Virtual appliances are becoming the preferred method for software and hardware vendors to distribute their technology for enterprise customers requiring an on-premise solution. Virtual appliances are virtual machine images designed to run in a virtualization platform. The recent industry trend has been for technology vendors to migrate to a virtual appliance form factor as it is cost-effective and easier for customers to deploy and manage.
Virtual appliances enable technology vendors to increase revenues by distributing technology in a format desired customers demand as well as opening up market opportunities through easier technology trials (“try before you buy”) that are not possible with hardware appliances. Virtual appliances also lower costs by reducing or eliminating hardware engineering, support and logistics. Technology providers can avoid the burden of hardware logistics and navigating complex import/export regulations for such specialized hardware appliances.
As technology vendors consider virtual appliances, they must also wrestle with how to secure the sensitive information that such virtual appliances can contain. Sensitive information in memory can be compromised and code reverse engineered. Virtual appliances can contain a variety of sensitive information including:
Compromising virtual appliance information can lead to lost revenue for technology vendors through pirated technology and copycat products. Without adequate protection for intellectual property, technology providers face the prospect of a customer becoming a competitor.
Both technology vendors and enterprises can be harmed if virtual appliances containing sensitive enterprise data is compromised. Damage can include tarnished reputations, monetary damage, and data breach reporting costs.
Technology providers, both hardware and software, are offering virtual appliances to their customers as a way of increasing revenues and decreasing costs. However, technology providers also need to protect their intellectual property and sensitive information. The legacy hardware approach to appliance security relied on creating a self-contained “black box” with costly to operate features such as tamper-evident seals to ensure that hardware was not compromised.
While it is possible to secure sensitive information with encryption when it is stored on disk (data at rest), such information is unprotected and open to compromise when it is in memory (data in use). Memory can be copied by a hypervisor administrator or via physical access and subsequently parsed to extract valuable secrets. For example, encryption keys for data at rest are typically kept in memory. Attackers can obtain a copy of memory, parse that memory to extract encryption keys, and then unlock the sensitive data at rest.
PrivateCore vCage enables software providers to secure their intellectual property, avoid the burden of hardware appliances, and protect customer data. PrivateCore vCage protects the contents of data in use with memory encryption, enabling technology providers to protect and control sensitive data. With vCage from PrivateCore, enterprises can now increase revenues by selling products containing valuable intellectual property in locations previously considered to be too risky.
Want to try vCage? Click here to download free vCage Manager software!