Tuesday, December 6, 2022
HomeArtificial IntelligenceTop Confidential Computing Companies - MarkTechPost

Top Confidential Computing Companies – MarkTechPost

Data processing can be isolated within a secure central processing unit (CPU) using a cloud computing technology known as confidential computing. The CPU’s data and techniques employed to process this data are contained within the CPU’s environment. There are now more security risks as a result of cloud computing. Confidential computing handles additional IT security issues by working with the cloud.

Confidential computing encrypts company data by running it in secure enclaves that isolate data and code to bar unauthorized access even if the infrastructure is compromised. This entails that businesses can deploy critical apps on public clouds or other hosted environments without worrying about the security of their data.

The world’s computing has changed dramatically over the past ten years, thanks to cloud computing. Many businesses and organizations now use flexible solutions that scale up or down depending on the amount of power and storage they require at any one time instead of dedicated managed servers at locations they own. It has altered applications’ creation, development, and deployment, greatly enhancing automation and program coordination.

Estimates show that between 50% and 60% of workloads are still executed on on-site servers. Even while more and more of that percentage is expected to move to the cloud in the next years, there are certain reasons why organizations might choose to keep their data and computing on-premises or as a combination of cloud services and their own managed servers.

Highly sensitive data is subject to security concerns, and certain data categories, such as health information, frequently have rules governing how they should be handled.

Utilizing cloud-based resources introduces additional kinds of security risks. In contrast to cloud installations, where risks might also emanate from within the infrastructure, attacks on on-premises servers primarily originate outside the system. The development of confidential computing has addressed the increased security concerns associated with using the cloud. In the strictest sense, it refers to safeguarding a workload’s confidentiality. However, they like to think of this as a more general word that covers three key ideas:


To ensure that only the consumers have access to the data, it must be adequately segregated. Data protection is not a new concept, and there are numerous techniques for implementing so. Data in motion, or data being transferred over the network, can be protected by encrypting data sent out of an application. Current mechanisms concentrate on data at rest or data not currently being used, which can rely on encrypted data and/or disc images with a key known only by the tenant. In this instance, the key may be created randomly while the application runs while the sender and receiver are connected.

The third kind of data, referred to as data in use, must be safeguarded when using confidential computing. This entails providing safeguards to ensure that no other cloud tenants have access to the physical memory (such as RAM) being used by a customer. Protection for virtual machines is typically provided by hardware techniques (VMs). It can be done either with memory encryption, where the CPU automatically encrypts VM memory with distinct keys for each VM, or with partitioning, where the CPU performs hardware checks on the memory assigned to each VM and guarantees these boundaries are not breached. Both are offered by some operations, such as IBM Z Secure Execution.


Except for the tenant, no one else is allowed to change or tamper with customer data. Some of the techniques in use to protect data in the early versions did not prevent data manipulation. This made it possible to employ a replay attack, which depends on tricking a program into voluntarily disclosing secrets by feeding it updated information. Therefore, more recent applications of these technologies aim to prevent data manipulation.


Even with secure computing, the system must remain reliable.

It is necessary to show the client that the environment in which their application is executed is one that prioritizes confidentiality and integrity. They need to start with a secure root of trust, a fundamental element that is cryptographically secure, to accomplish this in a conventional setting. Typically, this comes in the form of a secure hardware module, such as a The industry standard for secure, specialized cryptographic processing is a trusted platform module (TPM). It is a specialized microcontroller that uses an internal set of cryptographic keys to secure systems. Trustworthy platform module, but they are researching several attestation techniques.

The CPU (or a security processor attached to it) attests that the contents of the VM and its encryption are configured properly because, in most confidential computing implementations, the CPU turns into a trusted entity. In this situation, attesting the hypervisor (or host operating system), which may not be reliable, is typically unnecessary. In some circumstances, a fully attested environment may still be recommended to avoid replay attacks and potential CPU vulnerabilities. In these situations, they want to certify the entirety of the hardware and software environment powering the client’s application. However, to better attest the entire platform, attesting the underlying hardware necessitates rethinking some of the fundamental components of a processing system with a more complicated root of trust than a TPM.

Where does secure computing stand right now?

They think that secret computing will spread like wildfire as a way to bolster security perimeters and make it possible to successfully deploy increasingly sensitive workloads on public clouds. To get there, however, huge technological gaps must be filled.

One of the major concerns that remain unresolved is how to vouch for the reliability of the components inside secure enclaves and the components that control them. They’re also figuring out how to automate the process of leveraging the newest hardware capabilities and provide a safe system for exchanging decryption keys and other sensitive information.

Here are some of the cool companies in confidential computing:


The goal of Fortanix is to assist in addressing cloud security and privacy issues. Without having to have faith in the cloud, Fortanix enables users to execute even the most critical applications more securely. With its Runtime Encryption technology, which is based on Intel SGX, Fortanix offers distinctive deterministic security by encrypting apps and data everywhere they are – at rest, in motion, and while being used. Global F100 customers are protected by Fortanix, which also powers IBM Data Shield and Equinix SmartKey? HSM-as-a-service. A Mountain View, California-based Gartner Cool Vendor, Fortanix is supported by venture capital.


Secret Computing®, a cryptography technology invented by Inpher, enables advanced analytics and machine learning models while maintaining data’s privacy, security, and distributed nature. Due to growing corporate and sovereign data privacy, security, and compliance regulations, it is getting harder to access valuable data sources as data-driven businesses and pervasive AI consumes more information. Data scientists may compliantly, securely, and privately compute on dispersed data with Inpher’s Secret Computing® products without ever moving or exposing the data.


“A security company called Profian offers goods and services in the Confidential Computing industry. The business is dedicated to open source software and bases its products on the open source project Enarx, which uses WebAssembly, a portable run-time binary format supported by all the major hardware platforms and currently being standardized by the W3C. As new platforms are released, such as AMD SEV and the Arm Confidential Compute Architecture (Arm CCA), and the IBM Power Series PEF, Profian enables businesses to deploy their current cloud-native applications across these platforms without redesigning or recompiling them. Existing platforms include Intel SGX and AMD SEV.”

Super Protocol 

“A universal decentralized protocol for distributed confidential computing has been developed by Super Protocol using the most recent advancements in blockchain and TEE. Within the Web3 community, Super Protocol provides an alternative to established cloud service providers and enables everyone to take part in the creation of cutting-edge technologies for the Internet of the future.”

Secretarium  LTD

Data protection is ensured while processing using a special combination of secure hardware and cryptography by Secretarium secure cloud technology. A new generation of privacy-respecting products that maintain data owners’ control over their data, secure sensitive data and enable secure data collaboration are being powered by it.


Decentriq was established to address the problems many businesses currently have with data sharing and collaboration. Anyone, internal or external, can effortlessly work on our platform’s most sensitive data without worrying about being exposed. Our secret computing-based underpinning technology makes this possible, ensuring that all data transferred is 100 percent safe and encrypted from beginning to end. Our technology is adaptable and supports a variety of use cases, including standalone analytics platforms and API integrations into your current infrastructure. No further IT expenditure is required. Just as you would with your current analytics platform, run and analyze queries on your data. You can customize user access, query types, and which data to share or disguise at the central level.

Note: We tried our best to feature the cool AI startups, but if we missed anything, then please feel free to reach out at Asif@marktechpost.com 
Please Don't Forget To Join Our ML Subreddit


  • https://research.ibm.com/blog/what-is-confidential-computing
  • https://www.forbes.com/sites/forbestechcouncil/2022/03/31/why-now-is-the-time-for-confidential-computing/?sh=403b5e17176a
  • https://www.ventureradar.com/keyword/Confidential%20Computing

Ashish kumar is a consulting intern at MarktechPost. He is currently pursuing his Btech from the Indian Institute of technology(IIT),kanpur. He is passionate about exploring the new advancements in technologies and their real life application.



Please enter your comment!
Please enter your name here

Most Popular

Recent Comments