Organizations today face a significant challenge in securing their distributed edge computing locations, including retail stores, manufacturing lines, and remote or mobile sites. Typical infrastructure deployments often resemble a patchwork of disparate components, creating a varied landscape of hardware, operating systems, and applications. This diversity not only complicates management and support but also presents a massive attack surface for bad actors.
Scale Computing Platform helps customers address this challenge with its secure-by-design approach. We understand that the security of your data and infrastructure is paramount. Our platform is designed with a security-first mentality, ensuring your edge deployment is protected against emerging threats.
Security is a critical consideration in selecting a platform, as it directly influences an organization's capability to protect its data and infrastructure. Although VMware is a well-established name in the industry, the inherent complexity of its deployment model can inadvertently expand the attack surface. This complexity not only increases the risk of potential security breaches but also elevates the likelihood of misconfigurations that could compromise the deployment's security.
By tightly controlling our software supply chain and locking down on-premises systems by eliminating additional client applications, network storage, and other common access protocols like SSH, and eliminating the need to open firewalls for remote access into your distributed locations, we also eliminate attack vectors. Simple and secure by default, this inherently increases the security of your applications, data, and infrastructure.
SC//Platform stands out with its 'secure by design' and 'secure by default' approach. SC//Platform has reduced software vulnerabilities with our secure appliance model that is easy to patch and maintain. This streamlined simplicity ensures that a secure deployment is achieved with considerably less effort and lower risk of misconfiguration, offering a more robust and efficient solution for organizational security needs.
Simplicity is at the core of all we do at Scale Computing, including security. This means there aren’t hundreds of pages of instructions for securing your SC//Platform deployment because security is an inherent part of the design, so you don’t have to do it.
Our 'Secure By Design' philosophy integrates zero-trust principles and Edge-Initiated Fleet Connectivity for robust edge computing security. This approach reduces vulnerabilities through outbound-only connections from each edge site. Secure Link further strengthens this security architecture by eliminating the need for traditional, less secure network access methods.
Additionally, the locked-down nature of SC//Platform's appliances reduces attack vectors. Key features like SC//HyperCore's full-stack updates and SC//Fleet Manager's centralized monitoring underpin this secure framework, providing comprehensive protection, simplified management, and reliable performance for distributed edge deployments.
By harnessing the power of hyperconvergence to streamline edge deployments, we consolidate computing, storage, and networking into a single, cohesive system, reducing the complexity traditionally associated with managing separate components, protocols, and access controls. Such simplification not only enhances ease of use but also significantly tightens security.
The unified nature of SC//Platform is by design, facilitated by the integration of SC//HyperCore and SC//Fleet Manager.
These core functionalities and centralized oversight reduce potential for configuration errors and provide issue monitoring and notifications.
Secure remote management of your edge locations are achieved through a simple but effective edge-initiated fleet connectivity architecture that is easier and more secure to deploy.
By focusing on simplicity at every level, SC//Platform bolsters security and improves usability while delivering uncompromised performance and functionality.
SC//Platform is designed to be 'Secure by Default,' meaning security isn't an option—it's a fundamental component ingrained in every aspect of the system. From the moment of deployment, SC//Platform operates with a robust security posture.
This approach eliminates the need for extensive configuration or additional security layers post-deployment.
Unlike alternative solutions requiring a long and complex “security best practices” checklist, SC//Platform is secure out of the box. This severely limits the potential for misconfiguration vulnerabilities.
This 'Secure by Default' philosophy not only simplifies the user experience but also offers peace of mind by ensuring that security is a given, not an option to be manually configured.
DCIG TOP 5 reports seek to help enterprises identify VMware vSphere alternatives. Download the 2024-2025 DCIG Top 5 VMware vSphere Alternatives reports. Get US and Global editions with insights on deployment options and migration tools.
SC//Platform is delivered as a unique locked-down appliance that is secure by default, eliminating the need for extensive security configuration typically required by other systems. This secure foundation is bolstered by the inclusion of SC//HyperCore, which integrates both the hypervisor and management tools, all safeguarded behind a robust built-in firewall.
A key feature is the integration of the entire virtualization layer, including a resilient storage layer, directly into the system. This design obviates the need for vulnerable storage protocols, 'controller' VMs, or Virtual Storage Appliance (VSA) VMs to access or operate the hyperconverged solution. Moreover, there's no dependence on an external management server for each local deployment, streamlining control and enhancing security.
The Autonomous Infrastructure Management Engine (AIME) at the heart of each SC//HyperCore system provides an important benefit when it comes to the security of your edge fleet. Rather than relying on a centralized or cloud-based resource to control and orchestrate actions required in each site, SC//HyperCore operates autonomously to monitor local conditions and automatically take actions to maintain site-level data and application availability.
This autonomous control plane keeps critical operational data and decision-making local to each site where devices can operate based on predefined policies without the need for either human or remote site intervention, which is inherently more secure.
The desire to process and keep sensitive, regulated, and private data within an edge location applies not only to your applications but to your infrastructure control as well.
AIME constantly monitors the state of the cluster and its environment, and then, using that model, can trigger appropriate actions and warnings. This real-time monitoring allows AIME to take note of insecure cluster configurations and security vulnerabilities. For example, AIME alerts users when their VMs are vulnerable to the Spectre exploit and offers guidance on corrective actions.
Ensuring consistent security updates for a variety of edge devices and systems is challenging, compounded by a mix of hardware and software components. This complexity can render even robust security protocols ineffective. Trying to manage patches for these complex deployments across hundreds or thousands of locations can become impossible. However, SC//Platform offers a solution that makes maintaining secure deployments feasible and straightforward.
At each location, SC//HyperCore's comprehensive full-stack update capabilities simplify the process of upgrading your infrastructure to a non-disruptive single click or command. By combining and testing upgrades of the entire infrastructure, BIOS, firmware, and software, SC//Platform simplifies the application of upgrades while ensuring stability at the same time.
At a fleet level, SC//Fleet Manager enables simple application and monitoring of updates across all your locations. This ensures that you can confidently maintain the security of your entire
SC//Fleet Manager’s revolutionary Secure Link feature allows administrators to manage workloads and infrastructure securely across their entire edge computing fleet directly from the cloud-based user interface. This seamless solution eliminates the need for VPNs or dedicated networks. When an authenticated user starts a Secure Link session, the remote site initiates an outbound connection to the SC//Fleet Manager Secure Link Server. This connection provides direct, browser-based access to infrastructure and workloads located at the edge. This streamlined approach not only enhances security but also simplifies the management of distributed computing resources, ensuring efficient and secure access at all times.
Secure Link streamlines remote management by eliminating the need for traditional solutions like VPNs or dedicated lines. These conventional approaches often incur high costs and require significant time and effort to establish and manage. In contrast, Secure Link presents a more efficient alternative, reducing both costs and the complexity of setup. Its design as a 100% browser-based solution means there's no necessity for arbitrary network access between remote sites and central cloud or data center systems. This approach not only tightens security but also greatly simplifies administration, combining enhanced protection with unparalleled convenience in a single, straightforward solution.
Distributed management and monitoring of SC//Platform is initiated via outbound connections from each edge site back to the centralized fleet management platform. This outbound-only architecture shields against unauthorized entry attempts, reducing vulnerability exposure.
Built-in remote access capabilities such as Secure Link, as well as ongoing event notifications and data collection, are “pushed” by the remote systems themselves, which validate the identity of the centralized management platform, and then initiate secure outbound connections from the secured edge location to the central monitoring service as required.
General
General
We are proud to have over more than a thousand positive customer reviews on the most trusted third-party industry reviews websites. Read what our customers have to say on Gartner Peer Insights, G2, and TrustRadius.