How it Works
Cape empowers developers to build secure applications which protect the underlying data and code from the cloud.
Easy-to-Use Cape doesn’t require expertise in security or infrastructure.
Secure Cape uses the strongest data encryption and secure processing within a Trusted Execution Environment.
Scalable Cape auto scales and is exposed through a simple REST API, CLI, and SDKs.
If you can code you can use Cape to build secure applications so that data and privacy breaches never happen.
Bring any application you develop to the Cape Platform to run in a Trusted Execution Environment. Cape cannot access any of the underlying code and data. The TEE is not exposed to external networking and is not persisted.
Developers can deploy a function via a zip file which gets encrypted and can only be used in the Confidential Computing Environment. An example is uploading a Python application that can be referenced later with one call to run.
Run your Application
Developers can then call this function to use across a dataset that is encrypted and can only be used securely. In other words, the function is deployed in a manner that protects the underlying data. The application runs functions and protects the end user's data. The results are then returned to the app.
“Cape Privacy solved a major problem by making the encrypted data useful without decrypting it. It’s a real gamechanger. ”
Recognized by the Industry
Cape Privacy has recently been recognized in Gartner’s 2021 AI Trust, Risk & Security Management (TRISM) Market Guide, 451 Group’s Encryption-In-Use Report, Matt Turck’s 2021 MAD Landscape, and was named a 2021 RSA Innovation Sandbox Finalist.