https://store-images.s-microsoft.com/image/apps.10243.17e2f9ca-e39d-46ab-8221-3c14d33aa676.76536be5-26b6-4462-9757-fc3825cb13e3.c543d17f-a63a-4704-bf61-770b8cd42aa0
Date-in-use Encrypting MongoDB
بواسطة enclaive GmbH
Just a moment, logging you in...
A source-available cross-platform document-oriented database program.
MongoDB is a source-available cross-platform document-oriented database program. Classified as a NoSQL database program, MongoDB uses JSON-like documents with optional schemas.
Following benefits come for free with MongoDB-SGX :
security: MongoDB-SGX gives data the safest place a database can give going beyond database encryption ("data at rest")
black box database: not only is the database encrypted, but also queries to the database remain fully encrypted in the memory ("data in use")
no static table encryption needed: database running in a confidential container by design encrypts the query, query processing on data, and the database
no key rotation needed: avoid key management and update complexities known from data-at-rest databases
untraceability: when combined with TLS, MongoDB-SGX keeps the user interacting with the database indistinguishable from any other user interaction even
hardened security against memory dumps, query and user de-anonymization including kernel-space exploits, malicious and accidental privilege insider attacks, UEFI firmware exploits and other "root" attacks using the corruption of the application to infiltrate your network and system
runs on any hosting environment irrespectivably of geo-location and complies with privacy export regulation, such as Schrems-II
GDPR/CCPA compliant processing ("data in use") of user data in the cloud as data is anonymized thanks to the enclave
How to deploy MongoDB-SGX in a zero-trust cloud?
The Microsoft Azure Confidential Cloud infrastractures is SGX-ready out of the box
https://github.com/enclaive/enclaive-docker-mongodb-sgx/blob/main/README.md
*Any registered trademarks and rights therein are reserved to the respective owner. Any use by enclaive is for referential purposes only and does not indicate any sponsorship, endorsement or affiliation between the trademark owner and enclaive.
لمحة سريعة
https://store-images.s-microsoft.com/image/apps.24498.17e2f9ca-e39d-46ab-8221-3c14d33aa676.f6836133-9e11-48fc-86c0-35898a626e77.1bff0d34-6fc7-4b01-be3f-354d5415b6df
https://store-images.s-microsoft.com/image/apps.44822.17e2f9ca-e39d-46ab-8221-3c14d33aa676.f6836133-9e11-48fc-86c0-35898a626e77.c5401005-b041-481d-bed4-517be259bac1
https://store-images.s-microsoft.com/image/apps.3461.17e2f9ca-e39d-46ab-8221-3c14d33aa676.f6836133-9e11-48fc-86c0-35898a626e77.bc2e2d88-eabc-4b51-9017-892843f3e880
https://store-images.s-microsoft.com/image/apps.31056.17e2f9ca-e39d-46ab-8221-3c14d33aa676.f6836133-9e11-48fc-86c0-35898a626e77.c9790c00-d875-4565-b03f-538619690aa6
https://store-images.s-microsoft.com/image/apps.55414.17e2f9ca-e39d-46ab-8221-3c14d33aa676.f6836133-9e11-48fc-86c0-35898a626e77.9fcaff97-e97e-4110-ae55-8a968121ff41
التطبيقات الأخرى من enclaive GmbH
enclaive-virtual Hardware Security Module VMenclaive GmbHHold your own Key with virtual Hardware Security Modules for strong security, enhanced scalability and flexibility
+1
Applicable to:
Virtual Machines
NaN out of 5
NodeJS for Confidential Cloud Computing (VM)enclaive GmbHExecute Javascript applications in the safest Confidential Compute runtime
+1
Applicable to:
Virtual Machines
NaN out of 5
Data-in-use Encrypting Redis®DBenclaive GmbHIn-Memory database with Data-in-Use Encryption
+1
Applicable to:
Virtual Machines
NaN out of 5
enclaive Multi Cloud Platformenclaive GmbHSecurely manage cloud resources with enclaive Multi Cloud Platform.
+1
Applicable to:
SaaS
NaN out of 5
enclaive-virtual Hardware Security Module Containerenclaive GmbHHold your own Key with virtual Hardware Security Modules for strong security
+1
Applicable to:
Containers
NaN out of 5