Make Your Applications Confidential
UCSF's Center for Digital Health Innovation (CDHI) is pleased to be collaborating with Fortanix, Intel, and Microsoft Azure to establish a confidential computing platform with privacy preserving analytics to accelerate the development and validation of clinical algorithms. The platform will provide a “zero trust” environment to protect both the intellectual property of an algorithm and the privacy of healthcare data. Using Fortanix Confidential Computing Manager for orchestration of Intel’s SGX secure enclaves on Azure confidential computing infrastructure with Azure Kubernetes Service (AKS), and CDHI’s proprietary BeeKeeperAI data access, transformation, and orchestration workflows, the platform will reduce the time and cost of developing clinical algorithms.
— Michael S. Blum, MD FACC, Associate Vice Chancellor for Informatics and Chief Digital Transformation Officer, Executive Director, Center for Digital Health Innovation, Professor of Medicine, Cardiology at the University of California, San Francisco
Without Fortanix
Getting start using confidential computing requires the integration of multiple infrastructure components, rewriting applications and manually configuring and verifying applications running in enclaves.
With Fortanix
Fortanix is the only turnkey solution that manages the entire confidential computing environment and enclave lifecycle.
Without Fortanix
To get an application running in a secure enclave, developers must rewrite applications using open-source SDKs. This take time and often discourages the use of confidential computing.
With Fortanix
Fortanix makes it possible to enable existing applications, enclave-native applications, and pre-packaged application to run in a secure enclave in minutes. This capability in unique and enables widespread adoption of confidential computing with no development or integration costs.
Without Fortanix
To securely implement confidential computing, critical services are required for authentication, encryption, attestation, and audit to ensure the integrity and confidentiality of data, code, and applications. These services are not built-into the infrastructure.
With Fortanix
Fortanix manages and enforces security policies including identity verification, data access control, and attestation to ensure the integrity and confidentiality of data, code, and applications. Using these policies, businesses can implement geo-fencing, and compute affinity to support data regulation policies such as GDPR. Fortanix also provides audit logs to easily verify compliance requirements.
Fortanix offers the most complete solution for confidential computing providing customers the fastest and easiest path to protect their applications and data.