Trusted Computing

  • Intel TPM chips in nearly all of our servers
  • Deep integration with CoreOS Tectonic
  • More platforms coming soon!
Trusted Computing

Validate and trust individual node and cluster integrity, even in potentially compromised or even hostile data center conditions. A processor-based, tamper-resistant environment compares key server components to previously known, trusted states prior to booting.

  • Type 1

    Flexible Workhorse

    $ 0.40 / hour

    $ 268.80 / month

    4 Physical Cores @ 3.4 GHz
    (1 × E3-1240 v3)

    32 GB of DDR3 RAM
    (2 × 16 GB)

    120 GB of SSD
    (2 × 120 GB in RAID 1)

    2Gbps Bonded Network
    (2 × 1Gbps w/ LACP)

  • Type 2

    The Virtualizor

    $ 1.25 / hour

    $ 840 / month

    24 Physical Cores @ 2.2 GHz
    (2 × E5-2650 v4)

    256 GB of DDR4 ECC RAM
    (16 × 16 GB)

    2.8 TB of SSD
    (6 × 480GB SSD)

    Dual Mode High Performance HBA/RAID Card

    20Gbps Bonded Network
    (2 × 10Gbps w/ LACP)

  • Type 2A

    The ARMv8

    $ 0.50 / hour

    96 Physical Cores @ 2.0 GHz
    (2 × Cavium ThunderX)

    128 GB of DDR4 ECC RAM

    340 GB of SSD

    20Gbps Bonded Network

  • Type 3

    High I/O Monster

    $ 1.75 / hour

    $ 1176 / month

    16 Physical Cores @ 2.6 GHz
    (2 × E5-2640 v3)

    128 GB of DDR4 RAM
    (8 × 16 GB)

    120 GB of Redundant SSD
    (2 × 120 GB in RAID 1)

    1600 GB of NVMe Flash

    20Gbps Bonded Network
    (2 × 10Gbps w/ LACP)

LAYERS

  • Hardware Assisted Security

    Distributed Trusted Computing allows enterprises to cryptographically verify the integrity of their entire environment, from hardware to the distributed cluster.   This is increasingly important with agile / devops infrastructure management.

  • Integration with Tectonic

    We have partnered with CoreOS to enabled Trusted Computing as part of their Tectonic product.   We provide the hardware (including TPM chip).   We hope to add Windows as a Trusted Computing soon!

  • Simple and On Demand

    Trusted Computing allows security conscious users to be agile in their use of hardware, while still retaining the highest level of security and trust that what they are deploying on, is in fact secure.