7 Integrations with Azure Confidential Computing

View a list of Azure Confidential Computing integrations and software that integrates with Azure Confidential Computing below. Compare the best Azure Confidential Computing integrations as well as features, ratings, user reviews, and pricing of software that integrates with Azure Confidential Computing. Here are the current Azure Confidential Computing integrations in 2026:

  • 1
    Kubernetes

    Kubernetes

    Kubernetes

    Kubernetes (K8s) is an open-source system for automating deployment, scaling, and management of containerized applications. It groups containers that make up an application into logical units for easy management and discovery. Kubernetes builds upon 15 years of experience of running production workloads at Google, combined with best-of-breed ideas and practices from the community. Designed on the same principles that allows Google to run billions of containers a week, Kubernetes can scale without increasing your ops team. Whether testing locally or running a global enterprise, Kubernetes flexibility grows with you to deliver your applications consistently and easily no matter how complex your need is. Kubernetes is open source giving you the freedom to take advantage of on-premises, hybrid, or public cloud infrastructure, letting you effortlessly move workloads to where it matters to you.
    Starting Price: Free
  • 2
    Microsoft Azure
    Microsoft's Azure is a cloud computing platform that allows for rapid and secure application development, testing and management. Azure. Invent with purpose. Turn ideas into solutions with more than 100 services to build, deploy, and manage applications—in the cloud, on-premises, and at the edge—using the tools and frameworks of your choice. Continuous innovation from Microsoft supports your development today, and your product visions for tomorrow. With a commitment to open source, and support for all languages and frameworks, build how you want, and deploy where you want to. On-premises, in the cloud, and at the edge—we’ll meet you where you are. Integrate and manage your environments with services designed for hybrid cloud. Get security from the ground up, backed by a team of experts, and proactive compliance trusted by enterprises, governments, and startups. The cloud you can trust, with the numbers to prove it.
  • 3
    Azure Virtual Desktop
    Azure Virtual Desktop (formerly Windows Virtual Desktop) is a comprehensive desktop and app virtualization service running in the cloud. It’s the only virtual desktop infrastructure (VDI) that delivers simplified management, multi-session Windows 10, optimizations for Microsoft 365 Apps for enterprise, and support for Remote Desktop Services (RDS) environments. Deploy and scale your Windows desktops and apps on Azure in minutes, and get built-in security and compliance features. Bring your own device (BYOD) and access your desktop and applications over the internet using an Azure Virtual Desktop client such as Windows, Mac, iOS, Android, or HTML5. Choose the right Azure virtual machine (VM) to optimize performance and leverage the Windows 10 and Windows 11 multi-session advantage on Azure to run multiple concurrent user sessions and save costs.
  • 4
    Azure Data Explorer
    Azure Data Explorer is a fast, fully managed data analytics service for real-time analysis on large volumes of data streaming from applications, websites, IoT devices, and more. Ask questions and iteratively explore data on the fly to improve products, enhance customer experiences, monitor devices, and boost operations. Quickly identify patterns, anomalies, and trends in your data. Explore new questions and get answers in minutes. Run as many queries as you need, thanks to the optimized cost structure. Explore new possibilities with your data cost-effectively. Focus on insights, not infrastructure, with the easy-to-use, fully managed data analytics service. Respond quickly to fast-flowing and rapidly changing data. Azure Data Explorer simplifies analytics from all forms of streaming data.
    Starting Price: $0.11 per hour
  • 5
    Azure Key Vault
    Enhance data protection and compliance with Key Vault. Secure key management is essential to protect data in the cloud. Use Azure Key Vault to encrypt keys and small secrets like passwords that use keys stored in hardware security modules (HSMs). For more assurance, import or generate keys in HSMs, and Microsoft processes your keys in FIPS validated HSMs (hardware and firmware) - FIPS 140-2 Level 2 for vaults and FIPS 140-2 Level 3 for HSM pools. With Key Vault, Microsoft doesn’t see or extract your keys. Monitor and audit your key use with Azure logging—pipe logs into Azure HDInsight or your security information and event management (SIEM) solution for more analysis and threat detection.
  • 6
    Azure Databricks
    Unlock insights from all your data and build artificial intelligence (AI) solutions with Azure Databricks, set up your Apache Spark™ environment in minutes, autoscale, and collaborate on shared projects in an interactive workspace. Azure Databricks supports Python, Scala, R, Java, and SQL, as well as data science frameworks and libraries including TensorFlow, PyTorch, and scikit-learn. Azure Databricks provides the latest versions of Apache Spark and allows you to seamlessly integrate with open source libraries. Spin up clusters and build quickly in a fully managed Apache Spark environment with the global scale and availability of Azure. Clusters are set up, configured, and fine-tuned to ensure reliability and performance without the need for monitoring. Take advantage of autoscaling and auto-termination to improve total cost of ownership (TCO).
  • 7
    NVIDIA Confidential Computing
    NVIDIA Confidential Computing secures data in use, protecting AI models and workloads as they execute, by leveraging hardware-based trusted execution environments built into NVIDIA Hopper and Blackwell architectures and supported platforms. It enables enterprises to deploy AI training and inference, whether on-premises, in the cloud, or at the edge, with no changes to model code, while ensuring the confidentiality and integrity of both data and models. Key features include zero-trust isolation of workloads from the host OS or hypervisor, device attestation to verify that only legitimate NVIDIA hardware is running the code, and full compatibility with shared or remote infrastructure for ISVs, enterprises, and multi-tenant environments. By safeguarding proprietary AI models, inputs, weights, and inference activities, NVIDIA Confidential Computing enables high-performance AI without compromising security or performance.
  • Previous
  • You're on page 1
  • Next