Confidential Cloud VMs -
Data protected without compromise
Operating confidential workloads securely in the cloud
With Confidential Virtual Machines from partimus, you can protect your sensitive data while it is being processed. Thanks to hardware-based storage encryption, content remains inaccessible even to cloud administrators, hypervisors or the host system.
Our Confidential Cloud is based on Proxmox VE and supports Intel TDX and AMD SEV. This allows you to meet the highest security and compliance requirements – without sacrificing performance, flexibility or control. Ideal for companies that want to run critical applications, personal data or regulated workloads securely in the cloud.
- Maximum confidentiality
- Verifiably safe
- Enterprise-ready
Confidential Virtual Machines at partimus
Confidential Virtual Machines from partimus enable the secure operation of sensitive workloads in the cloud by protecting data during processing. Based on Proxmox VE and with support for Intel TDX and AMD SEV, storage content is completely isolated and encrypted – even against host systems or privileged access. As an option, Remote Attestation provides additional transparency by allowing the trusted state of a VM to be cryptographically verified before sensitive processes are started.
Protect the memory contents of your virtual machines with hardware-based encryption at CPU level so that data cannot be viewed even during processing.
Enable the operation of confidential workloads on an open, established virtualization platform with clear separation between VM, host and hypervisor.
Prevent access to memory contents and processes within the VM, even with administrative rights at infrastructure level.
Cryptographically check the trustworthy status of your virtual machines before applications are started or sensitive data is processed.
Operate Confidential VMs either in completely isolated individual environments or securely integrated in multi-tenant architectures.
Relieve your internal teams by having partimus operate, monitor and maintain your Confidential VMs - or retain full self-administration.
Where confidential VMs offer real added value
Confidential virtual machines are suitable for all scenarios in which sensitive data is actively processed and the highest security and data protection requirements apply. Especially for personal data, confidential business information or regulated workloads, they enable secure cloud operation without the possibility of insight at infrastructure level. Hardware-based isolation, encrypted RAM and optional remote attestation create a trustworthy basis for modern cloud architectures.
Ideal for applications with sensitive customer, patient or employee data, where data protection and access control have the highest priority.
Suitable for financial service providers, authorities or companies with strict regulatory requirements such as GDPR, ISO or industry-specific specifications.
Protect training data, models and analysis results in the cloud even during the calculation.
Enables secure collaboration between multiple parties without one party having full access to the raw data.
Protect your data reliably now
Get a no-obligation consultation and find out how you can operate sensitive workloads securely in the cloud. Our experts will support you with the architecture, migration and operation of your optimal Confidential Cloud VM.
Why Confidential Computing with partimus
Confidential computing at partimus offers far more than traditional cloud security mechanisms. By combining hardware-based isolation, transparent virtualization and professional operation, Confidential Virtual Machines from partimus create an environment in which sensitive data remains protected even during processing. Companies benefit not only from greater security, but also from more control, traceability and planning security for business-critical workloads.
Thanks to hardware-based storage encryption, data remains protected even during active processing within the virtual machine and cannot be viewed by the host system or privileged administrators.
The use of Proxmox VE enables a traceable and openly documented cloud architecture that gives companies full control over the technologies and security mechanisms used.
Confidential Virtual Machines can be flexibly adapted to growing requirements and enable the secure operation of both individual applications and complex, scalable cloud environments.
Remote Attestation makes it possible to cryptographically check the trustworthy status of a virtual machine before sensitive processes are started or business-critical data is processed.
Operation in certified data centers in Germany supports high data protection and security standards and facilitates compliance with legal and regulatory requirements.
With partimus, you benefit from direct access to experienced cloud and security experts who will personally support you from architecture planning to the stable operation of your Confidential Cloud.
Get started with partimus
Take the opportunity to optimize your IT infrastructure and drive your business forward – contact us today to find out more about the tailored benefits partimus can offer you.
Questions and answers about Confidential Cloud VMs
We are your experienced contact when it comes to confidential virtual machines. We will be happy to answer all your questions and advise you on your personal use case in your company on request. Simply contact us by e-mail, telephone or via our contact form.
What are confidential virtual machines?
Confidential virtual machines are specially secured virtual machines in which data is protected not only at rest or during transfer, but also during processing. This is made possible by hardware-based memory encryption directly at CPU level. As a result, sensitive information remains protected even from privileged access at host or hypervisor level.
Which technologies does partimus use for Confidential Computing?
partimus relies on Intel TDX and AMD SEV in combination with Proxmox VE as a virtualization platform. These technologies enable complete isolation and encryption of the working memory of virtual machines. This creates a trustworthy cloud environment based on open and established technologies.
Are Confidential VMs compatible with existing software?
In most cases, existing applications can be operated in Confidential VMs without any adjustments. The security mechanisms take effect at hardware level so that applications automatically benefit from increased protection. Depending on the workload, we will be happy to advise you on possible special features or performance aspects.
What is remote attestation?
Remote Attestation makes it possible to cryptographically check the status of a virtual machine. This makes it possible to ensure that the VM is running in an unchanged and trustworthy environment before starting sensitive processes. This creates additional transparency and trust, especially for security-critical applications.
Are confidential VMs suitable for GDPR-relevant data?
Yes, Confidential Virtual Machines offer an additional layer of protection for personal and particularly sensitive data. They help companies to implement technical data security measures and meet high data protection requirements. However, this is no substitute for a legal assessment, which is why we recommend individual advice.
Does partimus also support managed operation?
partimus offers both fully managed confidential cloud environments and options for self-administration. In managed operation, we take over the maintenance, monitoring and operation of the infrastructure, among other things. This allows your teams to concentrate on applications and business processes.