STACKIT Confidential Server (Preview / Limited Offering)
Secure particularly critical workload with STACKIT Confidential Server
STACKIT Confidential Server provides cloud users with scalable, self-managed, confidential virtual machines (STACKIT Confidential Virtual Machine, CVM). They can be secured with modern (hardware-based) security technologies (e.g. AMD SEV-ES). They enable cloud users to run any application in an environment that is shielded from the underlying cloud infrastructure. STACKIT Confidential Server forms the basis for the execution of further applications in the area of confidential computing.
STACKIT Confidential Server is currently only available on request. If you are interested, please contact us.
Use cases
With STACKIT Confidential Server the following use cases can be realized, among others:
Migrate sensitive workload to the cloud
Protection against unauthorized access using STACKIT Confidential Server makes it possible to migrate even particularly sensitive workload to the cloud. This turns the STACKIT public cloud into a private cloud for users.
Meet regulatory requirements
STACKIT Confidential Server helps you meet your regulatory requirements.
Set up systematically encapsulated system environments
Through the project scope, different system environments, based on CVMs, can be separated from each other in a structured manner in order to implement a wide variety of requirement scenarios.
Functions
- With STACKIT Confidential Server, customers can secure their environment with hardware-rooted security technologies.
- Thanks to the support of individual images, users have complete control and transparency over the components of the operating system used, which allows them to meet specific requirements.
- STACKIT Confidential servers are provided in different system sizes to serve your different use cases.
Advantages
- You can independently, quickly and easily protect servers from unauthorized access and prevent data leaks.
- You have complete control over your workload and can migrate even the most critical workload to the public cloud, which becomes a private cloud for you.
- You meet regulatory and compliance requirements for data protection.
Prices
Do you still have specific questions about the product or would you like to test it? For further information and advice from our competent team of experts, please do not hesitate to contact us.