VMunity, security endpoints to cyber-borne threats

  • Secure sealed Ring 0 Hypervisor inaccessible to attackers
  • Virtual isolated computing environments
  • A secure minimum trusted computing base
  • Leverages the Trusted Platform Module (TPM chip) below the sealed VMunity Hypervisor
  • Enhance the resiliency of computing resources
  • Allow the enforcement of least privileges
  • Enable real time continuous monitoring

As a result every resource is tightly managed or eliminated: no folders are shared, configuration files are not shared by VMs, no backdoors are allowed, network connections are isolated and communications are handled with mandatory access controls.  Virtual environment resources are managed such that Denial of Service attacks that attempt to starve system resources are controlled and limited with maximum thresholds to ensure reliability.


The net result is an automated, lower-cost platform that can dramatically reduce the heavy overhead imposed by current cybersecurity defenses. 

VMunity Enterprise - Asset Assurance and Risk Management Platform

The Vir2us VMunity Enterprise Platform provides the technology required to protect network endpoints through Nano-isolation and a multidimensional COS matrix. By enclosing this Nano-isolation framework around the existing flawed computer architecture, the legacy infrastructure gains a layer of redundancy.  Nano-isolation within a single virtual computing environment will provide granular isolation to reduce the attack surface to a single file and/or single application. This granularity allows real time monitoring of system state while improving system performance by 10X or better over the most popular security solutions. This Platform delivers a secure computing ecosystem by employing the following features: