This page contains a list of organizations/companies and projects/products who use confidential containers as adopters in different usage levels (development, beta, production, GA etc...)
NOTE: For adding your organization/company and project/product to this table (alphabetical order) fork the repository and open a PR with the required change. See list of adopter types at the bottom of this page.
Organization/Company | Project/Product | Usage level | Adopter type | Details |
---|---|---|---|---|
Alibaba Cloud (Aliyun) | Elastic Algorithm Service and Elastic GPU Service | Beta | Service Provider | Both services use sub-projects of confidential containers to protect the user data and AI model from being exposed to CSP (For details [email protected]) |
Edgeless Systems | Contrast | Beta | Service Provider / Consultancy | Contrast runs confidential container deployments on Kubernetes at scale. |
IBM | IBM LinuxONE | Beta | Service Provider | Confidential Containers with Red Hat OpenShift Container Platform and IBM® Secure Execution for Linux (see details) |
NanhuLab | Trusted Big Data Sharing System | Beta | Service Provider | The system uses confidential containers to ensure that data users can utilize the data without being able to view the raw data.(No official website yet. For details: [email protected]) |
KubeArmor | Runtime Security | Beta | Another project | An open source project that leverages CoCo as part of their solution, integrates with for compatibility and interoperability, or is used in the supply chain of another project (5GSEC). |
Red Hat | OpenShift confidential containers | Beta | Service Provider | Confidential Containers are available from OpenShift sandboxed containers release version 1.7.0 as a tech preview on Azure cloud for both Intel TDX and AMD SEV-SNP. The tech preview also includes support for confidential containers on IBM Z and LinuxONE using Secure Execution for Linux (IBM SEL). |
ByteDance | Jeddak Sandbox | Beta | End-User / Service Provider | Jeddak Sandbox leverages CoCo to protect the data privacy in the process of the company's business (for details [email protected]) |
TBD | ||||
TBD |
See CNCF definition of an adopter
Any single company can fall under several categories at once in which case it should enumerate all that apply and only be listed once
- End-User (CNCF member) - Companies and organizations who are End-User members of the CNCF
- Another project - an open source project that leverages a CNCF project as part of their solution, integrates with for compatibility and interoperability, or is used in the supply chain of another project
- end users (non CNCF member)- companies and organizations that are not CNCF End-User members that use the project and cloud native technologies internally, or build upon a cloud native open source project but do not sell the cloud native project externally as a service offering (those are Service Providers). This group is identified in the written form by the convention end user, uncapitalized and unhyphenated
- Service Provider - a Service Provider is an organization that repackages an open source project as a core component of a service offering, sells cloud native services externally. A Service Provider’s customers are considered transitive adopters and should be excluded from identification within the ADOPTERS.md file. Examples of Service Providers (and not end users) include cloud providers (e.g., Alibaba Cloud, AWS, Google Cloud, Microsoft Azure), some infrastructure software vendors, and telecom operators (e.g., AT&T, China Mobile)
- Consultancy - an entity whose purpose is to assist other organizations in developing a solution leveraging cloud native technology. They may be embedded in the end user team and is responsible for the execution of the service. Service Providers may also provide consultancy services, they may also package cloud native technologies for reuse as part of their offerings. These function as proxies for an end user