Confidential VMs are for tenants with high security and confidentiality requirements. These VMs provide a strong, hardware-enforced boundary to help meet your security and privacy needs without performance gaps. You can use confidential VMs for migrations without making changes to your code.
Quickly and easily spin up a confidential virtual machine. We take care of the confidential configuration, attestation and key provisioning.
Set up the app within minutes, configure and manage it — all via a simple UI without technicalities.
Robust hardware-based isolation between virtual machines, hypervisor, and host management code.
Negligible performance overhead thanks to hardware-graded encryption.
Throughout the runtime the VM is encrypted in memory while in use and at rest.
Dedicated virtual Trusted Platform Module (vTPM) instance for attestation and protection of keys.
Cloud-based Confidential OS disc encryption before the first boot.
Leave the complexity of installation and configuration to us. We handle the complexities.
Watch a quick use case of how enclaive’s VMs protect your data while in use and accelerate cloud adoption in FinTech industries with Monty, Senior Confidential Compute Advocate at enclaive.
Sign up now and you’ll be up and running on enclaive in just minutes
enclaive
Developers
Resources
Our support team will contact you to ensure a smooth onboarding