Skip to content
The Collaborative Analytics and AI Platform for Confidential Computing
The Collaborative Analytics and AI Platform for Confidential Computing
The Opaque Platform
- Securely upload encrypted data or connect to disparate encrypted sources
- Execute high-performance SQL queries, analytics jobs and AI/ML models
- Process data using familiar notebooks and analytical tools
- Verify cluster deployments via remote attestation
- Set policies to govern data and computation
- Securely upload encrypted data or connect to disparate encrypted sources
- Execute high-performance SQL queries, analytics jobs and AI/ML models
- Process data using familiar notebooks and analytical tools
- Verify cluster deployments via remote attestation
- Set policies to govern data and computation
Inter- and Intra-company Collaborative Analytics, AI/ML and Data Sharing
- Establish confidential collaborative workspaces across teams
- Set policies for data sharing and collaborative analytics processing
- Join encrypted data sets without exposing data across teams
- Apply analytics on encrypted data and train models on blended data sets
- Return encrypted results specific to each party
Multi-dimensional Scaling across Enclaves, Data Sources, Teams and Multiple Parties
- Securely set up and scale enclave clusters
- Leverage secure inter-enclave communication
- Automate orchestration and cluster management
- Monitor and manage clusters across multiple workspaces
- Simplify data management and access within and across enclave clusters
Multi-dimensional Scaling across Enclaves, Data Sources, Teams and Multiple Parties
- Securely set up and scale enclave clusters
- Leverage secure inter-enclave communication
- Automate orchestration and cluster management
- Monitor and manage clusters across multiple workspaces
- Simplify data management and access within and across enclave clusters
Multi-tiered Security
- Leverage multiple layers of security, including Intel® Software Guard Extensions, to provide defense in depth
- Fortify enclave components using cryptographic techniques
- Ensure code integrity and data protection via remote attestation
- Protect against side-channel attacks
- Supports regulatory compliance with NIST approved encryption