Welcome!

Blog Feed Post

Announcing Enomaly ECP High Assurance Edition for Trusted Cloud Computing

Uses A Variety of Hardware Assisted Security Mechanisms

Today I am in Beijing, China at the Intel Developer Forum (IDF) and am happy to announce the latest Enomaly product offering, The ECP High Assurance Edition (HAE). ECP HAE has been something we've been busy developing in partnership with Intel over the last 18 months and continues on the previous research of world renowned security expert Dr. David Lie from the University of Toronto. The platform uses a variety of hardware assisted security mechanisms to provide what we believe is the most secure public cloud computing platform for service providers available today. In this post, I thought I'd take a moment to dive into some of the technical capabilities of HAE and our rationale.

Like it or not, security concerns have been a key factor limiting the adoption of cloud computing services. We believe that customers with higher security requirements, such as banks, health and government agencies, have been right to be cautious about the security capabilities of exiting public clouds. Our new technology will enable these customers to begin to reap the benefits of cloud computing, by giving them reliable proof the underlying environment hasn't been compromised. In the most simple terms, ECP HAE provides a trusted and verified cloud computing infrastructure.

To give a little more background, the Enomaly ECP HAE platform allows a remote cloud user to establish trust in a cloud provider's platform. The end customer uses Enomaly's ECP HAE client, which uses our patented technology to verify the integrity of the cloud provider's software stack. When the client is connected to an "approved" HAE-verified platform, Enomaly's HAE client displays a prominent positive verification screen indicating that the platform is safe to use. Validation can also be provided programmatically and integrated into existing application monitoring solutions and business processes engines which enables a extra level of verifiable trust when using remote cloud resources. If a remote providers environment changes for any reason you will know proactively before it's too late. HAE changes cloud security from a reactive process to a proactive one and enables a variety of new potential applications never possible before because of the lack of insight into cloud service providers' infrastructures. 

What might happen if the cloud provider's hypervisor were to be tampered with?  This could happen for a variety of reasons.  For example, a disgruntled employee at the cloud provider might want to steal secrets from the cloud provider's customers, or there could be a malicious insider paid by a competitor to spy on the VMs of the cloud users.  Similarly, the hypervisor itself may have a security vulnerability that is exploited, allowing a remote attacker outside of the cloud provider to tamper with the cloud provider's hypervisor. Since the hypervisor is the most trusted component in a cloud computing infrastructure, any loss of its integrity means an immediate and catastrophic breach of security which could easily never be detected because of the very nature of the hypervisor - it makes you or your applications see what whatever it whats you to believe. So even a exploited hypervisor will appear to be normal from the point of a virtual machine making VM based security a risky endeavor to say the least. HAE goes a long way toward solving this problem. 

Enomaly HAE enables our hosting & cloud service provider customers to securely establish the integrity of the remote platform. To do this, Enomaly's HAE system uses Intel's TXT processor extensions along with a Trusted Computing Group (TCG) Trusted Platform Module (TPM) in conjunction to the Xen hypervisor. We use a mechanism called remote attestation, which until now has only been explored [mostly] in experimental research settings. Thanks in part to the work of our lead security architect, Dr David Lie, we've taken the bold step of making attestation practical by integrating it into the ECP system targeting IaaS hosting providers. HAE takes care of all the complexity of making the attestation requests, ensuring that the requests cannot be tampered with and distilling the result of the attestation requests into a simple and easy to understand safe / not safe message. More importantly, this trust can be directly integrated into existing monitoring and business processes to ensure only truly secure remote cloud environments are being utilized in a completely automated way.

ECP High Assurance Edition is available immediately to service providers interested in offering a high-security cloud computing platform to their customers.  In addition to its unique security features, ECP HAE includes the industry-leading capabilities of Enomaly's ECP platform, enabling a service provider's customers to access and manage any number of virtual servers, running Microsoft Windows, Linux, Solaris, or any other operating system with the software applications of their choice.  Customers can access and manage their virtual servers through a web-based dashboard, and can also automatically scale up and down their use of cloud servers through a robust API.

We are delighted to be able to deliver this uniquely differentiated offering to our service provider customers We believe the fast-growing market for cloud computing services will benefit from the improved security that service providers can offer their customers by using Enomaly ECP HAE.

(Posted via email from China - please ignore any strange formatting).

 

More Stories By Reuven Cohen

An instigator, part time provocateur, bootstrapper, amateur cloud lexicographer, and purveyor of random thoughts, 140 characters at a time.

Reuven is an early innovator in the cloud computing space as the founder of Enomaly in 2004 (Acquired by Virtustream in February 2012). Enomaly was among the first to develop a self service infrastructure as a service (IaaS) platform (ECP) circa 2005. As well as SpotCloud (2011) the first commodity style cloud computing Spot Market.

Reuven is also the co-creator of CloudCamp (100+ Cities around the Globe) CloudCamp is an unconference where early adopters of Cloud Computing technologies exchange ideas and is the largest of the ‘barcamp’ style of events.

Latest Stories
Cloud-Native thinking and Serverless Computing are now the norm in financial services, manufacturing, telco, healthcare, transportation, energy, media, entertainment, retail and other consumer industries, as well as the public sector. The widespread success of cloud computing is driving the DevOps revolution in enterprise IT. Now as never before, development teams must communicate and collaborate in a dynamic, 24/7/365 environment. There is no time to wait for long development cycles that pro...
The level of trust we have with individuals, businesses, and technology affects our lives daily. This is important to remember when discussing new technologies. For example, our level of trust is a critical factor when evaluating a new technology as a potential solution for providing business value. Given the importance of trust, imagine one's reaction upon hearing that blockchain is a "trustless trust" system. On the surface, that does sound like an oxymoron. This paper discusses how "trustless...
Public clouds dominate IT conversations but the next phase of cloud evolutions are "multi" hybrid cloud environments. The winners in the cloud services industry will be those organizations that understand how to leverage these technologies as complete service solutions for specific customer verticals. In turn, both business and IT actors throughout the enterprise will need to increase their engagement with multi-cloud deployments today while planning a technology strategy that will constitute a ...
Data center, on-premise, public-cloud, private-cloud, multi-cloud, hybrid-cloud, IoT, AI, edge, SaaS, PaaS... it's an availability, security, performance and integration nightmare even for the best of the best IT experts. Organizations realize the tremendous benefits of everything the digital transformation has to offer. Cloud adoption rates are increasing significantly, and IT budgets are morphing to follow suit. But distributing applications and infrastructure around increases risk, introdu...
Moving to Azure is the path to digital transformation, but not every journey is effective. Organizations that start with a cohesive, well-planned migration strategy can avoid common mistakes and stay a step ahead of the competition. Learn from Atmosera CEO, Jon Thomsen about the opportunities and challenges found in three pivotal phases of the journey to the cloud: Evaluation and Architecting, Migration and Management, and Optimization & Innovation. In each phase, there are distinct insights tha...
Most modern computer languages embed a lot of metadata in their application. We show how this goldmine of data from a runtime environment like production or staging can be used to increase profits. Adi conceptualized the Crosscode platform after spending over 25 years working for large enterprise companies like HP, Cisco, IBM, UHG and personally experiencing the challenges that prevent companies from quickly making changes to their technology, due to the complexity of their enterprise. An accomp...
At CloudEXPO Silicon Valley, June 24-26, 2019, Digital Transformation (DX) is a major focus with expanded DevOpsSUMMIT and FinTechEXPO programs within the DXWorldEXPO agenda. Successful transformation requires a laser focus on being data-driven and on using all the tools available that enable transformation if they plan to survive over the long term. A total of 88% of Fortune 500 companies from a generation ago are now out of business. Only 12% still survive. Similar percentages are found throug...
Every organization is facing their own Digital Transformation as they attempt to stay ahead of the competition, or worse, just keep up. Each new opportunity, whether embracing machine learning, IoT, or a cloud migration, seems to bring new development, deployment, and management models. The results are more diverse and federated computing models than any time in our history.
Andrew Keys is co-founder of ConsenSys Enterprise. He comes to ConsenSys Enterprise with capital markets, technology and entrepreneurial experience. Previously, he worked for UBS investment bank in equities analysis. Later, he was responsible for the creation and distribution of life settlement products to hedge funds and investment banks. After, he co-founded a revenue cycle management company where he learned about Bitcoin and eventually Ethereum.
Bill Schmarzo, author of "Big Data: Understanding How Data Powers Big Business" and "Big Data MBA: Driving Business Strategies with Data Science" is responsible for guiding the technology strategy within Hitachi Vantara for IoT and Analytics. Bill brings a balanced business-technology approach that focuses on business outcomes to drive data, analytics and technology decisions that underpin an organization's digital transformation strategy. Bill has a very impressive background which includes ...
On-premise or off, you have powerful tools available to maximize the value of your infrastructure and you demand more visibility and operational control. Fortunately, data center management tools keep a vigil on memory contestation, power, thermal consumption, server health, and utilization, allowing better control no matter your cloud's shape. In this session, learn how Intel software tools enable real-time monitoring and precise management to lower operational costs and optimize infrastructure...
Most organizations are awash today in data and IT systems, yet they're still struggling mightily to use these invaluable assets to meet the rising demand for new digital solutions and customer experiences that drive innovation and growth. What's lacking are potent and effective ways to rapidly combine together on-premises IT and the numerous commercial clouds that the average organization has in place today into effective new business solutions. New research shows that delivering on multicloud e...
While a hybrid cloud can ease that transition, designing and deploy that hybrid cloud still offers challenges for organizations concerned about lack of available cloud skillsets within their organization. Managed service providers offer a unique opportunity to fill those gaps and get organizations of all sizes on a hybrid cloud that meets their comfort level, while delivering enhanced benefits for cost, efficiency, agility, mobility, and elasticity.
Darktrace is the world's leading AI company for cyber security. Created by mathematicians from the University of Cambridge, Darktrace's Enterprise Immune System is the first non-consumer application of machine learning to work at scale, across all network types, from physical, virtualized, and cloud, through to IoT and industrial control systems. Installed as a self-configuring cyber defense platform, Darktrace continuously learns what is ‘normal' for all devices and users, updating its understa...
Data center, on-premise, public-cloud, private-cloud, multi-cloud, hybrid-cloud, IoT, AI, edge, SaaS, PaaS... it's an availability, security, performance and integration nightmare even for the best of the best IT experts. Organizations realize the tremendous benefits of everything the digital transformation has to offer. Cloud adoption rates are increasing significantly, and IT budgets are morphing to follow suit. But distributing applications and infrastructure around increases risk, introdu...