The proliferation of privacy
regulations, rapid adoption of multi-cloud, data analytics, and AI/ML
development within enterprises has spurred the need for security solutions that
can protect data across its lifecycle-at rest, in transit, and in use.
Confidential Computing provides a much-needed solution.
Confidential Computing is a new technology that allows organizations to unlock
the value of their most private data while keeping it more safe and secure.
Organizations can now protect data and applications in use by running them
within secure enclaves.
Confidential Computing uses a hardware-based Trusted Execution Environment
(TEE) to protect data and applications in-use. By securing data when it is
being processed, Confidential Computing can protect private data on untrusted
infrastructure and prevent unauthorized access to sensitive workloads. Now
available to deploy at scale with public cloud providers and OEM hardware
manufacturers, Confidential Computing represents a game-changing privacy
enhancing technology that enables collaborative data processing, without
compromising data privacy requirements. This session will describe how
Confidential Computing works and how it is being used within a range of
different industry use-cases covering healthcare, financial services and
defense applications.
Discover more on our short video explainers
• What is Confidential Computing - https://youtu.be/dEFiWkY3M1c