enclaive news engl web

Secure right to the core: data sovereignty with Dell and enclaive

Cloud usage is standard in Switzerland, but data is often unprotected during processing. Confidential computing closes this gap. DataStore shows how the right combination of hardware and software builds a secure bridge to the sovereign cloud.

Swiss companies are all in the cloud: the 2025 PwC Cloud Business Survey found that 100% of the Swiss organizations it surveyed used cloud services, with 77% planning further budget increases. But as dependency grows, so does risk. Regulatory pressure from NIS2 and the revised Data Protection Act (nFADP) is increasing, while CLOUD Act in the US is creating ongoing legal uncertainty. However, the crux of the problem lies deeper. Traditional encryption protects data when idle and during transmission, but not while it is being actively processed in memory, when sensitive information is potentially visible to cloud providers, administrators or hackers. For many companies, such as those training AI models with confidential business data or processing financial transactions under DORA, this blind spot is simply unacceptable.

The foundation: cyber-resilient servers as an anchor of trust

Real security starts with the hardware. Confidential computing needs a foundation that is built on trust from the ground up – and that is what Dell PowerEdge servers provide. Security is not a retrospective add-on; it is an integral part of the design. The hardware-based Silicon Root of Trust ensures the integrity of the system firmware and is an immovable anchor of trust. The “zero trust by design” principle runs through the entire life cycle of the server – from production and operation to decommissioning. This hardware certification is the technical prerequisite that enclaive’s software can rely on for a completely verifiable security chain from the chip to application.

The solution: demonstrable security in enclaves

Software from the Berlin-based specialist enclaive creates protected execution environments, or enclaves, on the foundation of this trustworthy hardware. Within these enclaves, data and applications are fully protected by 3D encryption, even during processing. Even the cloud provider can only see an encrypted black box and cannot access the content. Thanks to the “Hold Your Own Key” (HYOK) approach and a virtual hardware security module (vHSM), the user retains full control of the cryptographic keys. The synergy with Dell PowerEdge is crucial: the integrity of each enclave is confirmed cryptographically and verified against the hardware trust anchor of the Dell servers. The result is auditable, technical evidence that data is only processed in a protected and unmanipulated environment, a decisive advantage for demonstrating compliance in accordance with the GDPR, NIS2 or DORA. Gartner ranked confidential computing one of the top 10 technology trends of 2026, and the market is growing with a CAGR of around 50%, a clear indication that this technology has reached businesses.

What makes it possible: DataStore as a center of excellence for Switzerland

The union of Dell PowerEdge and enclaive is more than the sum of its parts; it is a strategic response to the requirements of digital sovereignty. As a leading Swiss value-added distributor, DataStore AG acts as a central center of excellence for this solution. DataStore orchestrates the technology while empowering Swiss system integrators and managed service providers with proven expertise and certified specialists to offer their customers turnkey confidential computing solutions. From consulting and conception to implementation and ongoing support, DataStore paves the way for companies to create secure, sovereign and future-proof digital infrastructure.