Register now for OC3, the premier event for confidential computing, on March 13 - free and online

green lines, abstract motive

About confidential computing

How to process data securely on third-party infrastructure

Confidential computing is a new security paradigm that raises data protection to unprecedented levels.

What is confidential computing?

There are three states in which data can be: at rest, in transit or in use. Until now, encrypting data in use was not possible. Confidential computing changes that and keeps data even encrypted at runtime in memory. In addition, with confidential computing, the integrity of workloads can be cryptographically verified using remote attestation. This combination of runtime memory encryption and remote attestation enables secure data processing, even when the computing infrastructure is operated by a potentially untrustworthy third party.

Confidential computing diagram wide outlined

Read our whitepaper on confidential computing

Download our confidential computing whitepaper and learn everything that you need to know about confidential computing hardware, software, industry use cases, and where the technology is headed!

Magazine open

What are the use cases for confidential computing?

cloud icon

Infrastructure security

Fully isolate applications and data to eliminate infrastructure-based risks in the public cloud.

network icon

Multi-party computation​

Share information in a data clean room without exposing clear text (e.g., for fraud prediction, AML).

ai icon

Confidential AI​

Use (inference) and train AI models on end-to-end encrypted data, securing secrets and PII.​

Confidential computing solves the trust problem of the cloud

Confidential computing can take away the risks for companies of moving to the cloud even in highly regulated industries. It can also enable new forms of innovative cloud applications and is thus poised to unlock large value in our global economies. It will also likely act as a catalyst for other disruptive technologies like AI.

With confidential computing chart 2

Which industries can benefit from confidential computing?



Confidential computing can enable secure multi-party training of AI for different purposes, e.g. using training data from different hospitals for cancer detection. The patients’ data remains confidential during each step of the process.


Financial services

Through confidential computing, a retailer and a credit card company can cross-check their customer and transaction data for potential fraud while privacy is ensured because neither of them gets access to the original data.


Public Sector & Defense

When dealing with the most sensitive data, protection must be at the highest levels possible. Confidential computing provides this security and enables the benefits of the cloud without having to trust anybody.



The telecommunication industry is responsible for critical infrastructure and is thus prone to cyber attacks. Confidential computing ensures the highest level of data security and enables the verification of workloads.




The Industry 4.0 generates large amounts of data from sensors and other sources. With confidential computing it is possible to effectively share and analyze that data to boost productivity while ensuring privacy and security.



SaaS companies inherently rely on scalable cloud offerings and need to trust the providers with sensitive customer data. Confidential computing ensures that nobody, not even system administrators, can access that data.

Confidential computing reduces the attack surface to a minimum

An enclave’s data and code are always encrypted, not only on disk but also in memory at runtime. The secure enclave is isolated from the main processor.​ Data is opaque to even those with privileges like administrators or the operating system and it is safe from alteration.

Threat model of confidential computing

Case study: How Bosch built a confidential AI pipeline

Bosch set up a highly scalable AI pipeline on Microsoft Azure that provides encryption in key parts of the video and image processing mechanism. Everything is done respecting European regulations and privacy, with no loss to analysis capabilities, and at a reasonable cost, thanks to the flexibility of a public cloud.

autonomous driving car

Any questions?

Interested in learning more about confidential computing? Contact us!