Skip to main content

Envisioning is an emerging technology research institute and advisory.

LinkedInInstagramGitHub

2011 — 2026

research
  • Reports
  • Newsletter
  • Methodology
  • Origins
  • Vocab
services
  • Research Sessions
  • Signals Workspace
  • Bespoke Projects
  • Use Cases
  • Signal Scanfree
  • Readinessfree
impact
  • ANBIMAFuture of Brazilian Capital Markets
  • IEEECharting the Energy Transition
  • Horizon 2045Future of Human and Planetary Security
  • WKOTechnology Scanning for Austria
audiences
  • Innovation
  • Strategy
  • Consultants
  • Foresight
  • Associations
  • Governments
resources
  • Pricing
  • Partners
  • How We Work
  • Data Visualization
  • Multi-Model Method
  • FAQ
  • Security & Privacy
about
  • Manifesto
  • Community
  • Events
  • Support
  • Contact
  • Login
ResearchServicesPricingPartnersAbout
ResearchServicesPricingPartnersAbout
  1. Home
  2. Research
  3. Horizons
  4. Confidential Computing

Confidential Computing

Hardware-isolated environments that encrypt data during active processing
Back to HorizonsView interactive version

Confidential computing uses hardware-based trusted execution environments (TEEs) or secure enclaves to protect data while it's being processed, not just when it's at rest or in transit. These secure enclaves are isolated areas of memory that are encrypted and protected from the operating system, hypervisor, and even cloud providers, ensuring that data and code remain confidential and tamper-proof during computation. The technology enables processing of sensitive data in untrusted environments like public clouds or shared infrastructure while maintaining security and privacy.

The technology addresses critical security gaps where data is vulnerable during processing, even when encrypted at rest and in transit. Confidential computing ensures that sensitive data can be processed in cloud environments, shared infrastructure, or by third parties without exposing it to potential attackers or even the infrastructure providers. Applications include secure cloud computing for sensitive workloads, privacy-preserving AI training on sensitive data, secure multi-party computation, and processing regulated data in compliant ways. Companies like Intel (with SGX), AMD (with SEV), and cloud providers are implementing confidential computing.

At TRL 6, confidential computing is commercially available from major cloud providers and hardware vendors, though adoption and ecosystem development continue. The technology faces challenges including performance overhead from encryption and isolation, complexity of implementation, ensuring enclave security against side-channel attacks, and building trust in the technology. However, as security requirements increase and cloud adoption grows, confidential computing becomes increasingly important. The technology could enable secure processing of sensitive data in cloud environments, protect AI models and training data, enable new forms of secure collaboration, and help organizations meet regulatory requirements, potentially transforming how sensitive data is processed while maintaining security and privacy in distributed computing environments.

TRL
6/9Demonstrated
Impact
5/5
Investment
5/5
Category
Software

Related Organizations

Confidential Computing Consortium logo
Confidential Computing Consortium

United States · Consortium

100%

A project community at the Linux Foundation dedicated to defining and accelerating the adoption of confidential computing.

Standards Body
AMD logo
AMD

United States · Company

98%

Develops the RDNA architecture with Ray Accelerators, powering ray tracing on PC and current-gen consoles (PS5, Xbox Series X).

Developer
Intel logo
Intel

United States · Company

98%

Develops silicon spin qubits using advanced 300mm wafer manufacturing processes.

Developer
Fortanix logo
Fortanix

United States · Company

95%

Provides a data security platform that decouples security from infrastructure using confidential computing enclaves.

Developer
Anjuna Security logo
Anjuna Security

United States · Startup

92%

Software that enables applications to run in secure enclaves (AWS Nitro, Azure, etc.) without code modifications.

Developer
Edgeless Systems logo
Edgeless Systems

Germany · Company

90%

German cybersecurity company building open-source software for confidential computing (e.g., Constellation).

Developer
Decentriq logo
Decentriq

Switzerland · Startup

88%

Provides data clean rooms powered by confidential computing to enable secure data collaboration and model training.

Developer
Huberlin (Scontain)

Germany · Company

85%

Developers of the SCONE platform which enables containerized applications to run inside SGX enclaves.

Developer
Secretarium

United Kingdom · Startup

85%

Privacy-enhancing technology company using secure enclaves to protect data processing.

Developer
Oasis Labs logo
Oasis Labs

United States · Company

80%

Blockchain platform integrating secure enclaves to enable privacy-preserving smart contracts.

Developer

Supporting Evidence

Evidence data is not available for this technology yet.

Connections

Software
Software
Homomorphic Encryption

Computing on encrypted data without decrypting it first, preserving privacy throughout processing

TRL
5/9
Impact
3/5
Investment
3/5

Book a research session

Bring this signal into a focused decision sprint with analyst-led framing and synthesis.
Research Sessions