Continuum AI is now publicly available. Try out the first confidential LLM platform!

Resource library


Find here our brochures, case studies, curated papers, one-pagers, tutorials, and technical guides on our products, confidential computing, compliance, data privacy, and security.

DORA Encryption in use

How to address the “encryption in use” for DORA with confidential computing

Compliance

Kauz.ai case study cover

Kauz.ai leverages Continuum AI to provide confidential chatbots to its customers in regulated industries

Case studies

ZenDis case study cover

OpenDesk on Constellation: empowering sovereign workplace solutions for the public sector

Case studies

STACKIT logo and a cloud

STACKIT integrates Constellation into its sovereign cloud offering

Case studies

Bank photograph, old building

Powering zero-trust transactions at major European bank with MarbleRun

Case studies

Hope for justice case study cover

Confidential data exchange to combat human trafficking

Case studies

Edgeless Systems x Intel whitepaper

Protecting Kubernetes clusters in the cloud with confidential computing and Intel Xeon processors

Whitepapers

“Encrypted LocalAI” and how to deploy your own LLM confidentially

Applications

OCCRP case study cover

OCCRP migrates from GKE to Constellation for end-to-end confidentiality

Case studies

accenture logo and in the background the accenture offices

Leveraging EGo and Intel SGX to detect insurance fraud

Case studies

Collaboard logo with a whiteboard in the background

Collaboard uses Constellation to safely host sensitive data on public clouds

Case studies

Bosch logo in white with a picture of the bosch offices in the background

MarbleRun Enables Bosch’s Confidential AI Pipeline in the Public Cloud

Case studies

Getting started with Constellation

Getting started with Constellation

Videos

Edgeless Systems x Accenture webinar cover.svg

Intro to confidential computing in finance

Webinars

Uniklinik freiburg case study cover

University Clinic Freiburg moves to the cloud with Confidential Kubernetes

Case studies

Constellation x nextcloud

How to set up confidential Nextcloud

Applications

Constellation x rocketchat

How to set up always-encrypted Rocket.Chat

Applications

Constellation x gitlab

How to set up confidential Gitlab

Applications

VC3 research paper

VC3: Trustworthy data analytics in the cloud using SGX

Curated papers

Confidential Kubernetes security analysis with green gradient background and circles

Confidential Kubernetes security analysis

Curated papers

Encryption and anonymization of personal data with confidential computing on white to purple gradient

Legal report: Encryption and anonymization of personal data with confidential computing

Curated papers

Cover Self managed vs managed resource

An analysis of responsibilities

Whitepapers

Cover K8s distributions resource - green gradient background

A comparison of Kubernetes engines: from basic functionality to security

Whitepapers

Cover cc whitepaper resource - green gradient background

How to process data securely on third-party infrastructure

Whitepapers