Secure Operating Environment
Server General instances use “Secure Boot” that validates all boot components in order to make sure that a newly started instance boots into an expected and healthy state.
Tamper Resistant Logs
Server General instances log activities at four separate locations in real-time. Even the administrators are unable to alter all four copies since three copies are stored outside of their administrative control.
Based On Open-Source
Server General instances make use of standard data encryption functionality embedded within the mainstream Linux kernel. This functionality is based on a stackable file system that was developed by Erez Zadok, CTO, Server General Inc.
Reduced Attack Surface
Server General instances are designed to run a single application server in a secure manner. The underlying OS is trimmed down to support just that one application server. This approach limits the attacker’s ability to launch a successful attack. The total footprint of our instances is around 850 MB .
Transparent Data Encryption
The application server data is encrypted at the file-system layer and not at the block layer using the AES algorithm. This in-kernel data encryption is quick and transparent. Moreover, you control the data encryption key while we help you manage it.
Protection Against “root”
The “root” user is not part of our trust model. Hence a malicious “root” can not easily gain access to the protected data sets in the clear-text. However, given enough money and time a motivated adversary can get past our security.
Pre Sale Questions
We don’t offer a free trial but if you are interested in it please get in touch with us by sending an email to [email protected] and we’ll be more than happy to assist you.
Not yet but it is coming soon.
We offer technical support on a 24×7 basis with a turnaround time of 8 hours. If you need a faster response time, then please contact us.
This is mostly done for accounting purposes. We are looking for solutions to get around this issue.
We have been around since 2015 and we have customers in the United States, Europe and Japan.
Our Google instances use automated scripts. You can run the configuration/management script by logging into the instance via SSH or you can use the “gcloud” command to run it.
Our Security Solutions
We provide three different types of security solutions - Google Cloud customers are able to use our “click-to-deploy” instance while the data center customers can download an ISO that can be used to deploy a secure MySQL appliance while other cloud platforms users can use our software agent.
*per instance per month
Your Data Center
*per machine per month
Your Server Anywhere
*per server per month