Honest Computing

Achieving demonstrable data protection and process integrity for data and process-critical systems.

Home page hero image
Our unique offering

Technology Stack

Seamless icon

Confidential Computing

Hardware-based Trusted Execution Environments (TEEs) power Turing complete-capable secure enclaves in which applications can execute securely and protect their data from unauthorised access. Applications have a unique measurement that can be remotely attested to detect tampering attempts. We use secure hardware for integrity, memory encryption and remote attestation.

Learn more
Data Privacy icon

Data Privacy & Security

On top of keeping data always encrypted in memory, we enable the use of advanced privacy techniques such as Differential Privacy and Privacy Budgeting for the analysis of datasets which protects the privacy of discreet data points. We enforce data provenance, which refers to the origination and authenticity of the data, as well as data lineage to capture the full picture of data transformations. This is done in a transparent fashion while building a tree of dependencies, ultimately providing a continuous view of the data, its ownership, and what intelligence and insights can be securely derived.

Learn more
Self-Sovereign icon

Integrity & Verifiable Transparency

When software operates in opaque or proprietary ways, accountability and trust become challenging. Secretarium technology enables accountability through verifiable transparency by allowing stakeholders to independently verify the claims and functioning of the system. The Verifiability aspect allows for checking the correctness and reliability of computing processes and outcomes. The integrity or tamper proofness aspect applies to both the data and business logic, when enforcing their immutability, lineage and traceability over time.

Learn more
Development icon

Interoperability & Scalability

Secretarium is designed to connect to other digital services the same way internet services connect to one another. Services can seamlessly integrate with existing web systems, blockchain networks, and other Secretarium services. This facilitates the creation of bridges and trustable services to connect private data to secure processing, and break siloes.

Learn more

Certifications & Registrations

ISO 27001 Certification
ISO 27001 Certification
Regulations and compliance: ISO 27001 Certified.
Cyber Essentials Certification
Cyber Essentials Certification
Regulations and compliance: Cyber Essential Certified.
JOSCAR Certification
JOSCAR Certification
JOSCAR registered status.
HM Government Award
HM Government Award
Secretarium awarded a Framework Contract.

Articles & Publications

We actively engage in highly innovative projects. Explore our latest publications featuring our cutting-edge technology.

Technology

Secretarium Announced Swift Hackathon Winners 2024

Secretarium is proud to announce our victory at the Swift Hackathon 2024! Our team tackled Challenge Statement 2, focused on developing innovative solutions to ensure data privacy in tokenised trades, and successfully built a fully functional prototype in only five days.

Improving secure enclaves interoperability
Technology

Improving secure enclaves interoperability

With the Secretarium SDK v3, we have introduced a radical improvement in enclaves communication.

Honest Computing
Technology

Honest Computing

Systems that can't lie: Inside Secretarium's new "Honest Computing" technological solution.

Offline CBDC
Digital Asset

Offline CBDC

Thales and Secretarium have been collaborating since 2022 on offline CBDC. This paper presents our technical approach.

Fraud & Scam
Data Collaboration

Fraud & Scam

A collaborative approach to financial crime detection and prevention would significantly improve accuracy and efficiency.

Amlytic
Data Collaboration

Amlytic

Secretarium and FutureFlow have collaborated to demonstrate how graph network topologies and AI can reveal money laundering patterns.

Apple Intelligence
Technology

Apple Intelligence

Apple believes Private Cloud Compute is "nothing short of the world-leading security architecture for cloud AI compute at scale".

Subscribe to Secretarium insightsGet short, sweet and brief product updates, company news, and more.