A verifiable confidential virtual machine to guarantee your environment integrity – hardware & software.
Unique cryptographic integrity check
Operate in a familiar environment
Streamline experience
Save time
What’s in Cosmian vm?
Environment verifiability
Software installation and snapshot verification
Install any Linux software and verify smooth operation before snapshotting. The snapshot, generated by the onboard Service Agent, captures hardware, boot sequence, and installed software with unique signatures.
Secured deployment in the cloud
Once deployed in the cloud, your machine runs securely, enabling users to access and utilize software with confidence.
Continuous monitoring and verification
Administrators can check boot, running software integrity, and absence of unauthorized changes, maintaining machine state consistency.
What’s in Cosmian vm?
Leveraging Confidential Computing
Memory encryption
Operating within a Trusted Execution Environment (TEE) and employing encrypted memory, our hardened VM ensures confidentiality and adds an extra layer of protection, safeguarding sensitive data even if physical memory is compromised.
High performance
Get high performance with less than 5% overload for optimum confidential computing efficiency.
Advanced compatibility
Compatible with AMD SEV-SNP, Intel TDX, TPM, and vTPM, ensuring broad hardware compatibility. Supports all platforms and will soon include confidential GPUs.
Considering running your sensitive data and applications to a cloud provider but worried about security risks? Look no further than Cosmian vm.
How do you set up & run Cosmian vm?
Machine and application set up
Application running
Install
Cosmian vm
on-premise or in a Cosmian vm in the cloud.
Install application dependencies
standard software installation time
Snapshot
Cosmian vm
3 to 4 minutes to capture a 20MB snapshot
Perform integrity checks over time
to verify the running code and infrastructure