Related Products
|
||||||
About
Google Cloud’s Confidential Computing delivers hardware-based Trusted Execution Environments to encrypt data in use, completing the encryption lifecycle alongside data at rest and in transit. It includes Confidential VMs (using AMD SEV, SEV-SNP, Intel TDX, and NVIDIA confidential GPUs), Confidential Space (enabling secure multi-party data sharing), Google Cloud Attestation, and split-trust encryption tooling. Confidential VMs support workloads in Compute Engine and are available across services such as Dataproc, Dataflow, GKE, and Vertex AI Workbench. It ensures runtime encryption of memory, isolation from host OS/hypervisor, and attestation features so customers gain proof that their workloads run in a secure enclave. Use cases range from confidential analytics and federated learning in healthcare and finance to generative-AI model hosting and collaborative supply-chain data sharing.
|
About
Ensure the security of your workloads, simplify regulatory compliance, and guarantee data sovereignty with IBM Cloud Secure Virtualization. A trusted cloud infrastructure must be able to answer these questions for corporate oversight, security, and compliance. A customer wants to create an environment where administration, workload execution, and data access are constrained to a particular geo-location with full audit capabilities. During deployment, identify the firmware configurations you will allow and the hypervisor configurations you have approved. Accurately identify each physical host and its physical location, creating a snapshot or fingerprint of each trusted host's launch configuration. This is stored in an allowlist. If the measurements of a host's BIOS and hypervisor match the measurements stored in the allowlist, the boot environment is attested. The host launches into a state that is considered trusted.
|
|||||
Platforms Supported
Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook
|
Platforms Supported
Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook
|
|||||
Audience
Enterprises and regulated-industry IT/security teams wanting a tool to process highly sensitive data in the cloud while ensuring full hardware‐enforced isolation, encryption-in-use and cryptographic proof of workload integrity
|
Audience
Companies seeking a solution to ensure the security of their workloads and simplify regulatory compliance
|
|||||
Support
Phone Support
24/7 Live Support
Online
|
Support
Phone Support
24/7 Live Support
Online
|
|||||
API
Offers API
|
API
Offers API
|
|||||
Screenshots and Videos |
Screenshots and Videos |
|||||
Pricing
$0.005479 per hour
Free Version
Free Trial
|
Pricing
No information available.
Free Version
Free Trial
|
|||||
Reviews/
|
Reviews/
|
|||||
Training
Documentation
Webinars
Live Online
In Person
|
Training
Documentation
Webinars
Live Online
In Person
|
|||||
Company InformationGoogle
Founded: 1998
United States
cloud.google.com/security/products/confidential-computing
|
Company InformationIBM
Founded: 1911
United States
www.ibm.com/cloud/architecture/architectures/virtualization_security_hytrust/
|
|||||
Alternatives |
Alternatives |
|||||
|
|
||||||
|
|
||||||
|
|
||||||
Categories |
Categories |
|||||
Integrations
AMD Radeon ProRender
Anjuna Confidential Computing Software
Google Cloud Dataflow
Google Cloud Dataproc
Google Cloud Platform
Google Kubernetes Engine (GKE)
HashiCorp Vault
HyTrust
IBM Cloud
Intel Open Edge Platform
|
Integrations
AMD Radeon ProRender
Anjuna Confidential Computing Software
Google Cloud Dataflow
Google Cloud Dataproc
Google Cloud Platform
Google Kubernetes Engine (GKE)
HashiCorp Vault
HyTrust
IBM Cloud
Intel Open Edge Platform
|
|||||
|
|
|