RelianceOne for KVM

Simple to implement security for Kernal-based Virtual Machines

Tactical virtualization presents a privileged attack surface for attackers to exploit. RelianceOne™ for kernel-based virtual machines (KVM) extends RelianceOne protection capabilities to support conventional virtualization use cases such as legacy software reuse and system size, weight, power reduction or consolidation. RelianceOne for KVM enables system engineers to leverage KVM for systems that will operate in the most hostile computing environments.

DOWNLOAD DATASHEET

Server-Virtualization.jpg

RelianceOne KVM Secure Virtualization

50%
Potential reduction in number and size of unnecessary software packages
30%
Potential attack surface reduction compared to standard KVM installations
Virtualization-File-Structure.jpg

Security Made Simple

RelianceOne for KVM thwarts attacks targeting the KVM hypervisor, extending and strengthening the protections around critical program information.

  • Verify the integrity and authenticity of all virtual machine artifacts with Secure Boot
  • Secure the world's most popular virtualization solution easily, confidently, and completely​
  • Minimize virtualization attack surface and eliminate unnecessary functionality that could be exploited
  • De-risk future programs by making your systems FMS-ready from the start​
Features
  • Hardened KVM host
  • Advanced data protections
  • Authenticity and confidentiality
  • Cyber resiliency for domestic use cases

BLOG

FMS Readiness: A Critical Paradigm to Maintaining US Technological Advantage

READ THE ARTICLE

WEBINAR

Software Security by Design

WATCH THE WEBINAR

BLOG

Is there a STIG for KVM? Investigating STIG Compliance as it Relates to Virtualization

READ THE ARTICLE

DISCOVER MORE

Webinar: How to Steal AI Algorithms at the Edge and Protect Them

Artificial Intelligence (AI) algorithms are increasingly deployed in edge environments, raising...

Read More

White Paper: Key Technology Considerations for Next-Gen Army Vehicles

Learn how the Army is modernizing with next-gen combat vehicles like the XM30 and RCV to achieve...

Read More

That’s classified! The history and future of NSA Type 1 encryption

The NSA Type 1 encryption program has a rich and complex history, shaped by evolving threats,...

Read More

Intercepted communications: Encryption standards for the defense edge

Encryption is a critical component of data security, providing a reliable method for ensuring the...

Read More