Glen Otero
Glen Otero Vice President of Scientific Computing at Translational Genomics Research Institute (TGen)
“Fortanix is helping accelerate AI deployments in real world settings with its confidential computing technology. The validation and security of AI algorithms using patient medical and genomic data has long been a major concern in the healthcare arena, but it's one that can be overcome thanks to the application of this next-generation technology.”
TGen

Why Confidential AI

Prev Image
Build smarter models with more relevant data

Build smarter models with more relevant data

Availability of relevant data is critical to improve existing models or train new models for prediction. Out of reach private data can be accessed and used only within secure environments. Use of confidential computing in various stages ensures that the data can be processed, and models can be developed while keeping the data confidential even when while in use.

Keep models secure and protect intellectual property

Keep models secure and protect intellectual property

Organizations need to protect intellectual property of developed models. With increasing adoption of cloud to host the data and models, privacy risks have compounded. Fortanix C-AI makes it easy for a model provider to secure their intellectual property by publishing the algorithm in a secure enclave. The cloud provider insider gets no visibility into the algorithms.

Easily deploy and provision with a managed service

Easily deploy and provision with a managed service

With limited hands-on experience and visibility into technical infrastructure provisioning, data teams need an easy to use and secure infrastructure that can be easily turned on to perform analysis. As a SaaS infrastructure service, Fortanix C-AI can be deployed and provisioned at a click of a button with no hands-on expertise required.

Furnish proof of execution to meet the most stringent privacy regulations

Furnish proof of execution to meet the most stringent privacy regulations

Secure infrastructure and audit/log for proof of execution allows you to meet the most stringent privacy regulations across regions and industries.

Get instant project sign-off from security and compliance teams

Get instant project sign-off from security and compliance teams

Get instant project sign-off from your security and compliance teams by relying on the Worlds’ first secure confidential computing infrastructure built to run and deploy AI.

Trusted vendor with breakthrough security heritage

Trusted vendor with breakthrough security heritage

Work with the industry leader in Confidential Computing. Fortanix introduced its breakthrough ‘runtime encryption’ technology that has created and defined this category.

Next Image

Talk to our experts for a free assessment of your AI project infrastructure

How Confidential AI Works?

01

Readily available and managed confidential infrastructure

Readily available and managed confidential infrastructure

Fortanix C-AI provides a readily available managed Confidential Computing infrastructure that’s easy to deploy and provision. The solution is powered on Intel Ice Lake third generation scalable Xeon processors.

02

Run AI models inside Intel SGX and other enclave technologies

Run AI models inside Intel SGX and other enclave technologies

AI models and frameworks are enabled to run inside confidential compute with no visibility for external entities into the algorithms.

03

Hardware-backed proof of execution and audit logging

Hardware-backed proof of execution and audit logging

The solution offers organizations with hardware backed proofs of execution of confidentiality and data provenance for audit and compliance. Fortanix also provides audit logs to easily verify compliance requirements to support data regulation policies such as GDPR.

04

Support for a broad set of AI/ML models

Support for a broad set of AI/ML models

AI high performers have standard tool frameworks and development processes in place for developing AI models. Fortanix Confidential-AI supports a range of models such as Yolov 5, Decision Trees, SVM, Linear regression, KNN etc

05

Protect data across all stages of MLOps

Protect data across all stages of MLOps

The service provides multiple stages of the data pipeline for an AI project and secures each stage using confidential computing including data ingestion, learning, inference, and fine tuning.

06

Works on Azure

Works on Azure

Fortanix managed and deployed infrastructure works on Azure AKS with SGX enabled nodes

07

Dataset connectors support data ingestion

Dataset connectors support data ingestion

Dataset connectors help bring data from Amazon S3 accounts or allow upload of tabular data from local machine.

Prev Image

01

Readily available and managed confidential infrastructure

Fortanix C-AI provides a readily available managed Confidential Computing infrastructure that’s easy to deploy and provision. The solution is powered on Intel Ice Lake third generation scalable Xeon processors.

02

Run AI models inside Intel SGX and other enclave technologies

AI models and frameworks are enabled to run inside confidential compute with no visibility for external entities into the algorithms.

03

Hardware-backed proof of execution and audit logging

The solution offers organizations with hardware backed proofs of execution of confidentiality and data provenance for audit and compliance. Fortanix also provides audit logs to easily verify compliance requirements to support data regulation policies such as GDPR.

04

Support for a broad set of AI/ML models

AI high performers have standard tool frameworks and development processes in place for developing AI models. Fortanix Confidential-AI supports a range of models such as Yolov 5, Decision Trees, SVM, Linear regression, KNN etc

05

Protect data across all stages of MLOps

The service provides multiple stages of the data pipeline for an AI project and secures each stage using confidential computing including data ingestion, learning, inference, and fine tuning.

06

Works on Azure

Fortanix managed and deployed infrastructure works on Azure AKS with SGX enabled nodes

07

Dataset connectors support data ingestion

Dataset connectors help bring data from Amazon S3 accounts or allow upload of tabular data from local machine.

Next Image
Readily available and managed confidential infrastructure
Run AI models inside Intel SGX and other enclave technologies
Hardware-backed proof of execution and audit logging
Support for a broad set of AI/ML models
Protect data across all stages of MLOps
Works on Azure
Dataset connectors support data ingestion
Securing Healthcare

Securing Healthcare AI with Confidential Computing

Download Whitepaper

We cover use cases across industries.
Here’s a snapshot.

HealthcareHealthcare

  • Speech analytics and sentiment analysis to provide better tele-customer service in healthcare
  • Fraud claim detection for health insurance
  • Diagnosing medical conditions in radiology images
  • Disease prediction using historical medical data

BankingBanking

  • Abnormalities and trend analysis within financial planning
  • Capital market trends and mood analysis
  • Fraud detection with ML

InsuranceInsurance

  • Churn prediction for customers at risk
  • Forecasting of claims and triage analytics
  • Underwriting and other automatic workflows

RetailRetail

  • Purchase pattern analysis and targeted marketing
  • Predictive purchase analysis using customer profile data
Take Your Free Assessment
DSM SaaS Thumb
x