News Stay informed about the latest enterprise technology news and product updates.

Enomaly debuts hardware-secured cloud computing

The new High Assurance Edition of Enomaly's cloud platform bets on Intel's Trusted Platform Module for security.

The Daily Cloud

Enomaly turns to Intel chip for security
Canadian cloud software maker Enomaly has announced a the High Assurance Edition of its cloud platform that trades on Intel's Trusted Platform Module (TPM) to guarantee security. TPM is a chip built into your server's mainboard that holds cryptographic information.

According to Enomaly, the security-minded can buy a bunch of servers with TPM technology onboard, rack them up and install the product. This ensures that whatever users and operators see is actually taking place on that hardware and not being delivered from somewhere else and pretending to be there.

This looks good for cloud providers who want to offer guarantees to their customers; private cloud enthusiasts may be less excited, since they probably know where their servers are.

It also looks like Enomaly may have beaten the big boys to the punch: EMC and VMware proposed a similar kind of solution at the RSA Conference in March but haven't delivered.

Enomaly's core technology, developed under an open source model, is now closed, so interested observers will be unable to independently verify whether Enomaly High Assurance Edition is actually secure.

RightScale launches grid edition
Cloud management firm RightScale has launched a snap-together cloud kit for pushing batch process jobs into Amazon Web Services. Users sick of waiting for that resource request approval can take their batch job, make sure it fits RightScale's grid-style Server Templates and let the company distribute it on as many nodes on EC2 as your departmental credit card can swallow.

It's based around Amazon's Simple Queue Service and S3, so this could be qualified as "aggressively simplified grid computing." Nerds remain free, however, to run their own nodes in EC2 without RightScale's help if they turn their noses up at point-and-click processing.

Dig Deeper on Cloud security tools

Start the conversation

Send me notifications when other members comment.

Please create a username to comment.