Provided by Phoenix Technologies AG
AIaaS using IBM Watsonx.ai Built on IBM Vela AI Supercomputer.
Overview

Delivering a cutting-edge AI-as-a-Service (AIaaS) platform using IBM Watsonx.ai and IBM Vela AI supercomputer, featuring confidential computing to safeguard AI data, models, and training processes. Our vision is to provide a secure, resilient, and high-performance AI environment for enterprises to innovate and scale the AI applications.

  • Industries
  • Cross Industry
  • Banking
  • Automotive
  • Aerospace and Defense
  • Industrials and Manufacturing
  • Healthcare
  • Energy and utilities
  • Financial Markets
  • Life sciences
  • Electronics
  • Insurance
  • Government, Federal
  • Telecommunications
  • Government, State/Provincial/ Local
  • Retail
  • Medical devices and supplies
  • Travel and Transportation
  • Consumer products
  • Computer Services
  • Education
  • Media & Entertainment
  • Professional Services
  • Healthcare providers
  • Construction and engineering
  • Real Estate
  • Public safety and policing
  • Social services
  • Topics
  • AI and ML
  • Analytics
  • Application development
  • Automation
  • Blockchain
  • Business operations
  • Cloud
  • Consulting
  • Cybersecurity
  • Data storage
  • Environmental issues
  • IT infrastructure
  • Industry-related topics
  • Quantum computing
  • Services
  • Software architecture
  • Deployment types
  • SaaS
  • On-premises
  • Languages supported
  • German
  • English
  • Regions and countries supported
  • Americas - United States of America
  • Europe - Austria, Belgium, Denmark, Estonia, Finland, France, Germany, Greece, Hungary, Ireland, Italy, Liechtenstein, Luxembourg, Malta, Monaco, Netherlands, Norway, Poland, Portugal, Serbia, Slovakia, Slovenia, Spain, Sweden, Switzerland, United Kingdom of Great Britain and Northern Ireland
Benefits Availability
IBM Vela AI supercomputer for unmatched computational power and scalability. IBM Watsonx.ai for AI development, deployment, and management.
Integrity
Setting AI security benchmarks to protect against vulnerabilities and attacks. Conducting regular security audits, penetration testing.
Confidentiality
Using confidential computing to protect AI data, models, and training. Continuously monitor vulnerabilities and injection risks.
Information about the companies and solutions listed in this directory is provided by each company and is not validated by IBM unless otherwise noted.