Continuum AI is now public. Try out the most secure GenAI service!

Resource library


Find here our brochures, case studies, curated papers, one-pagers, tutorials, and technical guides on our products, confidential computing, compliance, data privacy, and security.

Confidential AI cover EN green gradient with green circular lines

Confidential AI: Confidential computing for secure AI data processing in the public cloud

Whitepapers

DORA Encryption in use

How to address the “encryption in use” for DORA with confidential computing

Compliance

SEBI illustration

Address encryption of data in use for SEBI compliance

Compliance

Confidential computing for cloud service providers and local data centers purple gradient background

Confidential computing for cloud service providers and local data centers

Whitepapers

Kauz.ai case study cover

Kauz.ai leverages Continuum AI to provide confidential chatbots to its customers in regulated industries

Case studies

ZenDis case study cover

OpenDesk on Constellation: empowering sovereign workplace solutions for the public sector

Case studies

Cover Self managed vs managed resource

Self-Managed vs. Managed Kubernetes

Whitepapers

Cover K8s distributions resource - green gradient background

A comparison of Kubernetes engines: from basic functionality to security

Whitepapers

Bank photograph, old building

Powering zero-trust transactions at major European bank with MarbleRun

Case studies

STACKIT logo and a cloud

STACKIT integrates Constellation into its sovereign cloud offering

Case studies

Hope for justice case study cover

Confidential data exchange to combat human trafficking

Case studies

Getting started with Constellation

Getting started with Constellation

Videos

Uniklinik freiburg case study cover

University Clinic Freiburg moves to the cloud with Confidential Kubernetes

Case studies

Edgeless Systems x Intel whitepaper

Protecting Kubernetes clusters in the cloud with confidential computing and Intel Xeon processors

Whitepapers

“Encrypted LocalAI” and how to deploy your own LLM confidentially

Applications

OCCRP case study cover

OCCRP migrates from GKE to Constellation for end-to-end confidentiality

Case studies

Constellation x nextcloud

How to set up confidential Nextcloud

Applications

accenture logo and in the background the accenture offices

Leveraging EGo and Intel SGX to detect insurance fraud

Case studies

Constellation x rocketchat

How to set up always-encrypted Rocket.Chat

Applications

Constellation x gitlab

How to set up confidential Gitlab

Applications

Bosch logo in white with a picture of the bosch offices in the background

MarbleRun Enables Bosch’s Confidential AI Pipeline in the Public Cloud

Case studies

Collaboard logo with a whiteboard in the background

Collaboard uses Constellation to safely host sensitive data on public clouds

Case studies

Cover cc whitepaper resource - green gradient background

Confidential computing: How to process data securely on third-party infrastructure

Whitepapers

Confidential Kubernetes security analysis with green gradient background and circles

Confidential Kubernetes security analysis

Curated papers

Encryption and anonymization of personal data with confidential computing on white to purple gradient

Legal report: Encryption and anonymization of personal data with confidential computing

Curated papers

Edgeless Systems x Accenture webinar cover.svg

Intro to confidential computing in finance

Webinars

VC3 research paper

VC3: Trustworthy data analytics in the cloud using SGX

Curated papers