Make Your Applications Confidential

Data is often encrypted at rest, in storage, and in transit across the network, but applications and the sensitive data they process are vulnerable to unauthorized access and tampering at runtime.

Confidential Computing Manager

While confidential computing is revolutionizing how customers protect their sensitive data, organizations need to simplify the process of creating enclaves, managing security policies, and enable applications to take advantage of confidential computing. request a demo

Confidential Computing Solution

Fortanix offers application teams the fastest, easiest, and most complete solution to run enclave applications today. The Fortanix Confidential Computing Manager enables applications to run in confidential computing environments, verifies the integrity of those environments, and manages the enclave application lifecycle.

UCSF's Center for Digital Health Innovation (CDHI) is pleased to be collaborating with Fortanix, Intel, and Microsoft Azure to establish a confidential computing platform with privacy preserving analytics to accelerate the development and validation of clinical algorithms. The platform will provide a “zero trust” environment to protect both the intellectual property of an algorithm and the privacy of healthcare data. Using Fortanix Confidential Computing Manager for orchestration of Intel’s SGX secure enclaves on Azure confidential computing infrastructure with Azure Kubernetes Service (AKS), and CDHI’s proprietary BeeKeeperAI data access, transformation, and orchestration workflows, the platform will reduce the time and cost of developing clinical algorithms.

— Michael S. Blum, MD FACC, Associate Vice Chancellor for Informatics and Chief Digital Transformation Officer, Executive Director, Center for Digital Health Innovation, Professor of Medicine, Cardiology at the University of California, San Francisco

Without Fortanix
With Fortanix
Simplicity

Without Fortanix

Manual Management

Getting start using confidential computing requires the integration of multiple infrastructure components, rewriting applications and manually configuring and verifying applications running in enclaves.

With Fortanix

Enclave Lifecycle Management

Fortanix is the only turnkey solution that manages the entire confidential computing environment and enclave lifecycle.

Application Support

Without Fortanix

Re-write Applications

To get an application running in a secure enclave, developers must rewrite applications using open-source SDKs. This take time and often discourages the use of confidential computing.

With Fortanix

Broadest Set of Application Support

Fortanix makes it possible to enable existing applications, enclave-native applications, and pre-packaged application to run in a secure enclave in minutes. This capability in unique and enables widespread adoption of confidential computing with no development or integration costs.

Security

Without Fortanix

Build your own security

To securely implement confidential computing, critical services are required for authentication, encryption, attestation, and audit to ensure the integrity and confidentiality of data, code, and applications. These services are not built-into the infrastructure.

With Fortanix

Cryptographically enforced policy and auditing

Fortanix manages and enforces security policies including identity verification, data access control, and attestation to ensure the integrity and confidentiality of data, code, and applications. Using these policies, businesses can implement geo-fencing, and compute affinity to support data regulation policies such as GDPR. Fortanix also provides audit logs to easily verify compliance requirements.

How it works

Fortanix offers the most complete solution for confidential computing providing customers the fastest and easiest path to protect their applications and data.

  1. User signs up for the Fortanix Confidential Computing Manager service at em.fortanix.com
  2. User installs node agent software and registers compute nodes with Fortanix Confidential Computing Manager.
  3. User authorizes their applications from Fortanix Confidential Computing Manager UI or through APIs, and then deploys them.
  4. The application automatically provides its attestation reports to Confidential Computing Manager and obtains a certificate.
  5. Fortanix Confidential Computing Manager monitors the application health, integrity and confidentiality.
Ready to try Fortanix Confidential Computing Manager? Request a demo