News

SCONE in a nutshell

Overview of SCONE's unique features

  • transparent encryption icon

    Transparent

    encryption

    SCONE can transparently encrypt files and network traffic and in this way, it protects data from unauthorized access via the operating system, the hypervisor or any software.

    Learn more
  • transparent attestation

    Transparent

    attestation of programs

    SCONE transparently attests programs to ensure that only the correct, unmodified programs are executing in a genuine SGX enclave. This also prevents malware to attach to programs.

  • curated images icon

    Curated

    images

    SCONE supports a set of curated images to simplify the task of the application developer. For most of the standard services, we will provide a SCONE image that runs inside of an SGX enclave. The application developer can customize the image via a Docker compose / stack file. We provide some examples in our SCONE tutorial.

  • Secure

    compose files

    SCONE supports secure compose files to protect secrets that are visible in Docker compose and stack files as well as Kubernetes metadata files.

    Learn more
  • secure enclaves

    Simplifying the use

    of secure enclaves

    SCONE executes programs inside secure enclaves - without requiring source code changes. We recommend recompiling applications but we support executing native Alpine applications inside containers. In this way, we are preventing even attackers with root access from stealing secrets from these programs.

    Learn more
  • transparent configuration

    Transparent configuration

    with secrets

    SCONE helps to configure programs with secrets that can neither be read nor modified by attackers - even if they would have already taken control of the operating system and/or the hypervisor. This is transparent to the application, i.e., does not require any source code changes.

  • application-oriented security

    Application-oriented

    security

    Ensure application security even in untrusted environments.

    Learn more
  • cross-compiler-support

    Cross-compiler

    support

    SCONE supports cross-compilers for C, C++, Rust, Go and an interpreter for Python.

    Learn more

SCONE Offers on the Azure Marketplace

SCONE Confidential PySpark on Kubernetes

We aim to provide an easy starting point for evaluating the SCONE Confidential PySpark offering.
It includes all the needed tools and images for running confidential PySpark applications in Kubernetes clusters.

Always encrypted

Confidential Spark protects your data and code by ensuring that code and data are ALWAYS encrypted - in use, in flight and at rest.

Support of large-scale tasks

Spark is a high-performance engine that fits your large-scale computing tasks and supports various programming languages.

Quickstart

Tutorial

  • Our tutorial provides an easy starting point for evaluating the SCONE Confidential PySpark offering. All the needed tools and images for running confidential applications in Kubernetes clusters are included.
Go to Tutorial

Azure Marketplace

Our Offer

  • Have a look at our offer on Azure Marketplace and get detailed information about:
  • possibilities,
  • plans and
  • pricing.
Go to Azure Marketplace

SCONE Confidential Computing Playground Virtual Machine

We aim to provide an easy starting point for evaluating the SCONE Confidential Computing Platform.
It includes all the needed tools for building confidential images (from scratch or from an existing native image) and deploying them.

Our Confidential Computing University explains:

  • SCONE Build

    How to build confidential container images from existing native Python images in one step. The resulting image runs on remotely-attested Intel SGX enclaves and has an encrypted filesystem.

    Watch Screencast
  • Confidential

    Service Meshes

    A service mesh facilitates the communication between services or microservices. We introduce a confidential service mesh which ensures end-to-end encryption with mutual authentication.

    Watch Screencast
  • Multi-Stakeholder

    Workflow

    We have multiple different partners collaborating whilst protecting their intellectual property (code, data) from each other and from cluster administrators.

    Watch Screencast
  • Multi-Stakeholder

    Machine Learning

    The objective of this work is to provide a platform that allows multiple stakeholders such data owner, code owner, model owner, who do not necessarily trust each other, still can come together an perform machine learning to unlock all the benefits of AI.

    Watch Screencast

Quickstart

Tutorial

  • Our tutorial provides an easy starting point for evaluating the SCONE Playground Confidential VM offering. All the needed tools and images and many examples and demos of the SCONE platform.
Go to Tutorial

Azure Marketplace

Our Offer

  • Have a look at our offer on Azure Marketplace and get detailed information about:
  • possibilities,
  • plans and
  • pricing.
Go to Azure Marketplace

Solutions

We provide developer-/operations-oriented documentation as well as scientific papers.

https://sconedocs.github.io/

Technical
Documentation

Tutorial and technical details.

Onboarding Icon

Quick
Demo

Our SCONE quick demo -
use SCONE after a few simple steps.

Publications

Scientific
Publications

We published several papers related to SCONE. A good starting point to read is our OSDI 2016 paper.

Services

We offer our customers different service levels

Community/Evaluation Edition
free

Standard Edition
ask €/year

  • Services run inside of enclaves - without the possibility of inspections
  • Business day support
  • Consulting
  • Priority support 24x7
Get standard now
Business Edition
ask €/year

  • Services run inside of enclaves - without the possibility of inspections
  • Business day support
  • Consulting
  • Priority support 24x7
Get Business now

Partners & Clients

We provide trusted execution support for our partners in industry and research labs.
Additionally, we supply consulting support as well as building Proof of Concepts for our customers.

Cloud Computing

Outsource the management of hardware and software components to a cloud provider and service providers.

AI/Machine Learning

SCONE supports confidential federated machine learning.
SCONE can protect the confidentiality and integrity of the training data, the generated model, and the interference.

Safety Computing

Confidential computing (CC) is an approach to secure data in use.
With SCONE CC, one can protect data, code, and secrets in use as well as in transit and at rest.

Healthcare

Especially in healthcare securing personally Identifiable Information (PII) is crucial.
PII is any information related to an identified or identifiable natural person.

Blockchain

Hardware-based privacy enables data confidentiality and secure computations.

Research

We have research collaborations with the following academic partners:

COMPANY

About SCONTAIN

Scontain GmbH is one of the leading companies in confidential computing domain. Scontain supports its customers to build confidential applications with the help of their SCONE platform. It has a strong partnership with cloud companies, e.g. Deutsche Telekom and Microsoft Azure.

SCONE Founding Team

Meet the founders: we have assembled an unprecedented level of hands-on talent under the roof.

Prof. Dr. Christof Fetzer

Co-Founder & COO, Trustworthy Systems Guru

Franz
Gregor

Co-Founder, Shield Execution Expert

Sergei Arnautov

Co-Founder, Lead Runtime Developer

Dr. Karin Fetzer

Co-Founder & interim CEO, Software Developer

Contact Us

If you are interested in the SCONE platform, SCONE curated images or if you want to work for us, please use the contact button below or send email to info@scontain.com

Send Message