Since the hardware is below the hypervisor,
it can protect a VM from attackers who manage to attain hypervisor- level privileges. Hyperwall also has hardware that collects trust evidence to send back to cloud customers attesting that their sensitive memory pages are protected.