https://store-images.s-microsoft.com/image/apps.54664.5d0a1077-d803-4ca9-8590-eb681d1bec31.952bcb17-ba86-437c-bc19-7eb4c7b78491.54494152-b1e1-467f-a982-8dcaffd25c0a
Data-in-Use Encrypting Mosquitto (Confidential Compute VM)
enclaive GmbH
Data-in-Use Encrypting Mosquitto (Confidential Compute VM)
enclaive GmbH
Data-in-Use Encrypting Mosquitto (Confidential Compute VM)
enclaive GmbH
Ensuring your IoT Data is handled securely from the moment it is created
Enclaive Mosquitto* – Confidential Compute Enterprise Enclave 4 SGX Protects IoT Data from Insider Attacks
Azure confidential computing instances offer the opportunity to quickly protect any application from insider threats, leveraging Intel® Software Guard Extensions (SGX)-enabled CPUs and enclaive’s Enterprise Enclaves software. With a single command, enclaive automatically creates a secure enclave that isolates and encrypts all application resources in runtime, at rest, and on the network to achieve the strongest end-to-end data protection available. No changes to the application code or SDKs are required.
Build and release faster with scalable IoT messaging products in the cloud. Enclaive provides flexible containers sized for any application, industry-leading communication protocols for enterprise-ready performance, and the highest level of cybersecurity.
Mosquitto is a free open-source MQTT broker. Mosquitto is an open-source implementation of a server for versions 5.0, 3.1.1, and 3.1 of the MQTT protocol. It also includes a C and C++ client library, and the mosquitto_pub and mosquitto_sub utilities for publishing and subscribing. Enclaive Mosquitto CCEE4SGX delivers a fast and effective way to protect Mosquitto-served data against unauthorized use, packaging secure ACC SGX instances. Mosquitto has a vulnerability common to virtually all applications. It stores data in plain text in memory. An insider can easily scan memory using public scanning tools to gain unfettered access to any sensitive information stored in memory. The enclaive Mosquitto – CCEE4SGX protects that data and the application itself from memory dump and file-based attacks, even when the host is completely compromised.
Mosquitto – CCEE4SGX provides a pre-configured instance and step-by-step instructions that help you quickly get a fully enclaive-protected Mosquitto IoT Broker running in an enclave on an Azure confidential computing instance (learn more regarding MS confidential compute here: https://azure.microsoft.com/en-us/solutions/confidential-compute/#overview).
Mosquitto CCEE4SGX supports the journey to zero trust.
*Any registered trademarks and rights therein are reserved to the respective owner. Any use by enclaive is for referential purposes only and does not indicate any sponsorship, endorsement or affiliation between the trademark owner and enclaive.
https://store-images.s-microsoft.com/image/apps.54666.5d0a1077-d803-4ca9-8590-eb681d1bec31.98b74e36-8b55-4884-b224-7b932d1b21f0.7a4b7d8c-bfa3-4abc-b5fc-9726adef1f42
https://store-images.s-microsoft.com/image/apps.54666.5d0a1077-d803-4ca9-8590-eb681d1bec31.98b74e36-8b55-4884-b224-7b932d1b21f0.7a4b7d8c-bfa3-4abc-b5fc-9726adef1f42
https://store-images.s-microsoft.com/image/apps.3461.5d0a1077-d803-4ca9-8590-eb681d1bec31.98b74e36-8b55-4884-b224-7b932d1b21f0.4634cf25-4d4f-4f7e-a087-ce12a32a2df5
https://store-images.s-microsoft.com/image/apps.53506.5d0a1077-d803-4ca9-8590-eb681d1bec31.98b74e36-8b55-4884-b224-7b932d1b21f0.7969e3f0-5f9b-446e-aaef-b45f69e15ec9
https://store-images.s-microsoft.com/image/apps.55414.5d0a1077-d803-4ca9-8590-eb681d1bec31.98b74e36-8b55-4884-b224-7b932d1b21f0.512eed83-f020-4629-a0a9-dcc5a5eeaa47