What is Secure Provenance?

We have a concept around provenance in the way that we approach the product, and it manifests itself in the concept of “security provenance.” It starts as just an obsession with quality: of not accepting that you might get one thing, and a few other “things” come with it – and they may be at best substandard, at worst, malicious. That whole process starts when we start with the electronic design. It goes all the way back to how we write software, how we design electrical circuits, and so it comes from an obsession with quality and a little bit of curiosity, to really understand how that whole ecosystem works. It’s very unique to SoftIron.

If we are going to trust data centers with very valuable information, we should really know where that equipment is coming from. We deliver what we call a “white box audit” where a customer who has the right type of data, that is sensitive enough, they can come through and see that entire process, every line of source code before it gets compiled before it gets put into hardware. There is no outsource contract is in that entire process. There are no third-party vendors. No other manufacture can make this claim.



Request Free!