We are searching for software developers with knowledge of Rust, C, Go or Python. Work from anywhere or join our team in Germany (Dresden) or Campina Grande (Brazil)!
Interested? Write us an email:
See job... (pdf) 20/04/2022
Watch this video of our partner T-Systems MMS to learn more about the practical application of Confidential Computing. From minute 8:58 on we give an insight in technological conrnerstones in an interview with our COO Prof. Christof Fetzer.
See video... 07/01/2022
is one of the Azure Marketplace offers by Scontain. It includes all the needed tools and images for running confidential PySpark applications in Kubernetes clusters and therefore provides an easy starting point for evaluating the SCONE Confidential PySpark offering.
Service meshes facilitate communication between services or microservices. We show how a confidential end-to-end encryption can be guaranteed with Intel SGX and the SCONE platform.
See Video... 27/10/2021
In this demo video we show how you can use applications where multiple stakeholders safely contribute their data and code with SCONE. In this demo video how you can provide a platform with Intel SGX and SCONE that allows different stakeholders to to work together safely. They don't have to necessarily trust each other to use the advantages of an AI.
See video... 27/10/2021
In this demo video we show how you can use SCONE applications where multiple stakeholders securely contribute their data and code.
See video... 27/10/2021
In this first of six videos, we motivate the need for confidential computing, explain what confidential computing is, and how to achieve confidential computing with the help of Intel SGX and the SCONE platform.
See video... 27/10/2021
New Partnerships for the future-proof IT-Security based on Confidential Computing.
Our slides explain how SCONE protects data and code through the attestation of the platform and code while enabling excellent performance. It further shows a use case about multi-stakeholder computation.
Watch the webcast "Transforming business through Confidential Computing, a Data Privacy breakthrough" with our partners Stefan Schäfer (OVHcloud), Richard Curran (Intel) and our Co-Founder Prof. Dr. Christof Fetzer.
Learn how Confidential Computing is transforming the industry in respect to Data Privacy. Join Stefan Schäfer from OVHcloud, Richard Curran from Intel Corporation and Christof Fetzer from Scontain for the OVHcloud Webcast. Register now:
With SCONE Confidential Computing one can ensure that for example the employer cannot read the encrypted data traffic of his employees despite web caching; the encryption of the communication can be checked.
With the support of Scontain, G-Core Labs was able to connect its cloud to Aggregion. Aggregion offers solutions for collaboration with data and creates partner ecosystems.
Magnit, one of Russia's leading food retail chains with more than 20,000 stores and 16 million daily visitors, has provided a trusted platform for managing digital advertising data. The platform was developed by Aggregion and Scontain and uses SCONE to protect customer data. (Image: Magnit)
With SCONE Confidential Computing you can protect the confidentiality of emails but still grant access to an auditor.
SCONE Confidential Computing facilitates the confidential outsourcing of services such as the management of VMs - and even critical services such as key management.
Microsoft Azure presents new applications for confidential computing in the video: Minute 10 shows the use case Magnit (retailer in Russia). Minute 18:50 shows the example of Microsoft's Lamna Hospital; both are based on the SCONE platform.
SecuStack, a German cloud operating system, will soon support Intel® SGX enclaves based on our SCONE platform. This ensures secure data exchange in cloud applications such as machine learning and multi-party computing.
Together with T-Systems Multimedia Solutions we published a white paper on the subject of trustworthy cloud-native computing in large Kubernetes clusters.
In our new short video we give a vivid and tangible overview of the goals and the background of Scontain.
Learn how to ensure confidentiality, integrity and freshness if your adversary has root and hardware access.
SCONE can transparently encrypt files and network traffic and in this way, it protects data from unauthorized access via the operating system, the hypervisor or any software.Learn more
SCONE transparently attests programs to ensure that only the correct, unmodified programs are executing in a genuine SGX enclave. This also prevents malware to attach to programs.
SCONE supports a set of curated images to simplify the task of the application developer. For most of the standard services, we will provide a SCONE image that runs inside of an SGX enclave. The application developer can customize the image via a Docker compose / stack file. We provide some examples in our SCONE tutorial.
SCONE supports secure compose files to protect secrets that are visible in Docker compose and stack files as well as Kubernetes metadata files.Learn more
SCONE executes programs inside secure enclaves - without requiring source code changes. We recommend recompiling applications but we support executing native Alpine applications inside containers. In this way, we are preventing even attackers with root access from stealing secrets from these programs.Learn more
SCONE helps to configure programs with secrets that can neither be read nor modified by attackers - even if they would have already taken control of the operating system and/or the hypervisor. This is transparent to the application, i.e., does not require any source code changes.
Ensure application security even in untrusted environments.Learn more
SCONE supports cross-compilers for C, C++, Rust, Go and an interpreter for Python.Learn more
We aim to provide an easy starting point for evaluating the SCONE Confidential PySpark offering.
It includes all the needed tools and images for running confidential PySpark applications in Kubernetes clusters.
Confidential Spark protects your data and code by ensuring that code and data are ALWAYS encrypted - in use, in flight and at rest.
We aim to provide an easy starting point for evaluating the SCONE Confidential Computing Platform.
It includes all the needed tools for building confidential images (from scratch or from an existing native image) and deploying them.
How to build confidential container images from existing native Python images in one step. The resulting image runs on remotely-attested Intel SGX enclaves and has an encrypted filesystem.Watch Screencast
A service mesh facilitates the communication between services or microservices. We introduce a confidential service mesh which ensures end-to-end encryption with mutual authentication.Watch Screencast
We have multiple different partners collaborating whilst protecting their intellectual property (code, data) from each other and from cluster administrators.Watch Screencast
The objective of this work is to provide a platform that allows multiple stakeholders such data owner, code owner, model owner, who do not necessarily trust each other, still can come together an perform machine learning to unlock all the benefits of AI.Watch Screencast
Co-Founder & COO, Trustworthy Systems Guru
Co-Founder, Shield Execution Expert
Co-Founder, Lead Runtime Developer
Co-Founder, Application, AI Frameworks, Blockchain
Co-Founder & interim CEO, Software Developer