Continuum AI is now public. Try out the most secure GenAI service!
Find here our brochures, case studies, curated papers, one-pagers, tutorials, and technical guides on our products, confidential computing, compliance, data privacy, and security.
Confidential AI: Confidential computing for secure AI data processing in the public cloud
Whitepapers
How to address the “encryption in use” for DORA with confidential computing
Compliance
Address encryption of data in use for SEBI compliance
Compliance
Confidential computing for cloud service providers and local data centers
Whitepapers
Kauz.ai leverages Continuum AI to provide confidential chatbots to its customers in regulated industries
Case studies
OpenDesk on Constellation: empowering sovereign workplace solutions for the public sector
Case studies
Self-Managed vs. Managed Kubernetes
Whitepapers
A comparison of Kubernetes engines: from basic functionality to security
Whitepapers
Powering zero-trust transactions at major European bank with MarbleRun
Case studies
STACKIT integrates Constellation into its sovereign cloud offering
Case studies
Confidential data exchange to combat human trafficking
Case studies
Getting started with Constellation
Videos
University Clinic Freiburg moves to the cloud with Confidential Kubernetes
Case studies
Protecting Kubernetes clusters in the cloud with confidential computing and Intel Xeon processors
Whitepapers
“Encrypted LocalAI” and how to deploy your own LLM confidentially
Applications
OCCRP migrates from GKE to Constellation for end-to-end confidentiality
Case studies
How to set up confidential Nextcloud
Applications
Leveraging EGo and Intel SGX to detect insurance fraud
Case studies
How to set up always-encrypted Rocket.Chat
Applications
How to set up confidential Gitlab
Applications
MarbleRun Enables Bosch’s Confidential AI Pipeline in the Public Cloud
Case studies
Collaboard uses Constellation to safely host sensitive data on public clouds
Case studies
Confidential computing: How to process data securely on third-party infrastructure
Whitepapers
Confidential Kubernetes security analysis
Curated papers
Legal report: Encryption and anonymization of personal data with confidential computing
Curated papers
Intro to confidential computing in finance
Webinars
VC3: Trustworthy data analytics in the cloud using SGX
Curated papers