SYS-CON MEDIA Authors: Elizabeth White, Yeshim Deniz, Roger Strukhoff, Jason Bloomberg, Pat Romanski

Blog Feed Post

Announcing Enomaly ECP High Assurance Edition for Trusted Cloud Computing

Uses A Variety of Hardware Assisted Security Mechanisms

Today I am in Beijing, China at the Intel Developer Forum (IDF) and am happy to announce the latest Enomaly product offering, The ECP High Assurance Edition (HAE). ECP HAE has been something we've been busy developing in partnership with Intel over the last 18 months and continues on the previous research of world renowned security expert Dr. David Lie from the University of Toronto. The platform uses a variety of hardware assisted security mechanisms to provide what we believe is the most secure public cloud computing platform for service providers available today. In this post, I thought I'd take a moment to dive into some of the technical capabilities of HAE and our rationale.

Like it or not, security concerns have been a key factor limiting the adoption of cloud computing services. We believe that customers with higher security requirements, such as banks, health and government agencies, have been right to be cautious about the security capabilities of exiting public clouds. Our new technology will enable these customers to begin to reap the benefits of cloud computing, by giving them reliable proof the underlying environment hasn't been compromised. In the most simple terms, ECP HAE provides a trusted and verified cloud computing infrastructure.

To give a little more background, the Enomaly ECP HAE platform allows a remote cloud user to establish trust in a cloud provider's platform. The end customer uses Enomaly's ECP HAE client, which uses our patented technology to verify the integrity of the cloud provider's software stack. When the client is connected to an "approved" HAE-verified platform, Enomaly's HAE client displays a prominent positive verification screen indicating that the platform is safe to use. Validation can also be provided programmatically and integrated into existing application monitoring solutions and business processes engines which enables a extra level of verifiable trust when using remote cloud resources. If a remote providers environment changes for any reason you will know proactively before it's too late. HAE changes cloud security from a reactive process to a proactive one and enables a variety of new potential applications never possible before because of the lack of insight into cloud service providers' infrastructures. 

What might happen if the cloud provider's hypervisor were to be tampered with?  This could happen for a variety of reasons.  For example, a disgruntled employee at the cloud provider might want to steal secrets from the cloud provider's customers, or there could be a malicious insider paid by a competitor to spy on the VMs of the cloud users.  Similarly, the hypervisor itself may have a security vulnerability that is exploited, allowing a remote attacker outside of the cloud provider to tamper with the cloud provider's hypervisor. Since the hypervisor is the most trusted component in a cloud computing infrastructure, any loss of its integrity means an immediate and catastrophic breach of security which could easily never be detected because of the very nature of the hypervisor - it makes you or your applications see what whatever it whats you to believe. So even a exploited hypervisor will appear to be normal from the point of a virtual machine making VM based security a risky endeavor to say the least. HAE goes a long way toward solving this problem. 

Enomaly HAE enables our hosting & cloud service provider customers to securely establish the integrity of the remote platform. To do this, Enomaly's HAE system uses Intel's TXT processor extensions along with a Trusted Computing Group (TCG) Trusted Platform Module (TPM) in conjunction to the Xen hypervisor. We use a mechanism called remote attestation, which until now has only been explored [mostly] in experimental research settings. Thanks in part to the work of our lead security architect, Dr David Lie, we've taken the bold step of making attestation practical by integrating it into the ECP system targeting IaaS hosting providers. HAE takes care of all the complexity of making the attestation requests, ensuring that the requests cannot be tampered with and distilling the result of the attestation requests into a simple and easy to understand safe / not safe message. More importantly, this trust can be directly integrated into existing monitoring and business processes to ensure only truly secure remote cloud environments are being utilized in a completely automated way.

ECP High Assurance Edition is available immediately to service providers interested in offering a high-security cloud computing platform to their customers.  In addition to its unique security features, ECP HAE includes the industry-leading capabilities of Enomaly's ECP platform, enabling a service provider's customers to access and manage any number of virtual servers, running Microsoft Windows, Linux, Solaris, or any other operating system with the software applications of their choice.  Customers can access and manage their virtual servers through a web-based dashboard, and can also automatically scale up and down their use of cloud servers through a robust API.

We are delighted to be able to deliver this uniquely differentiated offering to our service provider customers We believe the fast-growing market for cloud computing services will benefit from the improved security that service providers can offer their customers by using Enomaly ECP HAE.

(Posted via email from China - please ignore any strange formatting).

 

More Stories By Reuven Cohen

An instigator, part time provocateur, bootstrapper, amateur cloud lexicographer, and purveyor of random thoughts, 140 characters at a time.

Reuven is an early innovator in the cloud computing space as the founder of Enomaly in 2004 (Acquired by Virtustream in February 2012). Enomaly was among the first to develop a self service infrastructure as a service (IaaS) platform (ECP) circa 2005. As well as SpotCloud (2011) the first commodity style cloud computing Spot Market.

Reuven is also the co-creator of CloudCamp (100+ Cities around the Globe) CloudCamp is an unconference where early adopters of Cloud Computing technologies exchange ideas and is the largest of the ‘barcamp’ style of events.

Latest Stories
Industry after industry is under siege as companies embrace digital transformation (DX) to disrupt existing business models and disintermediate their competitor’s customer relationships. But what do we mean by “Digital Transformation”? The coupling of granular, real-time data (e.g., smartphones, connected devices, smart appliances, wearables, mobile commerce, video surveillance) with modern technologies (e.g., cloud native apps, big data architectures, hyper-converged technologies, artificial in...
In his session at 21st Cloud Expo, Raju Shreewastava, founder of Big Data Trunk, provided a fun and simple way to introduce Machine Leaning to anyone and everyone. He solved a machine learning problem and demonstrated an easy way to be able to do machine learning without even coding. Raju Shreewastava is the founder of Big Data Trunk (www.BigDataTrunk.com), a Big Data Training and consulting firm with offices in the United States. He previously led the data warehouse/business intelligence and Bi...
Codete accelerates their clients growth through technological expertise and experience. Codite team works with organizations to meet the challenges that digitalization presents. Their clients include digital start-ups as well as established enterprises in the IT industry. To stay competitive in a highly innovative IT industry, strong R&D departments and bold spin-off initiatives is a must. Codete Data Science and Software Architects teams help corporate clients to stay up to date with the mod...
The Japan External Trade Organization (JETRO) is a non-profit organization that provides business support services to companies expanding to Japan. With the support of JETRO's dedicated staff, clients can incorporate their business; receive visa, immigration, and HR support; find dedicated office space; identify local government subsidies; get tailored market studies; and more.
Tapping into blockchain revolution early enough translates into a substantial business competitiveness advantage. Codete comprehensively develops custom, blockchain-based business solutions, founded on the most advanced cryptographic innovations, and striking a balance point between complexity of the technologies used in quickly-changing stack building, business impact, and cost-effectiveness. Codete researches and provides business consultancy in the field of single most thrilling innovative te...
CloudEXPO has been the M&A capital for Cloud companies for more than a decade with memorable acquisition news stories which came out of CloudEXPO expo floor. DevOpsSUMMIT New York faculty member Greg Bledsoe shared his views on IBM's Red Hat acquisition live from NASDAQ floor. Acquisition news was announced during CloudEXPO New York which took place November 12-13, 2019 in New York City.
With the introduction of IoT and Smart Living in every aspect of our lives, one question has become relevant: What are the security implications? To answer this, first we have to look and explore the security models of the technologies that IoT is founded upon. In his session at @ThingsExpo, Nevi Kaja, a Research Engineer at Ford Motor Company, discussed some of the security challenges of the IoT infrastructure and related how these aspects impact Smart Living. The material was delivered interac...
Atmosera delivers modern cloud services that maximize the advantages of cloud-based infrastructures. Offering private, hybrid, and public cloud solutions, Atmosera works closely with customers to engineer, deploy, and operate cloud architectures with advanced services that deliver strategic business outcomes. Atmosera's expertise simplifies the process of cloud transformation and our 20+ years of experience managing complex IT environments provides our customers with the confidence and trust tha...
In his session at 23rd International CloudEXPO, Raju Shreewastava, founder of Big Data Trunk, will provide a fun and simple way to introduce Machine Leaning to anyone and everyone. Together we will solve a machine learning problem and find an easy way to be able to do machine learning without even coding. Raju Shreewastava is the founder of Big Data Trunk (www.BigDataTrunk.com), a Big Data Training and consulting firm with offices in the United States. He previously led the data warehouse/busine...
CloudEXPO has been the M&A capital for Cloud companies for more than a decade with memorable acquisition news stories which came out of CloudEXPO expo floor. DevOpsSUMMIT New York faculty member Greg Bledsoe shared his views on IBM's Red Hat acquisition live from NASDAQ floor. Acquisition news was announced during CloudEXPO New York which took place November 12-13, 2019 in New York City. Our Silicon Valley 2019 schedule will showcase 200 keynotes, sessions, general sessions, power panels, and...
ShieldX's CEO and Founder, Ratinder Ahuja, believes that traditional security solutions are not designed to be effective in the cloud. The role of Data Loss Prevention must evolve in order to combat the challenges of changing infrastructure associated with modernized cloud environments. Ratinder will call out the notion that security processes and controls must be equally dynamic and able to adapt for the cloud. Utilizing four key factors of automation, enterprises can remediate issues and impro...
Intel is an American multinational corporation and technology company headquartered in Santa Clara, California, in the Silicon Valley. It is the world's second largest and second highest valued semiconductor chip maker based on revenue after being overtaken by Samsung, and is the inventor of the x86 series of microprocessors, the processors found in most personal computers (PCs). Intel supplies processors for computer system manufacturers such as Apple, Lenovo, HP, and Dell. Intel also manufactu...
When you're operating multiple services in production, building out forensics tools such as monitoring and observability becomes essential. Unfortunately, it is a real challenge balancing priorities between building new features and tools to help pinpoint root causes. Linkerd provides many of the tools you need to tame the chaos of operating microservices in a cloud native world. Because Linkerd is a transparent proxy that runs alongside your application, there are no code changes required. I...
BMC has unmatched experience in IT management, supporting 92 of the Forbes Global 100, and earning recognition as an ITSM Gartner Magic Quadrant Leader for five years running. Our solutions offer speed, agility, and efficiency to tackle business challenges in the areas of service management, automation, operations, and the mainframe.
The widespread success of cloud computing is driving the DevOps revolution in enterprise IT. Now as never before, development teams must communicate and collaborate in a dynamic, 24/7/365 environment. There is no time to wait for long development cycles that produce software that is obsolete at launch. DevOps may be disruptive, but it is essential. DevOpsSUMMIT at CloudEXPO expands the DevOps community, enable a wide sharing of knowledge, and educate delegates and technology providers alike.