antennas

Telco & high-tech

Confidential computing for the ICT industry


Telecommunications data is highly sensitive and the networks are part of countries' critical infrastructure. With confidential computing, this data stays always encrypted and networks functions can move to public clouds.

The best protection for telco data and intellectual property

cloud icon

Move virtualized network functions to the cloud


Telcos can move virtualized network functions like 5G core applications to public clouds, while keeping data always encrypted.

telecommunications icon - antenna

Protect critical telecommunications infrastructure


Eliminate infrastructure-based security risks and protect your digital assets with always-on encryption and remote attestation.

shield icon

Keep developer environments always encrypted


Leverage the public cloud while protecting your intellectual property by fully isolating your dev environments from the infrastructure.

Uncompromising data security and privacy with confidential computing


Confidential computing keeps data always encrypted - at rest, in transit, and in use. Your sensitive application is fully isolated from the infrastructure, facilitating privacy compliance, IP protection, and data sharing.

Always encrypted data chart

Security and compliance made easy

Cybersecurity & infrastructure security agency logo

Security for 5G


The US Cybersecurity & Infrastructure Security Agency advises organizations to run 5G "containers in TEEs to reduce the attack surface for containers, and to keep service providers and malicious insiders outside the Trusted Computing Base."

european flag

GDPR compliance


With confidential computing, organizations keep data always encrypted and ensure that even datacenter operators and cloud providers cannot access any data. This restricts access for foreign entities and fulfills privacy-by-design requirements.

made in germany

Open source. Multi cloud. Sovereign.


Our company and all our engineers are based in Germany. Everything we do is open source and works on multiple platforms.

“Within our innovation efforts in the area of confidential computing, we are actively cooperating with Edgeless Systems. EGo and MarbleRun facilitate the development effort and help to focus on solving the customer problems and implementing business logic in cloud environments.”


- Ivan Gudymenko
IT Security Architect at T-Systems

“We can now build a safe lock with confidential computing between companies so that data sets can be exchanged in a secure and privacy-preserving way. This was not possible before because of competition and privacy issues.”


- Giuseppe Giordano

Senior R&D Manager at Accenture 

“It’s great to see how MarbleRun makes Gramine-based confidential workloads scalable. Looking forward to seeing the two grow together.”


- Mona Vij

Principal Engineer at Intel Labs

Contact us


Are you interested to learn more about how confidential computing supports security, privacy, and innovation in the telco and high-tech sector? Contact us!