Products

Confidential microservices

With Cosmian Confidential Microservices, your code executes in a fully managed and secured environment.
Just write and upload code as an encrypted .zip file. There is no need to handle complex cryptographic key exchanges or worry about provisioning any infrastructure.

Your code is deployed on a confidential computing cloud service. It provides operating environments that are secure from interference by outside parties. Your code is always protected. Your data are always protected.

Products

Confidential microservices

With Cosmian Confidential Microservices, your code executes in a fully managed and secured environment.
Just write and upload code as an encrypted .zip file. There is no need to handle complex cryptographic key exchanges or worry about provisioning any infrastructure.

Your code is deployed on a confidential computing cloud service. It provides operating environments that are secure from interference by outside parties. Your code is always protected. Your data are always protected.

Confidential Microservices

Code encryption

Your code is encrypted before it is sent. No one can access it, not even your cloud provider sysadmin.

Confidential Microservices

Code encryption

Your code is encrypted before it is sent. No one can access it, not even your cloud provider sysadmin.

Confidential Microservices

Data encryption

Data sent to your microservice are also encrypted. You can work with sensitive data without having to worry about security or privacy.

Confidential Microservices

Data encryption

Data sent to your microservice are also encrypted. You can work with sensitive data without having to worry about security or privacy.

Confidential Microservices

Choose your runtime environment

Cosmian Confidential Microservices natively supports JavaScript, Python, C, Java, and Rust code.

Confidential Microservices

Choose your runtime environment

Cosmian Confidential Microservices natively supports JavaScript, Python, C, Java, and Rust code.

Confidential Microservices

Trigger your service when you want

Your microservice can be triggered on-demand or run periodically at fixed times, dates, or intervals.

Confidential Microservices

Trigger your service when you want

Your microservice can be triggered on-demand or run periodically at fixed times, dates, or intervals.

Confidential Microservices

Encrypt and decrypt with our API

API clients in 4 languages(JavaScript, Python, C, and Java) and extensive documentation let you implement and iterate in no time.

Confidential Microservices

Encrypt and decrypt with our API

API clients in 4 languages(JavaScript, Python, C, and Java) and extensive documentation let you implement and iterate in no time.

Confidential Microservices

KMS included

Keys management is simple and can be done with a UI or a REST API.

Confidential Microservices

KMS included

Keys management is simple and can be done with a UI or a REST API.

How it works

Cosmian Confidential Microservices is a serverless execution environment relying on Intel Software Guard Extensions (SGX).


This technology delivers advanced hardware and RAM security encryption features, meaning your code and data are fully isolated from other applications. Processes running on the same device or server have no access to the secure partition.

An event happened Cosmian

An event happened

Examples:

  • your application made a REST API call
  • your database is updated
  • new data are uploaded in object storage
Confidential Microservice is triggered

Confidential Microservice is triggered

Input data encrypted

Cosmian Confidential Microservices

Cosmian Confidential Microservices

Your code is executed in a fully managed and secured environment.

Examples:

  • your application made a REST API call
  • your database is updated
  • new data are uploaded in object storage
Results are shared

Results are shared

Output data are also encrypted on-the-fly

Ready to try?

Sign-up below to be informed about product updates, new cryptographic libraries & more. Let’s stay in touch.

Advanced cryptography at the service of confidential computing & data privacy.

Advanced cryptography at the service of confidential computing & data privacy.

How to secure computation and explicitly control access to sensitive data in cloud environments