What we do
The Fortanix Confidential Computing Manager enables applications to run in confidential computing environments, verifies the integrity of those environments, and manages the enclave application lifecycle. The solution orchestrates critical security policies such as identity verification, data access control, and code attestation for enclaves that are required for confidential computing.Download
Fortanix is the only turnkey solution that manages the entire confidential computing environment and enclave lifecycle including creation, deployment, monitoring, and auditing. The solution manages confidential computing infrastructure and applications across multiple public clouds and on-premises environments to provide complete visibility.
Existing Application Support
Unlike other approaches, Fortanix provides the flexibility to run and manage the broadest set of applications, including existing applications, new enclave-native applications, and pre-packaged applications.
Fortanix manages and enforces security policies including identity verification, data access control, and attestation to ensure the integrity and confidentiality of data, code, and applications. Using these policies, businesses can implement geo-fencing, and compute affinity to support data regulation policies such as GDPR.