Confidential computing refers to technologies that protect data while it is being processed, focusing on encryption in use, which complements traditional protections for data at rest and in transit.
At the heart of this approach are Trusted Execution Environments (TEEs). These are isolated hardware-based environments within a CPU that securely process data, away from the reach of the operating system, hypervisor, or cloud provider. TEEs enforce:
Common implementations include Intel SGX, AMD SEV-SNP, and Arm TrustZone. TEEs are already in use across industries from financial modeling and AI to collaborative analytics and regulated healthcare data.
Confidential computing greatly enhances security posture by ensuring that data remains protected during processing. With TEEs, decrypted data is only accessible inside the secure enclave, away from infrastructure-level threats.
This trust is further reinforced by attestation, which enables systems to cryptographically verify the integrity of the environment before sensitive data is processed. Enterprises can enforce policies where only attested environments receive encryption keys.
While highly secure, TEEs aren’t without their challenges. Potential risks include:
However, these risks are being continually addressed with evolving standards, robust auditing practices, and secure enclave design patterns. As part of a layered security model, confidential computing is a resilient and reliable technology.
Despite its strengths, enterprises must weigh certain trade-offs when deploying TEEs:
These challenges are real but solvable. With maturing vendor ecosystems, open-source tooling, and forthcoming distributed TEE models, confidential computing is becoming increasingly scalable and enterprise-ready.
It’s not accurate to describe confidential computing itself as post-quantum. TEEs are hardware-based solutions whose guarantees depend on CPU/accelerator integrity, firmware, and microcode and they remain exposed to non-quantum risks such as side-channel attacks.
However, the protocols around TEEs (e.g., data encryption and key exchange) can be post-quantum secure. At Duality, we see the following advancements:
In practice, this means:
This layered approach ensures enterprises remain protected as quantum threats become more realistic, without overstating the guarantees of TEEs themselves.
As enterprises increasingly run compute-intensive workloads like AI training and inference, GPUs are critical. The next frontier is confidential GPUs, bringing TEE-like protections to GPU accelerators.
Recent developments from vendors such as NVIDIA extend enclave-based protections to GPU memory and execution flows. This enables:
This GPU integration is crucial for sectors like defense, healthcare, and finance, where sensitive data often requires high-performance parallel processing. By combining CPUs and GPUs under a confidential computing model, enterprises can scale secure AI pipelines without sacrificing performance.
Not every workload needs confidential computing—but for those that do, the benefits are game-changing.
Ideal use cases include:
When evaluating confidential computing, enterprises should consider:
The decision to adopt TEEs should be rooted in both business priorities and technical feasibility. As privacy and compliance demands rise, confidential computing provides a secure path forward.
Duality Technologies’ Approach
At Duality Technologies, confidential computing is just one part of a holistic approach to privacy-enhancing computation.
We combine:
Our platform supports flexible deployments across cloud, on-premises, and edge ensuring data privacy throughout its lifecycle. With built-in support for cryptographic agility and transparent trust verification, we help organizations align security strategy with innovation.
Whether you’re securing collaborative analytics, training AI on encrypted data, or meeting regulatory requirements, Duality provides the tools to do so safely and scalably.
What’s the difference between encryption at rest / in transit vs encryption in use?
Encryption at rest protects stored data; in transit protects data in motion. Encryption in use, enabled by confidential computing, protects data during processing.
Can a cloud provider access my data if it’s processed in a TEE?
Not if the TEE is properly configured and attestation is verified. The data remains encrypted and isolated from cloud infrastructure.
What is attestation and why is it important?
Attestation proves that a TEE is running verified code in a trusted environment. It’s crucial for verifying security before processing sensitive data.
What flow is quantum safe when working with confidential computing?
Using Duality the data encryption is done using AES 256 which is considered as quantum safe. In addition, the key exchange is also quantum safe as we’re using ML-KEM-1024 protocol implemented in liboqs library from the Open Quantum Safe (OQS) project.