Anjuna Security

Cybersecurity Dual-Use Technology Investment Opportunity Founded 2018

Anjuna Security builds a confidential computing platform that uses hardware-backed trusted execution and remote attestation to protect sensitive workloads and data while they run, enabling regulated enterprises and government users to execute code in cloud or shared infrastructure with reduced trust in the host operator.

Visit Website

Company Overview

Anjuna Security provides a confidential computing software layer designed to protect "data-in-use" by executing workloads inside hardware-backed trusted execution environments (TEEs) and enforcing key-release policies via remote attestation. The value proposition is reducing the trusted computing base in cloud and virtualized infrastructure: even if a hypervisor, host OS, or cloud operator is compromised, application memory and secrets can remain encrypted and inaccessible without attestation-based authorization.

The competitive set includes specialist platforms (e.g., Fortanix; enclave/orchestration vendors such as Edgeless Systems) and an increasing set of hyperscaler-native confidential computing options (AWS/Azure/GCP) that can substitute for third-party tooling. Differentiation—if validated—typically hinges on developer workflow (lift-and-shift vs rewrite), breadth of TEE support, operational tooling (Kubernetes/VM integration), policy management, and integrations with enterprise KMS/HSM and identity systems.

Dual-use relevance is substantive: confidential computing supports multi-tenant and coalition environments where infrastructure cannot be fully trusted (joint operations, contractors, cross-domain analytics), protects sensitive model weights and inference inputs for AI, and enables controlled data sharing for intelligence, cyber, and biosecurity workflows. Strategically, it strengthens the U.S.–Israel security innovation stack by hardening cloud adoption for classified and mission systems—subject to validation of FedRAMP/IL readiness, export/compliance posture, and integration with defense cloud architectures.

Dual-Use Assessment

Confidential computing has critical dual-use applications for defense classified workload protection. Military organizations running classified applications in cloud require hardware-based memory encryption to protect sensitive data from cloud infrastructure compromise.

Key Technologies

  • Confidential computing (data-in-use protection)
  • Hardware-backed TEEs (e.g., SGX/SEV and cloud enclave variants)
  • Remote attestation and measured boot trust chains
  • Policy-based key release / secrets management integration (KMS/HSM)
  • Workload isolation for VMs/containers (incl. Kubernetes integrations)
  • Runtime hardening and cryptographic memory protection

Use Cases & Applications

  • Protecting regulated workloads (fintech/health) in public cloud with reduced operator trust
  • Secure multi-party analytics / controlled data sharing across organizations
  • Protection of AI model weights, prompts, and inference data in shared GPU/cloud environments
  • Classified or sensitive defense workloads on hybrid cloud with attestation-gated secrets
  • Coalition / partner operations with multi-tenant infrastructure and zero-trust assumptions
  • Secure enclaves for key material handling and high-sensitivity credential operations

Strategic Value to U.S.-Israel Alliance

Anjuna provides confidential computing capabilities essential for defense organizations running classified workloads in cloud with hardware-based protection against infrastructure compromise.

Interested in this startup?

Learn more about our investment approach or get in touch to discuss opportunities in dual-use technology.