Deploying SE-Protected Computation
In addition to on-premises installation, Agita Labs has worked with Microsoft, Amazon, and Intel to deploy sequestered encryption into the Azure and AWS clouds. Deploying SE technology ensures that the computation is cryptographically secured to be confidential, undisturbed, and able to safely disclose intended data. Programmers utilize these capabilities in their business operations to:
- Protect sensitive data from data breaches
- Implement zero-trust data sharing of sensitive data with potentially untrustworthy parties
- Process and analyze sensitive 3rd-party data that is always encrypted and confidential
Programmers access these capabilities using simple straightforward extensions to the C++, Python, or JavaScript programming languages. Programmers simply declare protected data types in their software (including integers, floating point, Booleans and strings) and rebuild their programs to utilize SE computation; then computation on encrypted data is directed to the SE enclave where it is protected by cryptographic-strength defenses. Moreover, the SE programming interfaces enforce that programmers do not introduce vulnerabilities into their code, making SE-based programs secure-by-construction: if a computation compiles and runs with SE defenses, it is safe from all known forms of software hacking, data disclosure, and integrity attacks.