Extending Cloud Security

Deploy workloads in confidential computing enclaves on public clouds. Keep full control over your data, services and configuration, free from cloud provider introspection. Choose when, where and how you share data.

Products & Services

For a Safer Cloud

Deploy and attest the security of cloud services in secure enclaves on public clouds. Whether it’s a cryptocurrency wallet, a fine-tuned machine learning model or a business-critical service, you can launch it in a confidential enclave and get a proof of your full control.

Blog

Stay up to date

Review: ENISA cybersecurity cloud-certification scheme

Just days before the end of 2020, the European Union Network and Information Security Agency (ENISA) launched a public consultation on a new draft candidate cybersecurity certification scheme. ENISA's primary stated goal with this is to "enhance trust in cloud...

2020: an unforgettable year in so many ways

At the start of this year you could often see us in different restaurants around Stockholm, enjoying our nice dinner, having a nice chat while figuring out how to build our idea, find the right people and tools to help us out reaching our first milestone and build a...

Review: Confidential VMs in Google Cloud Platform

Google has recently announced the introduction of Confidential VMs as first, beta product in the Confidential Computing ecosystem. The new concept of Google's Confidential VMs builds on top of the existing shielded VMs technology and adds a layer of security to the...

What is confidential computing and why should I care?

Cloud computing is widely used by individuals and organisations alike. It allows seamless data access across multiple devices, collaborative work and centralised data storage. However, using the cloud means a compromise in terms of data privacy, control over data...

Hello world!

We are live! ??

Contact Us

Contact us and ask about our solutions, open opportunities or simply say Hi!