Encrypt data in use.
Hardware-enforced memory encryption protects your data while it's being processed — not just at rest or in transit. Powered by AMD SEV-SNP and Intel TDX.
Hardware-level
Memory encryption
Remote verifiable
Attestation
Near-native
Performance
Lift & shift
Migration
Security without compromise.
Hardware-enforced encryption for your most sensitive workloads.
Hardware-level isolation
AMD SEV-SNP and Intel TDX encrypt VM memory in hardware. Even the cloud operator cannot access your data in use.
Remote attestation
Cryptographically verify that your workload runs on genuine confidential hardware before sending sensitive data.
Near-native performance
Less than 5% overhead compared to standard VMs. No application changes required — run existing binaries unmodified.
Confidential GKE nodes
Run Kubernetes pods on confidential nodes. Mix standard and confidential node pools in the same cluster.
Encrypted persistent disks
Customer-managed encryption keys (CMEK) with automatic integration into your confidential VM stack.
Secure networking
End-to-end encrypted communication between confidential VMs using WireGuard tunnels with hardware-backed keys.
Getting started
Launch your first instance in three steps. CLI, console, or API — your choice.
ur compute instances create secure-vm \
--machine-type=n2d-standard-8 \
--confidential-compute-type=SEV_SNP \
--image-family=ubuntu-2404-lts \
--zone=eu-west1-bTrusted computing for every industry.
See how organizations protect data in use with confidential computing.
Confidential financial processing
Process transactions, run anti-money laundering models, and handle PCI-DSS data with hardware-enforced encryption. No data exposure to infrastructure operators.
View tutorialSuggested configuration
N2D-standard-32 · SEV-SNP · CMEK
Estimate your costs
Create detailed configurations to see exactly how much your architecture will cost. Pay for what you use, down to the second.
Configuration 1
Platform & Architecture
Compute Resources
Storage
Cost Optimization
Cost details
Hardware-enforced memory encryption. FIPS 140-2 Level 1 validated.
Works seamlessly with
Frequently asked questions
Protect data in use.
Launch a Confidential VM with zero code changes. Hardware-level encryption starts immediately.