Edge Architecture

Confidential computing extension to the Edge with ARCA trusted OS

Benefit from a secure edge computing solution to deploy proprietary IP, protect sensitive data, run mission critical application and engage on new business models with third parties at the edge 

  • New trusted business environments at the edge
  • Continuum of confidential computing environments
  • Expend IT capabilities securely further to the edge

Integrate the cutting edge confidential computing technology in edge nodes allowing to extend a trusted execution environment (TEE) from a central system located in a cloud or a central datacenter throughout the full edge solution.