Open, sovereign, European – with an eye on regulatory requirements
At the centre of the cooperation is the confidential computing software from Edgeless Systems, which enables sensitive information to be processed securely and verifiably in all common cloud infrastructures, whether European or international. This positions the solution as a superior alternative and useful addition to those from US hyperscalers such as AWS Nitro Enclaves, Microsoft Azure Confidential Computing and Google Cloud Confidential VMs or European providers such as OVHcloud or IONOS. Infrastructure provider and adesso partner STACKIT is already using Edgeless Systems’ solutions for its confidential computing.
The technologies developed by Edgeless Systems are completely open source-based and follow the Zero Trust Architecture principle, making them particularly attractive for organisations that rely on transparent security architectures and the reduction of external dependencies. The partnership with adesso provides public-sector customers, research institutions, and critical infrastructures in Germany and Europe with a powerful solution that combines modern cloud technology with maximum control and compliance.
Confidentiality through hardware-supported isolation
At the core of confidential computing technology from Edgeless Systems is the use of Trusted Execution Environments (TEEs), which provide cryptographically protected execution environments using the latest hardware technologies. Based on these, Edgeless Systems offers “Constellation,” the first CNCF-certified (Cloud Native Computing Foundation) Kubernetes distribution on the market that also keeps data encrypted during processing. It isolates entire clusters of the infrastructure, therefore enabling integrity-assured execution of all workloads – even across multiple cloud zones.
In addition, Edgeless Systems also offers “Privatemode,” a secure end-to-end platform for generative AI applications, in which data remain protected from input through to processing, thereby facilitating use cases such as the analysis of medical texts or the processing of legal documents in sensitive environments.