https://store-images.s-microsoft.com/image/apps.19761.f8f748ce-d619-47d9-9f03-a02efb95f2cb.ec0a8464-2a05-4614-ad4a-ded34f2f041b.8430a6b2-3a1d-4e10-b35e-7090a4ae01b9

Polaris Pro

Fr0ntierX Inc.

Polaris Pro

Fr0ntierX Inc.

Secure existing Docker workloads within a Trusted Execution Environment with encrypted data storage.

Overview

Fr0ntierX’s Polaris Pro Secure Container utilizes Confidential Virtual Machines (CVM) to isolate Docker workloads within a fully encrypted environment – CVMs offer full memory encryption with minimal overhead, shielding data from both the cloud provider and internal IT resources. With Polaris, sensitive information remains encrypted at all stages: at rest, in transit, and when in use.

Polaris Pro encrypts HTTP requests to protect against exposure risks. Our encryption process uses a public key provisioned on the client’s infrastructure and managed within the TEE by the Polaris secure proxy. With encryption handled transparently within the TEE, no workload changes are necessary.

All responses are automatically encrypted with the public key provided by the user’s request, and Polaris SDK securely and easily decrypts the information. Polaris SDK can perform the encryption and decryption inside either a server or browser environment.

Polaris Pro securely encrypts data across disks, cloud storage, databases, and more using a permanent key stored within the TEE. Access is restricted through an attestation policy, verifying workload integrity and can block SSH access or limit usage to pre-approved software versions. The Polaris SDK handles both encryption and decryption for seamless data protection.

Key Benefits

  • Data Encryption: Security at all stages – at rest, in transit, and in use

  • Complete Isolation: Workloads shielded from cloud providers and internal IT resources

  • Transparent Encryption: All requests and responses are automatically encrypted and decrypted

  • No Modifications Required: No workload changes necessary

  • Encrypted Data Storage: Securely store encrypted information

  • TEE-Based Decryption: Secure data decryption within a Trusted Execution Environment

  • Optional Software Version Pinning: Only allow pre-approved software versions to decrypt data

https://store-images.s-microsoft.com/image/apps.1464.f8f748ce-d619-47d9-9f03-a02efb95f2cb.c07e7b27-7dd6-4c3e-9a37-1180816af32b.54418ba8-cc06-4a19-af02-a413ef4dcf73
https://store-images.s-microsoft.com/image/apps.1464.f8f748ce-d619-47d9-9f03-a02efb95f2cb.c07e7b27-7dd6-4c3e-9a37-1180816af32b.54418ba8-cc06-4a19-af02-a413ef4dcf73