Since the hardware is below the hypervisor,
it can protect a VM from attackers who manage to attain hypervisor level privileges. Hyper wall also has hardware that collects trust evidence to send back to cloud customers attesting that their sensitive memory pages are protected.