World's Most Secure Server.
Protected Confidential Execution.
High-Performance. Tamper-Proof. Cloud Ready.
ENFORCER™ SRX1 is the first powerful NIST FIPS 140-2 Level 4 certified¹ logical and physical tamper-proof server and high-performance next generation HSM that protects your x86 software and data with the highest level of logical and physical security. Operators (clouds, data centers, etc) cannot access client code or data, even with physical access and even when compelled.
Protect Everything
ENFORCER™ SRX1 can securely execute and verify full-fledged operating systems and applications within its tamper-proof security boundary.
Highlights
Remote Verification
Users can remotely verify security and integrity for hardware, software and data.
Extremely Powerful
ENFORCER™ SRX1 is hundreds of times more efficient than last generation HSMs.
Cost-Efficient
Orders of magnitude more cost-efficient than existing HSMs.
Next Generation HSM
SRX1 is composed of the revolutionary ENFORCER™ R1 compute blades. ENFORCER™ R1 are next generation hardware security modules certified to the highest level of security, NIST FIPS 140-2 Level 4¹.
Highlights
Universal Protection
With ENFORCER™ SRX1 you can secure any workload anywhere with full SEC-compliant FIPS 140-2 Level 4¹ security assurances.
Deployments
Both the ENFORCER™ SRX1 server and the tamper-proof compute blade ENFORCER™ R1 can be deployed in any security-sensitive settings.
Examples
Applications
Since it can run standard operating systems and software, the applications of ENFORCER™ SRX1 are limitless.
Examples
Comparison with Existing Hardware
ENFORCER™ | Standard server | Intel TXT/TPM | Intel SGX / AMD TZ | Standard HSM |
|
---|---|---|---|---|---|
Code Confidentiality | |||||
Data Confidentiality | |||||
Software Stack Integrity | |||||
Data Integrity | |||||
Secure Remote Verification | |||||
Software Side-channel Protection | |||||
Hardware Side-channel Protection | |||||
Software Isolation | |||||
Hardware Isolation | |||||
Built-in HSM | |||||
Physical Tamper-Evident | |||||
Physical Tamper-Resistant | |||||
Physical Tamper-Reactive | |||||
NIST-certified Reactive Zeroization | |||||
Physical Self-Destruct ² | |||||
Power Analysis Defenses ² | |||||
RF/EM Emanation Defenses | |||||
Does not require trust in data center software | |||||
Does not require trust in administrators | |||||
NIST FIPS 140-2 Level 3 certified ¹ | |||||
NIST FIPS 140-2 Level 4 certified ¹ | |||||
Can run x86 code | |||||
Can run off-the-shelf software | |||||
Can run without software customization | |||||
Does not require trust in large code base |