Support & Help Center
Find answers to common questions or reach out to us directly.
Contact Details
Email:
support@enclaive.cloudPhone:
+49 (0)30 233 292 970Office Address:
Chausseestr. 40
10115 Berlin
Documentation:
docs.enclaive.cloudContact Support
You got some questions?
Find answers to common questions about our products and services. For further questions, book a call with us.
Yes, Garnet supports various deployment models including on-premise, cloud-based, and hybrid environments, offering flexibility in integration with different IT infrastructures and operational setups.
Garnet enables these sectors to utilize LLM technologies while maintaining strict data privacy standards and regulatory compliance. It ensures data integrity and confidentiality through robust security protocols, making it an ideal choice for organizations prioritizing data protection
Garnet supports various deployment models including on-premise, cloud-based, and hybrid environments, offering flexibility in implementation.
Garnet leverages a Qdrant vector database and operates entirely in a confidential enclaive cloud, employing advanced security measures like confidential computing.
Garnet takes documents, vectorizes them, pre-filters, generates prompts, and pseudonymizes data before contacting LLMs, ensuring GDPR compliance and data confidentiality.
Workload Identification in Nitride involves leveraging confidential compute to assign unique identities to workloads, facilitating automatic identity assignment and rotation in multi-cloud environments.
Nitride identifies persistent vulnerabilities in the infrastructure of cloud service providers, especially those associated with cloud IAM (identity and access management) services. These vulnerabilities can facilitate unauthorized access and compromise the security of sensitive data.
Nitride empowers organizations to enforce their data governance policies and compliance requirements, preventing non-compliance issues and ensuring adherence to industry regulations.
Nitride provides greater visibility into how data is processed in the cloud. This overcomes the challenge of limited transparency and enables the effective detection and response to security incidents.
Nitride helps organizations meet data residency requirements by implementing secure measures, guaranteeing that data stays within predefined geographical boundaries.
Nitride is a sophisticated solution designed to bolster cloud security. It ensures confidentiality by leveraging advanced security measures and protocols, granting access to specific resources within a cloud infrastructure only to attested workloads.
Vault facilitates IAM by identifying users through various authentication methods, integrating with cloud platform IAMs (AWS, Azure, GCP), and enabling fine-grained access control based on roles or groups. It also supports JSON web tokens for secure instantiation of workloads and services.
Vault is crypto-agile, capable of handling PK, EC, and PQ cryptography while adapting to evolving NIST/BSI/NATO standards and technological advancements. This ensures that cryptographic operations remain aligned with the latest security standards.
Vault establishes trust in the hardware foundation by allowing users to select either the CPU, TPM, or HSM as the anchor and source of randomness. This ensures a secure foundation for managing and safeguarding critical information.
Vault is versatile, supporting deployment in various cloud or on-premises environments. It is ideal for hybrid, confidential, and cross-cloud architectures, providing flexibility and adaptability to different organizational infrastructures.
Vault offers elasticity, allowing organizations to adjust resource scaling efficiently to accommodate fluctuating demands without unnecessary allocation. This feature enhances operational flexibility in response to varying workloads.
Vault is a robust solution designed to centralize key control, strengthen data protection, and streamline operations across diverse cloud platforms. It empowers organizations by providing unprecedented control over secrets, regardless of their location, ensuring flexibility and security in managing critical information.
Encryption in use guarantees the highest level of data security without compromising performance, thanks to hardware-accelerated encryption, providing a robust security measure throughout the entire lifecycle.
Data-in-use Encrypting Database Hosting ensures unparalleled security, allowing you to set up your preferred database within minutes while guaranteeing that your hosting provider never accesses your data throughout its lifecycle.
Yes, comprehensive encryption significantly reduces the risk of data breaches by securing information during processing, storage, and transmission, making it more challenging for unauthorized entities to access sensitive data.
Encrypting data at all stages helps organizations meet regulatory requirements (e.g., GDPR, HIPAA) by ensuring the protection of sensitive information throughout its lifecycle.
In-transit encryption safeguards data as it travels between the database and other systems or applications, preventing interception or tampering during transmission.
Data-at-rest encryption secures data stored in the database, preventing unauthorized access to sensitive information even if physical storage devices are compromised.
Data-in-use encryption protects sensitive data while actively being processed within the database, adding an extra layer of security and confidentiality during runtime.
Encrypting databases at all stages—in use, at rest, and in transit—ensures comprehensive security by safeguarding sensitive information during processing, storage, and transmission.
Yes, confidential VMs are designed to integrate seamlessly into existing virtualized environments. They can be deployed alongside non-confidential VMs, allowing organizations to selectively apply enhanced security measures to specific workloads.
Confidential VMs create a protected execution environment, preventing unauthorized access to code and data. This protection against intellectual property theft is especially valuable for organizations developing proprietary software or running proprietary algorithms.
Applications dealing with sensitive information, such as those in financial services, healthcare, and cryptographic operations benefit significantly from the confidential execution environments provided by confidential VMs. This ensures the integrity and confidentiality of critical operations.
Yes, confidential VMs are well-suited for deployment in cloud environments. They provide an added layer of security for workloads in shared, virtualized spaces, making them a valuable solution for organizations leveraging cloud services.
Yes, confidential VMs are designed to meet data compliance standards. Their advanced encryption and security measures contribute to safeguarding sensitive data, making them suitable for industries with stringent regulatory requirements.
Confidential VMs often implement end-to-end encryption, ensuring that data remains encrypted not only during storage and processing but also during transit. This comprehensive approach to data security safeguards sensitive information throughout its lifecycle.
Confidential VMs are particularly beneficial in scenarios where organizations need to process or store sensitive data. They are also valuable in multi-tenant private, public and hybrid cloud environments where secure isolation of workloads is crucial.
Confidential VMs are designed with optimized performance in mind, incurring only a minimal 3% CPU cycle overhead. This means that the encryption and protection mechanisms implemented for sensitive workloads have a negligible impact on overall computational efficiency.
Confidential VMs enhance security by creating confidential execution environments (CEEs) where sensitive workloads can operate securely. These VMs typically employ advanced encryption, protection against insider threats, and secure multi-tenancy features to ensure the confidentiality and integrity of data and applications.
Confidential VMs are a specialized type of virtual machine designed to provide enhanced security measures for sensitive workloads. They utilize hardware-based security features, leveraging confidential compute to isolate and protect data and code within the virtualized environment.
Yes, Confidential Kubernetes is well-suited for compliance-sensitive environments as it incorporates security features and measures to adhere to industry-specific compliance requirements, ensuring a secure and compliant deployment.
Confidential Kubernetes includes robust auditing and monitoring capabilities, allowing administrators to track and log identity-related events, access patterns, and potential security threats for comprehensive visibility.
Yes, Confidential Kubernetes is designed to integrate with identity and access management systems, providing a seamless and unified approach to identity management within the Kubernetes environment.
Confidential Kubernetes supports rolling updates, enabling the deployment of new versions without downtime. In case of issues, it allows for seamless rollbacks to previous versions, maintaining operational continuity.
Yes, Confidential Kubernetes is designed to be versatile and can be deployed across various environments, including private, public, hybrid and multi-cloud setups, ensuring consistent security measures regardless of the underlying infrastructure.
Confidential Kubernetes provides fine-grained access control, allowing administrators to define precise permissions for each workload. In addition, each workload has a unique identity that can be verified via remote attestation, which is what makes it special.
Confidential Kubernetes employs hardware-based security features, including secure enclaves, to isolate and protect both code and data during processing, at rest and in transit, thereby ensuring the confidentiality of sensitive information.
Confidential Kubernetes places a strong emphasis on security by leveraging confidential virtual machines and hardware-graded security, providing an additional layer of protection for sensitive workloads and applications.
Confidential Kubernetes is an advanced deployment of Kubernetes that focuses on running both master and worker nodes in confidential virtual machines, utilizing hardware-based security features for enhanced protection of workloads and data.