Each Cloak function runs inside a fresh, attested Trusted Execution Environment with clear strict trust boundaries. No data persists past execution.
Confidential computing is complex. Cloak Functions abstracts away the infrastructure, providing function runtimes in the style of AWS Lambda, so you can focus on your code.
Easily add GPU resources to your functions without compromising enclave security. Run your AI and ML workloads serverlessly, without compromising model data, training data, or inferencing data.
Automatic Data Encryption Key (DEK) provisioning via KMS ensures secure key lifecycle and audit logging. Cloak Functions automatically provisions DEKs for each function, ensuring that your data and code is always encrypted at rest and in transit.
With cold-start times up to under 100ms, Cloak Functions scales instantly without manual sharding. Your functions are always ready to handle traffic, no matter the load.
Follow our quickstart guide to deploy your first confidential function in minutes, in your language of choice.
Quickstart guide