Security as a Service - ATP (Advanced Threat Protection)
HardenedVault provides diverse infrastructure and platform security solution, with out-of-the-box security baselines that help you quickly achieve compliance with standards such as PCI-DSS, GDPR, HIPPA, and more. VED (Vault Exploit Defense) effectively defends against 0-day and N-day exploits and rootkits, giving your operations team valuable time to plan patches, while also extending the security team’s monitoring dimension to the Linux kernel.
Hardened Linux for arm64
$0.021 /hourBeyond compliance
- Ubuntu 22.04
- Security baselines base on CIS and STIG
- ClamAV anti-virus
- VED-LTS (Vault Exploit Defense), for Linux kernel runtime protection. This feature is designed to protect your digital assets from advanced threats such as 0-day Linux kernel exploits, privilege escalation, container escape, and rootkits.
- AIDE, for file system integrity management
- Other baselines formed based on malware attacks further enhance the system’s defense capability
Hardened Linux for x86_64
$0.05 /hourBeyond compliance
- Ubuntu 22.04
- Security baselines base on CIS and STIG
- Wazuh agent for SIEM (Security information and event management) and XDR (Extended detection and response) monitoring
- ClamAV anti-virus
- VED-LTS (Vault Exploit Defense), for Linux kernel runtime protection. This feature is designed to protect your digital assets from advanced threats such as 0-day Linux kernel exploits, privilege escalation, container escape, and rootkits.
- DNSCrypt-proxy, supporting DNSCrypt relays, local DNS-over-HTTPS, and more.
- AIDE, for file system integrity management
- Other baselines formed based on malware attacks further enhance the system’s defense capability
Hardened SIEM/XDR server with VED
$0.433 /hourBeyond compliance
- Ubuntu 22.04
- Security baselines base on CIS and STIG
- Wazuh manager and WEB UI: Vulnerability management and Audit system with Wazuh
- ClamAV anti-virus
- VED-LTS (Vault Exploit Defense), for Linux kernel runtime protection. This feature is designed to protect your digital assets from advanced threats such as 0-day Linux kernel exploits, privilege escalation, container escape, and rootkits.
- DNSCrypt-proxy, supporting DNSCrypt relays, local DNS-over-HTTPS, and more.
- AIDE, for file system integrity management
- Other baselines formed based on malware attacks further enhance the system’s defense capability
Attestation server
$?? /hourEVM (Ephemeral Virtual Machine)
- All features of Beyond compliance
- …
- …
- …
- …
Frequently Asked Questions
Need a larger plan?
If you are a self-sovereign citizen, you may want to consider a cloudless/trustless solution for your own cyber bunker (On-Premise). This means that you would be responsible for provisioning security features on your hardware, such as chipset security features, CBnT, TPM/FDE, SGX, TDX/SEV, etc. This would give you more control over the security of your system, but it would also be more complex to manage. We provide each building block of a full-stack solution for platform and infrastructure security, so you can choose the level of security that is right for you.
Contact Us