With SCONE Confidental Computing you can protect the confidentiality of emails but still grant access to an auditor.
SCONE Confidential Computing facilitates the confidential outsourcing of services such as the management of VMs - and even critical services such as key management.
With the support of Scontain, G-Core Labs was able to connect its cloud to Aggregion. Aggregion offers solutions for collaboration with data and creates partner ecosystems.
Magnit, one of Russia's leading food retail chains with more than 20,000 stores and 16 million daily visitors, has provided a trusted platform for managing digital advertising data. The platform was developed by Aggregion and Scontain and uses SCONE to protect customer data. (Image: Magnit)
Microsoft Azure presents new applications for confidential computing in the video: Minute 10 shows the use case Magnit (retailer in Russia). Minute 18:50 shows the example of Microsoft's Lamna Hospital; both are based on the SCONE platform.
SecuStack, a German cloud operating system, will soon support Intel® SGX enclaves based on our SCONE platform. This ensures secure data exchange in cloud applications such as machine learning and multi-party computing.
Together with T-Systems Multimedia Solutions we published a white paper on the subject of trustworthy cloud-native computing in large Kubernetes clusters.
In our new short video we give a vivid and tangible overview of the goals and the background of Scontain.
Learn how to ensure confidentiality, integrity and freshness if your adversary has root and hardware access.
SCONE can transparently encrypt files and network traffic and in this way, it protects data from unauthorized access via the operating system, the hypervisor or any software.Learn more
SCONE transparently attests programs to ensure that only the correct, unmodified programs are executing in a genuine SGX enclave. This also prevents malware to attach to programs.
SCONE supports a set of curated images to simplify the task of application developer. For most of the standard services, we will provide a SCONE image that runs inside of an SGX enclave. The application developer can customize the image via a Docker compose / stack file. We provide some examples in our SCONE tutorial.
SCONE supports secure compose files to protect secrets that are visible in Docker compose and stack files as well as Kubernetes metadata files.Learn more
SCONE executes programs inside secure enclaves - without requiring source code changes. We recommend to recompile applications but we support executing native Alpine applications inside containers. In this way, we are preventing even attackers with root access from stealing secrets from these programs.Learn more
SCONE helps to configure programs with secrets that can neither be read nor modified by attackers - even if they would have already taken control of the operating system and/or the hypervisor. This is transparent to the application, i.e., does not require any source code changes.
Ensure application security even in untrusted environments.Learn more
SCONE support cross-compilers for C, C++, Rust, Go and an interpreter for Python.Learn more
Co-Founder & COO, Trustworthy Systems Guru
Co-Founder, Shield Execution Expert
Co-Founder, Lead Runtime Developer
Co-Founder, Application, AI Frameworks, Blockchain
Co-Founder & interim CEO, Software Developer