CanaryBit unlocked Confidential AI with its first pilot customers

}
12 May 2024
m

During the last year, the CanaryBit team worked hard on five projects together with four of its pilot customers. The team used the services of its Confidential Cloud solution (Studio, Tower and Inspector) to run Confidential AI workloads and secure the customer’s infrastructure.

The projects validated several scenarios:

1) automated deployment of Trusted Execution Environment (TEEs) on Public and Edge cloud infrastructure resources;

2) verification of deployed TEEs for security and conformity assessment with and without Confidential GPU support;

3) running Confidential AI workloads on NVIDIA H100 for secure and confidential B2B collaboration

Thanks to the tight collaborations and close teamwork, CanaryBit demonstrated 1) the potential of its solutions and 2) the modular approach to integrate Confidential Computing technology in the customer deployments to fulfil stringent security requirements.

The projects focused on four evolving industries such as Cybersecurity, Healthcare, Automotive and Telco, where data protection and strong security mechanisms are becoming vital needs in the domains. Improved privacy and security of the data infrastructure showed several of the customers opportunities for future data monetization.

These collaborations will continue in the following years, with the customer’s main focus to either offer CanaryBit solutions to their market and customers, or integrate CanaryBit tools in their systems.

If you are also interested to run a PoC project with us to discover how CanaryBit solutions can help you improve your data and cloud security, get in touch!

YOU MAY ALSO LIKE …

Preparing for DORA – a new challenge for financial entities

Preparing for DORA – a new challenge for financial entities

Preparations underway The Digital Operational Resilience Act (DORA), establishes the European Union’s new regulatory framework for the management of digital risks in financial markets. You can get a PDF of the regulation from the EU commission website. It entered into...

Standardising Confidential Computing

Standardising Confidential Computing

Trusted Execution Environments have been around for a while now and keep evolving. As support for confidential computing is included in more commodity platform, standardising this approach is becoming increasingly important to accelerate updake. This is part one of a...

Enhancing the circularity of electric vehicle batteries

Enhancing the circularity of electric vehicle batteries

REmanufacture, REcycle, REuse and REduce: Mälardalen University is addressing these four main aspects of Circular Economy in a new project enabling circularity of electric batteries. It runs the project in close collaboration with the Swedish industry. The Circul8...