Confidential Computing
By HUB Security

A unique and intrinsically secure computing platform designed for extreme security, flexibility and scalability


What is Confidential Computing

01

As opposed to current cybersecurity solutions, Confidential Computing allows data to remain encrypted even as it’s being processed and used in applications.

It is the most innovative approach to cybersecurity spearheading a $54 billion market with an aggressive 90%-95% CAGR

  02
Existing cyber security
solutions

DATA AT REST PROTECTION

DATA IN TRANSIT PROTECTION

          
Confidential Computing
by HUB

DATA IN USE PROTECTION

 

Confidential computing in general and HUB in particular begin where legacy methods end, providing a HOLISTIC cyber protection with end-to-end data protection across all phases

Dust Black2 3
Hacker figure illustration 2

The Problem

Cybersecurity has proven to be ineffective over the past decade with millions of records being stolen, held ransom and exposed daily.

Current protective solutions are found to be
insufficient and leave critical data exposed.

03

The HUB solution

HUB offers a new security paradigm to protect and unlock game changing opportunities

Safe offloading

Safe offloading and processing of massive new data sources at the source

Secure AI at the edge

Secure AI (model and data) at the edge

Protecting low latency near user & IoT

Protecting low latency (real time) near user & IoT

04
05

Our key advantages

New security paradigm

  • Confidential computing
  • Secures next gen services: 5G, edge, AI
  • Disables #1 cause of hacks (via admin credential control)

 

End-to-end control

  • Broad range of hardware and software security services (layers 0 to 7)
  • Tamper resistant for safe use outside your data centre
  • Zero Trust architecture

 

Extensible and flexible

  • Compatible across computing architectures:
    CPUs / GPUs / FPGA
  • No performance impact and extremely scalable
  • Run any application without modification
  • Multiple form factors from multi-tenant servers to PCIe cards

 

Future proof

  • Quantum ready
  • Programmable and updatable without need to change hardware

All in secure Enclave

  • Secure Computing
  • Secure Audit Logs
  • Secure Key Mgmnt
  • Secure Access control
  • Secure Storage
  • Tamper Detection

High Performance

  • Scalability – across multiple appliances
  • No performance impact

 

Programmable Firmware Firewall

  • Ultimate flexible protection
  • In/out of secure enclave

 

Quantum Ready

  • QRNG
  • Post Quantum Algorithms
  • QKD integration

 

Custom Built

  • In-house hardware & software design
  • Programmable HW for new algorithms
  • Apps easily added and customized
00011110010010      
0001111100010001010010      
06

Our Confidential Computing Products

HUB | 48U

A state-of-the-art cybersecurity on-premise and cloud server module, preconfigured and optimized with HUB hardware for maximized defense of enterprise server farms.

Confidential Computing Products HUB | 48U
Confidential Computing Products HUB | 1U, 2U, 4U

HUB | 1U, 2U & 4U

A HUB server unit to be integrated within a larger scope of IT architecture to fortify existing infrastructures

HUB | PCIe

For integration with Edge Computing server infrastructure and Distributed AI-computing hubs

Confidential Computing Products | PCIE
ASIC for confidential computing, HUB-on-chip solution for edge devices
Clingone2

HUB | ASIC

A groundbreaking HUB-on-chip solution for edge devices

Contact Us