Confidential Cloud VMs -
Data protected without compromise

White partimus logo. A P and an L that are inside each other.

Operating confidential workloads securely in the cloud

With Confidential Virtual Machines from partimus, you can protect your sensitive data while it is being processed. Thanks to hardware-based storage encryption, content remains inaccessible even to cloud administrators, hypervisors or the host system.

Our Confidential Cloud is based on Proxmox VE and supports Intel TDX and AMD SEV. This allows you to meet the highest security and compliance requirements – without sacrificing performance, flexibility or control. Ideal for companies that want to run critical applications, personal data or regulated workloads securely in the cloud.

Our solution

Confidential Virtual Machines at partimus

Confidential Virtual Machines from partimus enable the secure operation of sensitive workloads in the cloud by protecting data during processing. Based on Proxmox VE and with support for Intel TDX and AMD SEV, storage content is completely isolated and encrypted – even against host systems or privileged access. As an option, Remote Attestation provides additional transparency by allowing the trusted state of a VM to be cryptographically verified before sensitive processes are started.

Intel TDX & AMD SEV support

Protect the memory contents of your virtual machines with hardware-based encryption at CPU level so that data cannot be viewed even during processing.

Confidential Computing on Proxmox VE

Enable the operation of confidential workloads on an open, established virtualization platform with clear separation between VM, host and hypervisor.

Isolation from host & hypervisor

Prevent access to memory contents and processes within the VM, even with administrative rights at infrastructure level.

Remote attestation for VMs

Cryptographically check the trustworthy status of your virtual machines before applications are started or sensitive data is processed.

Dedicated or multi-tenant environments

Operate Confidential VMs either in completely isolated individual environments or securely integrated in multi-tenant architectures.

Managed cloud on request

Relieve your internal teams by having partimus operate, monitor and maintain your Confidential VMs - or retain full self-administration.

partimus gmbh confidential cloud vms 2
Typical application scenarios

Where confidential VMs offer real added value

Confidential virtual machines are suitable for all scenarios in which sensitive data is actively processed and the highest security and data protection requirements apply. Especially for personal data, confidential business information or regulated workloads, they enable secure cloud operation without the possibility of insight at infrastructure level. Hardware-based isolation, encrypted RAM and optional remote attestation create a trustworthy basis for modern cloud architectures.

Processing of personal data

Ideal for applications with sensitive customer, patient or employee data, where data protection and access control have the highest priority.

Regulated industries & compliance

Suitable for financial service providers, authorities or companies with strict regulatory requirements such as GDPR, ISO or industry-specific specifications.

Secure data analysis & AI workloads

Protect training data, models and analysis results in the cloud even during the calculation.

Multi-party computing & data exchange

Enables secure collaboration between multiple parties without one party having full access to the raw data.

Maximum confidentiality

Protect your data reliably now

Get a no-obligation consultation and find out how you can operate sensitive workloads securely in the cloud. Our experts will support you with the architecture, migration and operation of your optimal Confidential Cloud VM.

partimus gmbh confidential cloud vms 3
Your advantages

Why Confidential Computing with partimus

Confidential computing at partimus offers far more than traditional cloud security mechanisms. By combining hardware-based isolation, transparent virtualization and professional operation, Confidential Virtual Machines from partimus create an environment in which sensitive data remains protected even during processing. Companies benefit not only from greater security, but also from more control, traceability and planning security for business-critical workloads.

Maximum data security

Thanks to hardware-based storage encryption, data remains protected even during active processing within the virtual machine and cannot be viewed by the host system or privileged administrators.

Transparent infrastructure

The use of Proxmox VE enables a traceable and openly documented cloud architecture that gives companies full control over the technologies and security mechanisms used.

Flexible & scalable

Confidential Virtual Machines can be flexibly adapted to growing requirements and enable the secure operation of both individual applications and complex, scalable cloud environments.

Remote attestation for trust

Remote Attestation makes it possible to cryptographically check the trustworthy status of a virtual machine before sensitive processes are started or business-critical data is processed.

German cloud infrastructure

Operation in certified data centers in Germany supports high data protection and security standards and facilitates compliance with legal and regulatory requirements.

Personal Enterprise Support

With partimus, you benefit from direct access to experienced cloud and security experts who will personally support you from architecture planning to the stable operation of your Confidential Cloud.

Get to know partimus

Get started with partimus

Take the opportunity to optimize your IT infrastructure and drive your business forward – contact us today to find out more about the tailored benefits partimus can offer you.

FAQ - Frequently asked questions

Questions and answers about Confidential Cloud VMs

Confidential virtual machines are specially secured virtual machines in which data is protected not only at rest or during transfer, but also during processing. This is made possible by hardware-based memory encryption directly at CPU level. As a result, sensitive information remains protected even from privileged access at host or hypervisor level.

partimus relies on Intel TDX and AMD SEV in combination with Proxmox VE as a virtualization platform. These technologies enable complete isolation and encryption of the working memory of virtual machines. This creates a trustworthy cloud environment based on open and established technologies.

In most cases, existing applications can be operated in Confidential VMs without any adjustments. The security mechanisms take effect at hardware level so that applications automatically benefit from increased protection. Depending on the workload, we will be happy to advise you on possible special features or performance aspects.

Remote Attestation makes it possible to cryptographically check the status of a virtual machine. This makes it possible to ensure that the VM is running in an unchanged and trustworthy environment before starting sensitive processes. This creates additional transparency and trust, especially for security-critical applications.

Yes, Confidential Virtual Machines offer an additional layer of protection for personal and particularly sensitive data. They help companies to implement technical data security measures and meet high data protection requirements. However, this is no substitute for a legal assessment, which is why we recommend individual advice.

partimus offers both fully managed confidential cloud environments and options for self-administration. In managed operation, we take over the maintenance, monitoring and operation of the infrastructure, among other things. This allows your teams to concentrate on applications and business processes.

Are you interested in Confidential Cloud VMs for your company?We will be happy to advise you without obligation!