Make Your Applications Confidential

Data is often encrypted at rest, in storage, and in transit across the network, but applications and the sensitive data they process are vulnerable to unauthorized access and tampering at runtime.

thumbnail
CCM Logo

While confidential computing is revolutionizing how customers protect their sensitive data, organizations need to simplify the process of creating enclaves, managing security policies, and enable applications to take advantage of confidential computing.

Learn More

laptop ccm

Confidential Computing Solution

Fortanix offers application teams the fastest, easiest, and most complete solution to run enclave applications today. The Fortanix Confidential Computing Manager enables applications to run in confidential computing environments, verifies the integrity of those environments, and manages the enclave application lifecycle.

 michael
Michael S. Blum MD FACC, Associate Vice Chancellor for Informatics and Chief Digital Transformation Officer, Executive Director, Center for Digital Health Innovation, Professor of Medicine, Cardiology at the University of California, San Francisco
UCSF's Center for Digital Health Innovation (CDHI) is pleased to be collaborating with Fortanix, Intel, and Microsoft Azure to establish a confidential computing platform with privacy preserving analytics to accelerate the development and validation of clinical algorithms. The platform will provide a “zero trust” environment to protect both the intellectual property of an algorithm and the privacy of healthcare data. Using Fortanix Confidential Computing Manager for orchestration of Intel’s SGX secure enclaves on Azure confidential computing infrastructure with Azure Kubernetes Service (AKS), and CDHI’s proprietary BeeKeeperAI data access, transformation, and orchestration workflows, the platform will reduce the time and cost of developing clinical algorithms.
ucsf logo

Fortanix Short Logo

Without Fortanix

Simplicity

Simplicity

Enclave Lifecycle Management

Fortanix is the only turnkey solution that manages the entire confidential computing environment and enclave lifecycle.

Manual Management

Getting start using confidential computing requires the integration of multiple infrastructure components, rewriting applications and manually configuring and verifying applications running in enclaves.

Application Support

Application Support

Broadest Set of Application Support

Fortanix makes it possible to enable existing applications, enclave-native applications, and pre-packaged application to run in a secure enclave in minutes. This capability in unique and enables widespread adoption of confidential computing with no development or integration costs.

Re-write Applications

To get an application running in a secure enclave, developers must rewrite applications using open-source SDKs. This take time and often discourages the use of confidential computing.

Security

Security

Cryptographically enforced policy and auditing

Fortanix manages and enforces security policies including identity verification, data access control, and attestation to ensure the integrity and confidentiality of data, code, and applications. Using these policies, businesses can implement geo-fencing, and compute affinity to support data regulation policies such as GDPR. Fortanix also provides audit logs to easily verify compliance requirements.

Build your own security

To securely implement confidential computing, critical services are required for authentication, encryption, attestation, and audit to ensure the integrity and confidentiality of data, code, and applications. These services are not built-into the infrastructure.

Ready to Try Fortanix Confidential Computing Manager?

How CCM Works?

01

Signing Up for the CCM

diagram 1

User signs up for the Fortanix Confidential Computing Manager service at ccm.fortanix.com

02

Installing Node agent Software

diagram 2

User installs node agent software and registers compute nodes with Fortanix Confidential Computing Manager.

03

Authorization

diagram 3

User authorizes their applications from Fortanix Confidential Computing Manager UI or through APIs, and then deploys them.

04

Get a certificate

diagram 4

The application automatically provides its attestation reports to Confidential Computing Manager and obtains a certificate.

05

Monitoring

diagram 5

Fortanix Confidential Computing Manager monitors the application health, integrity and confidentiality.

Prev Image

05

Monitoring

Fortanix Confidential Computing Manager monitors the application health, integrity and confidentiality.

01

Signing Up for the CCM

User signs up for the Fortanix Confidential Computing Manager service at ccm.fortanix.com

02

Installing Node agent Software

User installs node agent software and registers compute nodes with Fortanix Confidential Computing Manager.

Next Image
diagram 1