Contact Sales

Anjuna Confidential
Computing Software:

Public cloud security made simple


Anjuna Confidential Computing software makes the public cloud the safest and most secure place to compute--completely isolating existing data and workloads from insiders, bad actors, and malicious code. Anjuna software deploys simply in minutes as software over AWS, Azure, and other public clouds. By employing the strongest secure enclave data protection available, Anjuna software effectively replaces complex legacy perimeter security without disrupting operations, applications, or IT.


Strongest Workload Protection Available

Anjuna’s software leverages the strongest data hardware protections available. All major cloud vendors have deployed these technologies under such names as secure enclaves and Confidential Computing. These technologies provide:

  • Built-in high-speed hardware-grade encryption
  • Hardware roots of trust
  • Physical data isolation
  • Key management

Anjuna’s software combines, orchestrates, and abstracts these technologies to provide a secure and virtually unbreachable isolated environment around workloads and data. This isolation extends to data as it is processed, stored, and moved across cloud environments.


Protection from Attacks by Default

Bad actors and malicious software can’t attack what they can’t see. Anjuna-protected workloads and data are cloaked within an invisible zero-trust confidential and private environment that controls data access while eliminating attack surfaces. This keeps all data and workloads secure even in the event of a physical or privileged breach of a cloud host.


Simple Cloud Security in Minutes

With Anjuna, isolating public cloud workloads with hardware-grade security is as simple as running the application as you always have. Much like virtualization, Anjuna secures the environment around applications transparentlyexisting code and data operate as before with no modifications to code or operations.

Applications and data move from exposed to isolated with virtually no effort, eliminating their attack surface and rendering them inaccessiblefully out of reach of cloud providers, third parties, and other IT insiders.

  • Deploys software as part of the operating environment
  • Invokes and runs applications without changes
  • Isolates workloads in an isolated enclave--instead of running in the clear

Any Application. Any Cloud. Any Scale.

Anjuna protects any application and its associated data on any cloud that supports Confidential Computing (or secure enclaves) from vendors such as AWS, Azure, AMD, and Intel.


Any Application

  • No changes to application code or recompilation
  • Includes custom, packaged, and legacy applications
  • Supports cloud-native applications that use technologies such as Kubernetes

Any Cloud

  • Amazon Web Services (AWS)
  • Microsoft Azure Confidential Computing
  • Private clouds
  • And more ...



Any Scale

  • Supports any number of nodes or instances effortlessly
  • Minimal performance impact
  • Protection moves with the data and application
  • Protects across clouds

Ready for the Enterprise

Anjuna Confidential Computing software easily integrates into your existing environment and IT operations. No need for your operations and development teams to change how they work, because applications deploy and run as they always have. Anjuna’s management functions use standard APIs to integrate out-of-the-box with existing SIEM software and CARTA architectures to provide management, logging, and reporting.

Deploying Anjuna is as Simple as 1, 2, 3.


Anjuna’s software is deployed on each cloud instance that runs applications requiring protection.


At runtime, Anjuna’s software isolates applications and data from threats by automatically placing them in a secure enclave. Anjuna’s method for isolating applications and data in a secure enclave varies depending on which enclave technology is used: AWS Nitro, Azure with Intel SGX, or AMD SEV.



Anjuna's software integrates out-of-the-box. The technical specifications for these integrations are stored in a plain text file loaded at runtime.