What is confidential computing?

There are three states in which data can be: at rest, in transit or in use. Until now, encrypting data in use was not possible. Confidential computing changes that and keeps data even encrypted at runtime in memory. In addition, with confidential computing, the integrity of workloads can be cryptographically verified using remote attestation. This combination of runtime memory encryption and remote attestation enables secure data processing, even when the computers belong to someone else.

Read our whitepaper on confidential computing

What are use cases for confidential computing?

Confidential computing solves the trust problem of the cloud

Confidential computing can take away the risks for companies of moving to the cloud even in highly regulated industries. It can also enable new forms of innovative cloud applications and is thus poised to unlock large value in our global economies. It will also likely act as a catalyst for other disruptive technologies like AI.

Which industries can benefit from confidential computing?

Case Study: How Bosch built a confidential AI pipeline

Confidential computing reduces the attack surface to a minimum

An enclave’s data and code are always encrypted, not only on disk, but also in memory at runtime. The secure enclave is isolated from the main processor.​ Data is opaque to even those with privileges like administrators or the operating system and it is safe from alteration.