Enterprise IT / Cybersecurity

Confidential Computing

EXECUTION STRENGTHMARKET STRENGTHLEADERHIGHFLIEROUTPERFORMERCHALLENGER

What is Confidential Computing?

These solutions use various techniques to process data without compromising its security (i.e., keeping it encrypted). The primary confidential computing techniques include differential privacy, secure multi-party encryption, homomorphic encryption, and trusted execution environments.

Selling a product or service?
Reach more buyers.

Your future customers are researching their next tech solution on CB Insights. Make sure they can find you.

Claim your CB Insights Profile

Leaders

Leaders are the most established service providers in the market and possess the breadth to address various customer needs.

See why these companies made it as leaders for Confidential Computing. These companies include Enveil and Inpher.

Enveil logo
Enveil

United States / Founded Year: 2016

Enveil is a data security company protecting Data in Use. The company's business-enabling and privacy-preserving capabilities for secure data search, sharing, and collaboration protect data while it's being used or processed. Powered by homomorphic encryption, Enveil’s ZeroReveal solutions allow organizations to securely derive insights, cross-match, and search third-party data assets without ever revealing the contents of the search itself or compromising the security or ownership of the underlying data. The company was founded in 2016 and is based in Fulton, Maryland.

Known Partners

Terradepth, Sayari, Novetta

Key People

Ellison Williams

Inpher logo
Inpher

United States / Founded Year: 2015

Inpher develops cryptographic secret computing technology for secure and distributed analytics and machine learning. The company's technology maintains the privacy of critical data and helps organizations comply with privacy laws across jurisdictions.

Key People

Jordan Brandt, Dimitar Jetchev

Duality Technologies logo
Duality Technologies

United States / Founded Year: 2016

Duality Technologies is a cybersecurity developer of an encrypted data collaboration platform. Duality's SecurePlus platform combines homomorphic encryption and data science, enabling organizations to derive insights without exposing raw data.

Known Partners

Oracle Financial Services, Amazon Web Services, Naren Chainani, and 3 more

Key People

Rina Shainski, Alon Kaufman, Kurt Rohloff

Skyflow logo
Skyflow

United States / Founded Year: 2019

Skyflow develops a secure platform for API usage.

Known Partners

Plaid, Alloy, Visa

Key People

Subbu S., Anshu Sharma, Prakash Khot, and 2 more

Highfliers

Highfliers are the most innovative service providers in the market and possess the resources to address evolving customer needs.

See why these companies made it as highfliers for Confidential Computing. These companies include Datafleets and TripleBlind.

Datafleets logo
Datafleets

United States / Founded Year: 2018

DataFleets helps organizations to overcome the struggle between data privacy and innovation by helping them maintain the highest data protection standards for compliance while simultaneously accelerating data science initiatives. Its platform provides data scientists and developers with a "data fleet"​ which allows them to create analytics, ML models, and applications on highly sensitive data sets without ever having explicit access to the data.On February 8th, 2021, Datafleets was acquired by LiveRamp at a valuation of $68M.

Key People

David Gilmore

TripleBlind logo
TripleBlind

United States / Founded Year: 2019

TripleBlind offers digital privacy as a service with a suite of tools that enables companies to safely provide and consume extremely sensitive data and algorithms in encrypted space.

Known Customers

Mayo Clinic

Key People

Greg Storm, Riddhiman Das, Gary Moore

Outperformers

Outperformers are the most specialized service providers in the market and possess the expertise to address unique customer needs.

See why these companies made it as outperformers for Confidential Computing. These companies include Acompany and Desilo.

Acompany logo
Acompany

Japan / Founded Year: 2018

Acompany is a data security research and development company that provides support for privacy protection and secure data utilization centered on "SeDi Computation", a computing system that can analyze data while encrypted by combining blockchain and secret sharing technology. The company also offers QuickMPC, a secret calculation engine that overcomes the drawbacks of conventional cryptographic methods.

Key People

David Wyndham

D
Desilo

South Korea / Founded Year: 2020

Desilo develops privacy-preserving, homomorphically-encrypted machine learning solutions.

Apheris logo
Apheris

Germany / Founded Year: 2019

Apheris develops software and algorithms for federated and privacy-preserving analytics and AI. The company works with pharma, industrial, and chemical companies.

Key People

Michael Höh, Robin Röhm

Challengers

Challengers are the most promising service providers in the market and possess the agility to address emerging customer needs.

See why these companies made it as challengers for Confidential Computing. These companies include Nth Party and Cape Privacy.

Nth Party logo
Nth Party

United States / Founded Year: 2019

Nth Party provides software solutions for secure data analysis that use privacy-enhancing technologies.

Known Customers

Infutor

Key People

Shereen Shermak, Andrei Lapets

Cape Privacy logo
Cape Privacy

United States / Founded Year: 2018

Cape Privacy provides enterprise companies with a SaaS collaboration platform on top of advanced privacy and security technology to maximize the value of their data. It allows businesses to collaborate internally (e.g. risk, legal, compliance divisions in a bank) or with third-party vendors (e.g. an agency or outside law firm) and across organizations (even competitors such as major pharmaceutical firms) by enhancing the privacy of data.

Known Partners

Snowflake Computing

Key People

Ben DeCoste, Che Wijesinghe, Steven Carr, and 1 more

What is Confidential Computing?

These solutions use various techniques to process data without compromising its security (i.e., keeping it encrypted). The primary confidential computing techniques include differential privacy, secure multi-party encryption, homomorphic encryption, and trusted execution environments.

Selling a product or service?
Reach more buyers.

Your future customers are researching their next tech solution on CB Insights. Make sure they can find you.

Claim your CB Insights Profile