Confidential Cloud
Deploy and attest the security of cloud services in secure enclaves on public clouds.
Whether it’s a fine-tuned Machine Learning model, a complex IoT eco-system or a business-critical service, launch your application in a confidential enclave and get a proof you are in full control.

Architectural View
* simplified
Why choose Confidential Cloud?
Cloud computing is today widely used by individuals and organisations alike. However, using the cloud means a compromise in terms of data privacy, control over data placement and data portability across cloud providers. While some of the challenges have promising solutions, there are still ways to access the processed data.
VERIFY
Obtain a guarantee proving the that the running code and data have not been maliciously modified.
All involved parties get a proof of the security of the service running
KEEP CONTROL
End-users can set up TEEs and run cloud services inside such protected environments and keep full control over data, both at rest and while being processed.
COLLABORATE
Process data from several sources without exposing the raw data. This is much more efficient compared to other, cryptographic solutions.