Our patented solution allows existing unmodified Linux binaries to be run inside of Intel SGX enclaves. These secure and isolated environments prevent unauthorized access or modification of applications and data in-use while providing the necessary system support for complex applications and for programming language runtimes.
Data and applications during runtime are exposed to significant risks, as malware can attack the contents of memory at this stage. Our solution protects your digital asssets when they are at their most vulnerable.
Our solution runs Linux OS within its enclaves which enables a much wider field of application as it supports the broad usage of existing software and also supports the conversion of existing docker images.
Whether you need a cloud-based solution or would like to secure your servers on-premise. Whether you need a little processing capacity or serious computational power – our solution is fully scalable to meet your needs.
Rather than relying on software alone to manage access to resources, our solution provides security as part of a hardware platform. This is what we call a Trusted Execution Environment (TEE) – using Intel SGX hardware.
The development and rapid change of regulatory requirements for data privacy represents a significant challenge. This is particularly true in Europe with the GDPR legislation. Our solution provides security by design, thereby ensuring regulatory compliance.
Ease & Simplicity of Use
With our patented solution you can easily add custom files or add Linux software packages without the need for any modification. Environments are stored as non-propreitary container images and can be exchanged via public and private container registries.
There is a gap in protection when data is decrypted for processing in the cloud (data in use). By using hardware-based, Trusted Execution Environments (TEE’s), we provide a secure container during runtime.
Advanced in-enclave networking support via the Linux Network stack
Full support for local and remote attestation
Advanced in-enclave debug and profiling support
Using hardware-based technology as a cyber security solution comes with a significant advantage over software-based solutions: It is secure by design. With our simple and intuitive User Interface – anyone can unlock the power of confidential computing today!
Customizable Runtime Environments
Accelerate the pace of development in your organization with thousands of certified environments that are designed to meet your exact needs or create your own. Deploy seamlessly.
Benefit from an extensive catalog of apps and services by easily converting exsiting Docker images
Use Linux software packages without the need for any modification or recompilation
Easy handling concerning the addition of custom files to environments
Built-In environment encryption and integrity protection
Data Protection and GDPR Compliance
The stringent and changing regulatory requirements for data privacy represent a significant challenge.
Ensure GDPR compliance with Confidential Computing
Trusted Execution Environments ensure security by design
Ensure the securitization of sensitive data and business critical applications
Protected from access by the cloud provider
Enjoy the advantages of the cloud thanks to confidential computing. Use our solution to ensure secure cloud computing for your business!
Hosted Securely in Europe
Securitee is part of the Open Trusted Cloud (OTC) program at OVHcloud. As Europes leading secure cloud computing service provider this includes:
CISPE code of conduct on data protection compliance
SWIPO IaaS Compliance, ISO 27701, 27001, 27018
The contribution of HDS, CSA, EBA, PCI DSS, and SOC1,2,3 certifications
It is essential to provide cloud-based solutions that guarantee compliance with European regulations and reflect the values of an open and free world.
Your trusted cyber security solution
Our patented solution offers a complete and seamlessly integrable confidential computing platform with all the tools you need to secure your applications and data – whether you would like to secure existing applications and data, get started with confidential processes, or want to leverage secure data analytics.
All the currently applied technologies regarding (cloud) application security are software solutions. Securitee’s solution is based on hardware components provided by Intel Software Guard Extensions (SGX). Using hardware-based technology as a cyber security solution comes with a significant advantage over software-based solutions: It is secure by design.
Open Trusted Cloud
Securitee is part of the Open Trusted Cloud (OTC) program at OVHcloud. We agree that it is essential to provide alternative cloud-based Platform-as-a-Service solutions (PaaS), that guarantees compliance with European regulations and reflects the values of an open and free world. Securitee’s PaaS solution will be hosted in the OVHcloud marketplace in 2022.
What we stand for
For the first time, applications and data in use can be safely secured!
Cyber security solutions are often highly complex and only usable by technical experts.
Gain easy access to customized secure enclaves in just a few clicks!
Digital assets are under increasing cyber threats, can you trust your service provider?
With Intel SGX chipset technology – we don’t ask for trust, we build it!
Everyone should have the right to easily protect their digital assets without prohibitive costs.
Flexible pricing to meet your specific needs – whatever they are!
The Securitee solution offers a framework for developers to create fully customized secure and trusted applications with limited management responsibilities in the cloud or alternatively fully hosted on your own in-house servers.
These delivery options allow businesses to take advantage of simple and cost-effective development and deployment with an easy migration in a highly available and readily scalable way.
Platform Based GUI
With our web-based graphical user interface (GUI) we provide:
Easy access to convert untrusted applications into trusted applications
A visual representation of all commands that are available
Providing an intuitive and easy-to-use interface with immediate visual feedback
The graphical interface enables access to confidential computing, regardless of experience or knowledge.
Backend service for easy integration into existing workflows and structures:
Use a data model that is supported by a set of client-side libraries available on the GitHub page
The API provides a WADL document that describes all resources that are available
OpenAPI Specification (OAS) which defines a standard, language-agnostic interface to RESTful API’s
Allows the you to understand and interact with the remote service with a minimal amount of implementation logic.
Do you have your own in-house hardware set-up and prefer to stay away from cloud-based solutions:
With our on-premise solution you can purchase a seperate license and we establish TEE’s locally on your own hardware components
No affiliation with cloud providers is necessary at all
We offer various levels of dedicated support depending on your specific needs.
Securitee UG (haftungsbeschränkt)
Kemperplatz 1, DE-10785 Berlin
HRB 233040 B (Amtsgericht Charlottenburg)
Geschäftsführer: Christian G. Junger firstname.lastname@example.org
To stay up to date with all our developments, offers and services.
Strengthen your cyber security by securing your applications and data during runtime with just a few clicks.
Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.
The _ga cookie, installed by Google Analytics, calculates visitor, session and campaign data and also keeps track of site usage for the site's analytics report. The cookie stores information anonymously and assigns a randomly generated number to recognize unique visitors.