Studio enables organisations to share & process sensitive data. It adds a simple UX interface atop state-of-the-art confidential computing security mechanisms. Studio facilitates confidential data collaboration with external partners, logs all ongoing activities. It provides detailed reports for a verifiable and trustworthy collaboration.
Tower manages the execution environment. It creates all the required infrastructure resources and a Trusted Execution Environment (TEE, see Confidential Computing). Tower can orchestrate TEEs on the resources of a Cloud Service Provider of your choice, or On-Prem (see Infrastructure). It reliably destroys all the resources once the execution is completed or compromised. Each confidential environment is single-use and immutable once created.
Inspector verifies & certifies the execution environment. It validates that the hardware setup has Confidential Computing capability enabled and collects information on the hardware, firmware, and software level to attest its trustworthiness. It monitors the infrastructure and guarantees that untrustworthy environments are destroyed if they fail to meet execution policies.