Leveraging the power of Confidential Computing

Protect data and applications in use by performing computations in hardware-based Trusted Execution Environments.

Get Started

Features

Our patented solution allows existing unmodified Linux binaries to be run inside of Intel SGX enclaves. These secure and isolated environments prevent unauthorized access or modification of applications and data in-use while providing the necessary system support for complex applications and for programming language runtimes.

Runtime Encryption

Data and applications during runtime are exposed to significant risks, as malware can attack the contents of memory at this stage. Our solution protects your digital asssets when they are at their most vulnerable.

Unmodified Applications

Our solution runs Linux OS within its enclaves which enables a much wider field of application as it supports the broad usage of existing software and also supports the conversion of existing docker images.

Maximum Flexibility

Whether you need a cloud-based solution or would like to secure your servers on-premise. Whether you need a little processing capacity or serious computational power – our solution is fully scalable to meet your needs.

Hardware-Based Security

Rather than relying on software alone to manage access to resources, our solution provides security as part of a hardware platform. This is what we call a Trusted Execution Environment (TEE) – using Intel SGX hardware.

Regulatory Adherence

The development and rapid change of regulatory requirements for data privacy represents a significant challenge. This is particularly true in Europe with the GDPR legislation. Our solution provides security by design, thereby ensuring regulatory compliance.

Ease & Simplicity of Use

With our patented solution you can easily add custom files or add Linux software packages without the need for any modification. Environments are stored as non-propreitary container images and can be exchanged via public and private container registries.

Get Started

Trusted Execution Environments

There is a gap in protection when data is decrypted for processing in the cloud (data in use). By using hardware-based, Trusted Execution Environments (TEE’s), we provide a secure container during runtime.

  • Advanced in-enclave networking support via the Linux Network stack
  • Full support for local and remote attestation
  • Advanced in-enclave debug and profiling support

Using hardware-based technology as a cyber security solution comes with a significant advantage over software-based solutions: It is secure by design. With our simple and intuitive User Interface – anyone can unlock the power of confidential computing today!

Customizable Runtime Environments

Accelerate the pace of development in your organization with thousands of certified environments that are designed to meet your exact needs or create your own. Deploy seamlessly.

  • Benefit from an extensive catalog of apps and services by easily converting exsiting Docker images
  • Use Linux software packages without the need for any modification or recompilation
  • Easy handling concerning the addition of custom files to environments
  • Built-In environment encryption and integrity protection

Data Protection and GDPR Compliance

The stringent and changing regulatory requirements for data privacy represent a significant challenge.

  • Ensure GDPR compliance with Confidential Computing

  • Trusted Execution Environments ensure security by design
  • Ensure the securitization of sensitive data and business critical applications

  • Protected from access by the cloud provider

Enjoy the advantages of the cloud thanks to confidential computing. Use our solution to ensure secure cloud computing for your business!

Hosted Securely in Europe

Securitee is part of the Open Trusted Cloud (OTC) program at OVHcloud. As Europes leading secure cloud computing service provider this includes:

  • CISPE code of conduct on data protection compliance

  • SWIPO IaaS Compliance, ISO 27701, 27001, 27018

  • The contribution of HDS, CSA, EBA, PCI DSS, and SOC1,2,3 certifications

It is essential to provide cloud-based solutions that guarantee compliance with European regulations and reflect the values of an open and free world.

Your trusted cyber security solution

Our patented solution offers a complete and seamlessly integrable confidential computing platform with all the tools you need to secure your applications and data – whether you would like to secure existing applications and data, get started with confidential processes, or want to leverage secure data analytics.

Get Started

Powered by

Intel SGX

All the currently applied technologies regarding (cloud) application security are software solutions. Securitee’s solution is based on hardware components provided by Intel Software Guard Extensions (SGX). Using hardware-based technology as a cyber security solution comes with a significant advantage over software-based solutions: It is secure by design.

Open Trusted Cloud

Securitee is part of the Open Trusted Cloud (OTC) program at OVHcloud. We agree that it is essential to provide alternative cloud-based Platform-as-a-Service solutions (PaaS), that guarantees compliance with European regulations and reflects the values of an open and free world. Securitee’s PaaS solution will be hosted in the OVHcloud marketplace in 2022.

What we stand for

For the first time, applications and data in use can be safely secured!

Simplicity

Cyber security solutions are often highly complex and only usable by technical experts.

Gain easy access to customized secure enclaves in just a few clicks!

Trust

Digital assets are under increasing cyber threats, can you trust your service provider?

With Intel SGX chipset technology – we don’t ask for trust, we build it!

Affordability

Everyone should have the right to easily protect their digital assets without prohibitive costs.

Flexible pricing to meet your specific needs – whatever they are!

Provisioning

The Securitee solution offers a framework for developers to create fully customized secure and trusted applications with limited management responsibilities in the cloud or alternatively fully hosted on your own in-house servers.

These delivery options allow businesses to take advantage of simple and cost-effective development and deployment with an easy migration in a highly available and readily scalable way.

Platform Based GUI

With our web-based graphical user interface (GUI) we provide:

  • Easy access to convert untrusted applications into trusted applications​
  • A visual representation of all commands that are available
  • Providing an intuitive and easy-to-use interface with immediate visual feedback

The graphical interface enables access to confidential computing, regardless of experience or knowledge.

API Access

Backend service for easy integration into existing workflows and structures​:

  • Use a data model that is supported by a set of client-side libraries available on the GitHub page
  • The API provides a WADL document that describes all resources that are available
  • OpenAPI Specification (OAS) which defines a standard, language-agnostic interface to RESTful API’s

Allows the you to understand and interact with the remote service with a minimal amount of implementation logic.

On-Premise Installation

Do you have your own in-house hardware set-up and prefer to stay away from cloud-based solutions:

  • With our on-premise solution you can purchase a seperate license and we establish TEE’s locally on your own hardware components
  • No affiliation with cloud providers is necessary at all

We offer various levels of dedicated support depending on your specific needs.

Contact Us

Impressum

Securitee UG (haftungsbeschränkt)
c/o WeWork
Kemperplatz 1, DE-10785 Berlin
HRB 233040 B (Amtsgericht Charlottenburg)
USt-IdNr.: DE347053443
Geschäftsführer: Christian G. Junger
info@securitee.tech

Our Newsletter

To stay up to date with all our developments, offers and services.