods to enable proofs of complex, lock-free concurrent code; support automating proofs of large programs; and integrate with “informal” parts of the software lifecycle. Learn more about how we develop formal methods here at BedRock Systems. Click the image below to view the full whitepaper.

Trusted Computing Base Edge to Cloud for Government

As we progress into the third decade of the twenty-first century, our reliance on the digital infrastructure of computing and communications is growing dramatically. At the same time, computing infrastructure itself has been undergoing a major architectural transformation, in the form of the transition to public and private cloud computing, along with billions of internet-connected devices and general-purpose computing elements that connect to these clouds and perform critical operations. The trend of moving services online to the internet and using the cloud and internet devices to access these services has been underway for close to a decade now.

Zero Trust security model

How To Enhance Zero Trust – ZT

The Zero Trust security model relies on mutual authentication and the verification of device identity and integrity, both inside and outside the network, to provide secure access to applications and services. Device security is a foundational pillar of the Zero Trust architecture, even in cloud-based implementations. Integrating device security into a Zero Trust security model is critical to ensure that applications only get allowed access to resources at the compute level. Traditional threat monitoring and detection methods have struggled to keep up with the increasing interconnectedness of technology, and adding more sensors to networks to detect anomalous activity is not a sustainable solution. The use of Artificial Intelligence and Machine Learning techniques to detect zero-day attacks shows promise but still has limitations.