OC3 registrations are now open! Join the premier event for confidential computing online or in Berlin on March 27.

green lines, abstract motive

About confidential computing

How to process data securely on third-party infrastructure


Confidential computing is a new security paradigm that raises data protection to unprecedented levels.

What is confidential computing?

There are three states in which data can be: at rest, in transit or in use. Until now, encrypting data in use was not possible. Confidential computing changes that and keeps data even encrypted at runtime in memory. In addition, with confidential computing, the integrity of workloads can be cryptographically verified using remote attestation. This combination of runtime memory encryption and remote attestation enables secure data processing, even when the computing infrastructure is operated by a potentially untrustworthy third party.

Confidential computing diagram wide outlined

Read our whitepaper on confidential computing


Download our confidential computing whitepaper and learn everything that you need to know about confidential computing hardware, software, industry use cases, and where the technology is headed!

The form failed to load. Please send an email to contact@edgeless.systems. Loading likely fails because you are using privacy settings or ad blocks.

What are the use cases for confidential computing?

cloud icon

Infrastructure security


Fully isolate applications and data to eliminate infrastructure-based risks in the public cloud.

network icon

Multi-party computation​


Share information in a data clean room without exposing clear text (e.g., for fraud prediction, AML).

ai icon

Confidential AI​


Use (inference) and train AI models on end-to-end encrypted data, securing secrets and PII.​

Confidential computing solves the trust problem of the cloud


Confidential computing can take away the risks for companies of moving to the cloud even in highly regulated industries. It can also enable new forms of innovative cloud applications and is thus poised to unlock large value in our global economies. It will also likely act as a catalyst for other disruptive technologies like AI.

With confidential computing chart 2

Which industries can benefit from confidential computing?

01.

Healthcare


Confidential computing can enable secure multi-party training of AI for different purposes, e.g. using training data from different hospitals for cancer detection. The patients’ data remains confidential during each step of the process.

02.

Financial services


Through confidential computing, a retailer and a credit card company can cross-check their customer and transaction data for potential fraud while privacy is ensured because neither of them gets access to the original data.

03.

Public Sector & Defense


When dealing with the most sensitive data, protection must be at the highest levels possible. Confidential computing provides this security and enables the benefits of the cloud without having to trust anybody.

04.

Telecommunication


The telecommunication industry is responsible for critical infrastructure and is thus prone to cyber attacks. Confidential computing ensures the highest level of data security and enables the verification of workloads.

05.

Manufacturing

 

The Industry 4.0 generates large amounts of data from sensors and other sources. With confidential computing it is possible to effectively share and analyze that data to boost productivity while ensuring privacy and security.

06.

SaaS


SaaS companies inherently rely on scalable cloud offerings and need to trust the providers with sensitive customer data. Confidential computing ensures that nobody, not even system administrators, can access that data.

Confidential computing reduces the attack surface to a minimum

An enclave’s data and code are always encrypted on disk and in memory at runtime. The secure enclave is isolated from the main processor.​ Data is opaque to even those with privileges like administrators or the operating system and is safe from alteration. Below you can see the threat models of different iterations of confidential-computing enabled technologies. To know more, check out our wiki.

Threat model of confidential computing

Case study: How Bosch built a confidential AI pipeline


Bosch set up a highly scalable AI pipeline on Microsoft Azure that provides encryption in key parts of the video and image processing mechanism. Everything is done respecting European regulations and privacy, with no loss to analysis capabilities, and at a reasonable cost, thanks to the flexibility of a public cloud.

autonomous driving car

Any questions?


Interested in learning more about confidential computing? Contact us!

The form failed to load. Please send an email to contact@edgeless.systems. Loading likely fails because you are using privacy settings or ad blocks.