Confidential Computing
By HUB Security
A unique and intrinsically secure computing platform designed for extreme security, flexibility and scalability
What is Confidential Computing
As opposed to current cybersecurity solutions, Confidential Computing allows data to remain encrypted even as it’s being processed and used in applications.
It is the most innovative approach to cybersecurity spearheading a $54 billion market with an aggressive 90%-95% CAGR
solutions
DATA AT REST PROTECTION
DATA IN TRANSIT PROTECTION
by HUB
DATA IN USE PROTECTION
Confidential computing in general and HUB in particular begin where legacy methods end, providing a HOLISTIC cyber protection with end-to-end data protection across all phases


The Problem
Cybersecurity has proven to be ineffective over the past decade with millions of records being stolen, held ransom and exposed daily.
Current protective solutions are found to be
insufficient and leave critical data exposed.
The HUB solution
HUB offers a new security paradigm to protect and unlock game changing opportunities

Safe offloading and processing of massive new data sources at the source

Secure AI (model and data) at the edge

Protecting low latency (real time) near user & IoT
Our key advantages
New security paradigm
- Confidential computing
- Secures next gen services: 5G, edge, AI
- Disables #1 cause of hacks (via admin credential control)
End-to-end control
- Broad range of hardware and software security services (layers 0 to 7)
- Tamper resistant for safe use outside your data centre
- Zero Trust architecture
Extensible and flexible
- Compatible across computing architectures:
CPUs / GPUs / FPGA - No performance impact and extremely scalable
- Run any application without modification
- Multiple form factors from multi-tenant servers to PCIe cards
Future proof
- Quantum ready
- Programmable and updatable without need to change hardware
All in secure Enclave
- Secure Computing
- Secure Audit Logs
- Secure Key Mgmnt
- Secure Access control
- Secure Storage
- Tamper Detection
High Performance
- Scalability – across multiple appliances
- No performance impact
Programmable Firmware Firewall
- Ultimate flexible protection
- In/out of secure enclave
Quantum Ready
- QRNG
- Post Quantum Algorithms
- QKD integration
Custom Built
- In-house hardware & software design
- Programmable HW for new algorithms
- Apps easily added and customized
Our Confidential Computing Products
HUB | 48U
A state-of-the-art cybersecurity on-premise and cloud server module, preconfigured and optimized with HUB hardware for maximized defense of enterprise server farms.


HUB | 1U, 2U & 4U
A HUB server unit to be integrated within a larger scope of IT architecture to fortify existing infrastructures
HUB | PCIe
For integration with Edge Computing server infrastructure and Distributed AI-computing hubs



HUB | ASIC
A groundbreaking HUB-on-chip solution for edge devices