Support & Help Center

Find answers to common questions or reach out to us directly.

Contact Details

Office Address:
enclaive GmbH
Chausseestr. 40
10115 Berlin
Documentation:
docs.enclaive.cloud

Contact Support

You got some questions?

Find answers to common questions about our products and services. For further questions, book a call with us.

Garnet
Can Garnet integrate with existing IT infrastructures?

Yes, Garnet supports various deployment models including on-premise, cloud-based, and hybrid environments, offering flexibility in integration with different IT infrastructures and operational setups.

Garnet
Is Garnet suitable for organizations prioritizing data integrity and confidentiality? (like Government or eHealth data)

Garnet enables these sectors to utilize LLM technologies while maintaining strict data privacy standards and regulatory compliance. It ensures data integrity and confidentiality through robust security protocols, making it an ideal choice for organizations prioritizing data protection

Garnet
What deployment options does Garnet support?

Garnet supports various deployment models including on-premise, cloud-based, and hybrid environments, offering flexibility in implementation.

Garnet
What technologies does Garnet use to ensure data security?

Garnet leverages a Qdrant vector database and operates entirely in a confidential enclaive cloud, employing advanced security measures like confidential computing.

Garnet
How does Garnet protect sensitive data when using LLMs like ChatGPT?

Garnet takes documents, vectorizes them, pre-filters, generates prompts, and pseudonymizes data before contacting LLMs, ensuring GDPR compliance and data confidentiality.

Nitride
Can you explain the significance of Workload Identification in Nitride?

Workload Identification in Nitride involves leveraging confidential compute to assign unique identities to workloads, facilitating automatic identity assignment and rotation in multi-cloud environments.

Nitride
What vulnerabilities related to cloud service providers does Nitride identify?

Nitride identifies persistent vulnerabilities in the infrastructure of cloud service providers, especially those associated with cloud IAM (identity and access management) services. These vulnerabilities can facilitate unauthorized access and compromise the security of sensitive data.

Nitride
How does Nitride support workload governance?

Nitride empowers organizations to enforce their data governance policies and compliance requirements, preventing non-compliance issues and ensuring adherence to industry regulations.

Nitride
What insight does Nitride provide into cloud data processing?

Nitride provides greater visibility into how data is processed in the cloud. This overcomes the challenge of limited transparency and enables the effective detection and response to security incidents.

Nitride
How does Nitride contribute to data residency compliance?

Nitride helps organizations meet data residency requirements by implementing secure measures, guaranteeing that data stays within predefined geographical boundaries.

Nitride
What is Nitride, and how does it enhance cloud security?

Nitride is a sophisticated solution designed to bolster cloud security. It ensures confidentiality by leveraging advanced security measures and protocols, granting access to specific resources within a cloud infrastructure only to attested workloads.

Vault
What benefits does Vault provide in terms of Identity and Access Management (IAM)?

Vault facilitates IAM by identifying users through various authentication methods, integrating with cloud platform IAMs (AWS, Azure, GCP), and enabling fine-grained access control based on roles or groups. It also supports JSON web tokens for secure instantiation of workloads and services.

Vault
How does Vault adapt to evolving cryptographic standards?

Vault is crypto-agile, capable of handling PK, EC, and PQ cryptography while adapting to evolving NIST/BSI/NATO standards and technological advancements. This ensures that cryptographic operations remain aligned with the latest security standards.

Vault
What is the significance of hardware-graded security in Vault?

Vault establishes trust in the hardware foundation by allowing users to select either the CPU, TPM, or HSM as the anchor and source of randomness. This ensures a secure foundation for managing and safeguarding critical information.

Vault
In what environments can Vault be deployed?

Vault is versatile, supporting deployment in various cloud or on-premises environments. It is ideal for hybrid, confidential, and cross-cloud architectures, providing flexibility and adaptability to different organizational infrastructures.

Vault
How does Vault address fluctuating resource demands efficiently?

Vault offers elasticity, allowing organizations to adjust resource scaling efficiently to accommodate fluctuating demands without unnecessary allocation. This feature enhances operational flexibility in response to varying workloads.

Vault
What is Vault, and how does it enhance multi-cloud security?

Vault is a robust solution designed to centralize key control, strengthen data protection, and streamline operations across diverse cloud platforms. It empowers organizations by providing unprecedented control over secrets, regardless of their location, ensuring flexibility and security in managing critical information.

Always Encrypting Databases
What is the key benefit of encryption in use in this database hosting solution?

Encryption in use guarantees the highest level of data security without compromising performance, thanks to hardware-accelerated encryption, providing a robust security measure throughout the entire lifecycle.

Always Encrypting Databases
What is the unique proposition of Data-in-use Encrypting Database Hosting?

Data-in-use Encrypting Database Hosting ensures unparalleled security, allowing you to set up your preferred database within minutes while guaranteeing that your hosting provider never accesses your data throughout its lifecycle.

Always Encrypting Databases
Can implementing these encryption methods reduce the risk of data breaches?

Yes, comprehensive encryption significantly reduces the risk of data breaches by securing information during processing, storage, and transmission, making it more challenging for unauthorized entities to access sensitive data.

Always Encrypting Databases
How do these encryption methods contribute to regulatory compliance?

Encrypting data at all stages helps organizations meet regulatory requirements (e.g., GDPR, HIPAA) by ensuring the protection of sensitive information throughout its lifecycle.

Always Encrypting Databases
What role does in-transit encryption play in database security?

In-transit encryption safeguards data as it travels between the database and other systems or applications, preventing interception or tampering during transmission.

Always Encrypting Databases
Why is data-at-rest encryption essential for databases?

Data-at-rest encryption secures data stored in the database, preventing unauthorized access to sensitive information even if physical storage devices are compromised.

Always Encrypting Databases
How does data-in-use encryption enhance database security?

Data-in-use encryption protects sensitive data while actively being processed within the database, adding an extra layer of security and confidentiality during runtime.

Always Encrypting Databases
What is the significance of data-in-use, at rest, and in transit encryption for databases?

Encrypting databases at all stages—in use, at rest, and in transit—ensures comprehensive security by safeguarding sensitive information during processing, storage, and transmission.

Buckypaper
Can confidential VMs be seamlessly integrated into existing virtualized environments?

Yes, confidential VMs are designed to integrate seamlessly into existing virtualized environments. They can be deployed alongside non-confidential VMs, allowing organizations to selectively apply enhanced security measures to specific workloads.

Buckypaper
How do confidential VMs protect against intellectual property theft?

Confidential VMs create a protected execution environment, preventing unauthorized access to code and data. This protection against intellectual property theft is especially valuable for organizations developing proprietary software or running proprietary algorithms.

Buckypaper
What types of applications benefit from the confidential execution environments in confidential VMs?

Applications dealing with sensitive information, such as those in financial services, healthcare, and cryptographic operations benefit significantly from the confidential execution environments provided by confidential VMs. This ensures the integrity and confidentiality of critical operations.

Buckypaper
Can confidential VMs be deployed in cloud environments?

Yes, confidential VMs are well-suited for deployment in cloud environments. They provide an added layer of security for workloads in shared, virtualized spaces, making them a valuable solution for organizations leveraging cloud services.

Buckypaper
Are confidential VMs compliant with data regulations?

Yes, confidential VMs are designed to meet data compliance standards. Their advanced encryption and security measures contribute to safeguarding sensitive data, making them suitable for industries with stringent regulatory requirements.

Buckypaper
How do confidential VMs ensure data confidentiality in transit?

Confidential VMs often implement end-to-end encryption, ensuring that data remains encrypted not only during storage and processing but also during transit. This comprehensive approach to data security safeguards sensitive information throughout its lifecycle.

Buckypaper
In which scenarios are confidential VMs beneficial?

Confidential VMs are particularly beneficial in scenarios where organizations need to process or store sensitive data. They are also valuable in multi-tenant private, public and hybrid cloud environments where secure isolation of workloads is crucial.

Buckypaper
What is the CPU cycle overhead for confidential VMs?

Confidential VMs are designed with optimized performance in mind, incurring only a minimal 3% CPU cycle overhead. This means that the encryption and protection mechanisms implemented for sensitive workloads have a negligible impact on overall computational efficiency.

Buckypaper
How do confidential VMs enhance security?

Confidential VMs enhance security by creating confidential execution environments (CEEs) where sensitive workloads can operate securely. These VMs typically employ advanced encryption, protection against insider threats, and secure multi-tenancy features to ensure the confidentiality and integrity of data and applications.

Buckypaper
What are confidential virtual machines (VMs)?

Confidential VMs are a specialized type of virtual machine designed to provide enhanced security measures for sensitive workloads. They utilize hardware-based security features, leveraging confidential compute to isolate and protect data and code within the virtualized environment.

Dyneemes
Is Confidential Kubernetes suitable for compliance-sensitive environments?

Yes, Confidential Kubernetes is well-suited for compliance-sensitive environments as it incorporates security features and measures to adhere to industry-specific compliance requirements, ensuring a secure and compliant deployment.

Dyneemes
How does Confidential Kubernetes handle auditing and monitoring?

Confidential Kubernetes includes robust auditing and monitoring capabilities, allowing administrators to track and log identity-related events, access patterns, and potential security threats for comprehensive visibility.

Dyneemes
Can Confidential Kubernetes be integrated with existing identity and access management systems?

Yes, Confidential Kubernetes is designed to integrate with identity and access management systems, providing a seamless and unified approach to identity management within the Kubernetes environment.

Dyneemes
How does Confidential Kubernetes handle updates and rollbacks?

Confidential Kubernetes supports rolling updates, enabling the deployment of new versions without downtime. In case of issues, it allows for seamless rollbacks to previous versions, maintaining operational continuity.

Dyneemes
Can Confidential Kubernetes be deployed in multi-cloud environments?

Yes, Confidential Kubernetes is designed to be versatile and can be deployed across various environments, including private, public, hybrid and multi-cloud setups, ensuring consistent security measures regardless of the underlying infrastructure.

Dyneemes
What benefits does Confidential Kubernetes offer in terms of access management?

Confidential Kubernetes provides fine-grained access control, allowing administrators to define precise permissions for each workload. In addition, each workload has a unique identity that can be verified via remote attestation, which is what makes it special.

Dyneemes
How does Confidential Kubernetes ensure the confidentiality of workloads?

Confidential Kubernetes employs hardware-based security features, including secure enclaves, to isolate and protect both code and data during processing, at rest and in transit, thereby ensuring the confidentiality of sensitive information.

Dyneemes
What sets Confidential Kubernetes apart from traditional Kubernetes?

Confidential Kubernetes places a strong emphasis on security by leveraging confidential virtual machines and hardware-graded security, providing an additional layer of protection for sensitive workloads and applications.

Dyneemes
What is Confidential Kubernetes?

Confidential Kubernetes is an advanced deployment of Kubernetes that focuses on running both master and worker nodes in confidential virtual machines, utilizing hardware-based security features for enhanced protection of workloads and data.