Read our latest white paper about how Accenture, Intel, and Scontain design confidential landing zones.Go to intel website
We are searching for software developers with knowledge of Rust, C, Go or Python. Work from anywhere or join our team in Germany (Dresden) or Campina Grande (Brazil)!
Interested? Write us an email:
See job... (pdf) 20/04/2022
Watch this video of our partner T-Systems MMS to learn more about the practical application of Confidential Computing. From minute 8:58 on we give an insight in technological conrnerstones in an interview with our COO Prof. Christof Fetzer.
See video... 07/01/2022
is one of the Azure Marketplace offers by Scontain. It includes all the needed tools for building confidential images and deploying them with the goal to provide an easy starting point for evaluating the SCONE Confidential Computing Platform.
is one of the Azure Marketplace offers by Scontain. It includes all the needed tools and images for running confidential PySpark applications in Kubernetes clusters and therefore provides an easy starting point for evaluating the SCONE Confidential PySpark offering.
We present concepts of cloud-native applications and show their advantages as well as a demo of an application that consists of several services and within which several programming languages are used.
See video... 27/10/2021
In this demo video we show how you can use applications where multiple stakeholders safely contribute their data and code with SCONE. In this demo video how you can provide a platform with Intel SGX and SCONE that allows different stakeholders to to work together safely. They don't have to necessarily trust each other to use the advantages of an AI.
See video... 27/10/2021
SCONE Confidential Computing enables the secure outsourcing of the computing infrastructure to cloud providers with full control over your own data, code and secrets in just a few steps.
See video... 27/10/2021
In this first of six videos, we motivate the need for confidential computing, explain what confidential computing is, and how to achieve confidential computing with the help of Intel SGX and the SCONE platform.
See video... 27/10/2021
Enemy in the clouds: protecting your cloud assets from powerful adversaries. Confidential Cloud-Native Computing in Large Kubernetes Clusters
Our slides explain how SCONE protects data and code through the attestation of the platform and code while enabling excellent performance. It further shows a use case about multi-stakeholder computation.
Learn how Confidential Computing is transforming the industry in respect to Data Privacy. Join Stefan Schäfer from OVHcloud, Richard Curran from Intel Corporation and Christof Fetzer from Scontain for the OVHcloud Webcast. Register now:
With SCONE Confidential Computing one can ensure that for example the employer cannot read the encrypted data traffic of his employees despite web caching; the encryption of the communication can be checked.
Magnit, one of Russia's leading food retail chains with more than 20,000 stores and 16 million daily visitors, has provided a trusted platform for managing digital advertising data. The platform was developed by Aggregion and Scontain and uses SCONE to protect customer data. (Image: Magnit)
With SCONE Confidential Computing you can protect the confidentiality of emails but still grant access to an auditor.
Use SCONE Confidential Computing to agree on a common code base and securely exchange confidential data. For example in the use case of genomic data analysis.
Microsoft Azure presents new applications for confidential computing in the video: Minute 10 shows the use case Magnit (retailer in Russia). Minute 18:50 shows the example of Microsoft's Lamna Hospital; both are based on the SCONE platform.
Dominik Nägele from T-Systems International, Dr. Ivan Gudymenko from T-Systems Multimedia Solution and our COO Prof. Dr. Christof Fetzer talk about confidential computing.
Together with T-Systems Multimedia Solutions we published a white paper on the subject of trustworthy cloud-native computing in large Kubernetes clusters.
Want to know more about Confidential Cloud-Native Computing (ConfCNC)? We explain how we solve current problems and present some use cases in our slides.
Learn how to ensure confidentiality, integrity and freshness if your adversary has root and hardware access.
SCONE can transparently encrypt files and network traffic and in this way, it protects data from unauthorized access via the operating system, the hypervisor or any software.Learn more
SCONE transparently attests programs to ensure that only the correct, unmodified programs are executing in a genuine SGX enclave. This also prevents malware to attach to programs.
SCONE supports a set of curated images to simplify the task of the application developer. For most of the standard services, we will provide a SCONE image that runs inside of an SGX enclave. The application developer can customize the image via a Docker compose / stack file. We provide some examples in our SCONE tutorial.
SCONE supports secure compose files to protect secrets that are visible in Docker compose and stack files as well as Kubernetes metadata files.Learn more
SCONE executes programs inside secure enclaves - without requiring source code changes. We recommend recompiling applications but we support executing native Alpine applications inside containers. In this way, we are preventing even attackers with root access from stealing secrets from these programs.Learn more
SCONE helps to configure programs with secrets that can neither be read nor modified by attackers - even if they would have already taken control of the operating system and/or the hypervisor. This is transparent to the application, i.e., does not require any source code changes.
Ensure application security even in untrusted environments.Learn more
SCONE supports cross-compilers for C, C++, Rust, Go and an interpreter for Python.Learn more
We aim to provide an easy starting point for evaluating the SCONE Confidential PySpark offering.
It includes all the needed tools and images for running confidential PySpark applications in Kubernetes clusters.
Confidential Spark protects your data and code by ensuring that code and data are ALWAYS encrypted - in use, in flight and at rest.
We aim to provide an easy starting point for evaluating the SCONE Confidential Computing Platform.
It includes all the needed tools for building confidential images (from scratch or from an existing native image) and deploying them.
How to build confidential container images from existing native Python images in one step. The resulting image runs on remotely-attested Intel SGX enclaves and has an encrypted filesystem.Watch Screencast
A service mesh facilitates the communication between services or microservices. We introduce a confidential service mesh which ensures end-to-end encryption with mutual authentication.Watch Screencast
We have multiple different partners collaborating whilst protecting their intellectual property (code, data) from each other and from cluster administrators.Watch Screencast
The objective of this work is to provide a platform that allows multiple stakeholders such data owner, code owner, model owner, who do not necessarily trust each other, still can come together an perform machine learning to unlock all the benefits of AI.Watch Screencast
Scontain GmbH is one of the leading companies in confidential computing domain. Scontain supports its customers to build confidential applications with the help of their SCONE platform. It has a strong partnership with cloud companies, e.g. Deutsche Telekom and Microsoft Azure.
Co-Founder & COO, Trustworthy Systems Guru
Co-Founder, Shield Execution Expert
Co-Founder, Lead Runtime Developer
Co-Founder, Application, AI Frameworks, Blockchain
Co-Founder & interim CEO, Software Developer
As a software developer (m/w/d) you will have the opportunity to both design and develop new software tools and integrate them into our CI pipeline as well as maintaining existing software.
Have a look at our job offer here