Skip to main content

BetterEdge's confidential computing applied to hardware in your data center

You already operate one or more data centers with powerful servers. You are not immediately planning an expansion, which in many scenarios would be best achieved with BetterEdge modules, but intend to use your available servers for advanced Confidential Computing.


This is easily possible by licensing the unique BetterEdge 1000 Confidential Computing control software. This allows you to protect your workloads on your own data center hardware from unauthorized internal or external access.


The main requirement for the servers in your data center is that they are equipped with 5th generation Intel Xeon processors or newer. 


You pay for the use of the control software with a license and can use it to equip any number of Trusted Execution Domains (TED) with RAM and storage according to your data centre resources.


The BetterEdge team is among the pioneers in the field of Confidential Computing. As early as 2009, four years before Intel launched the corresponding chip technology on the market, the leading minds of the BetterEdge team were already working on multi-server confidential computing and cryptographic sealing of server infrastructures. As a result, the team is familiar with the best industry practices in Confidential Computing.


It is important that the focus is not only on the basic function of chip-based Confidential Computing—i.e., the encryption of data in the working memory—but also that the technology ensures the integrity of the hardware and software throughout and that key management does not allow any possibility of the keys being accessed, even during the initialization phase.

 

If you are interested in BetterEdge 1000, please use the contact form below. We will get in touch with you and provide you with a quote for integrating your servers into your BetterEdge infrastructure and licensing the BetterEdge Control software, including attestation and key services.

Your Benefits

In a Trusted Execution Domain (TED), the data in RAM is encrypted using confidential computing. Compared to conventional virtual machines, this means that infrastructure administrators can no longer access your software code. The data processed in your TED also remains inaccessible to them. This is a necessary condition for verifiable digital sovereignty.




With BetterEdge, users (or their admin) of software executed in a TED can cryptographically verify (signing & attestation) at any time whether the correct code is being executed on the correct hardware.






The encryption of persistent data takes place automatically in the storage areas assigned to the TED at BetterEdge. These keys are technically secured and cannot be accessed by anyone. This makes using TEDs simple and straightforward.









If you require equally secure keys for your software, these are available from the same highly secure source.










With one license, you can equip as many Trusted Execution Domains (TEDs) as you wish with RAM and storage according to your resources.

We are happy to advise you

Please contact us, we will be happy to advise you on how you can significantly improve the security of your applications with BetterEdge 1000 in a straightforward manner.

  •  
  •  
  •